News
-
"Trinity Professor Receives NSF Grant to Study and Improve Cybersecurity"A Trinity College professor and her research collaborators, including Trinity students, will work to make Internet communications more secure with an $850,000 National Science Foundation (NSF) grant. Ewa Syta, Associate Professor of Computer Science,…
-
"UA Little Rock Receives $150,000 NSA Grant to Host Cybersecurity Educational Program Across Arkansas"The National Security Agency (NSA) has awarded the University of Arkansas at Little Rock (UALR) a nearly $150,000 grant to hold a year's worth of free cybersecurity educational events for Arkansas junior high and high school students. UALR will…
-
"Stronger Cybersecurity for Factories of the Future"Ohio State's Center for Design and Manufacturing Excellence (CDME) gives a peek into the future of manufacturing, with students working on various projects on any given day. Inside the facility, where robotic arms are connected to a row of computers,…
-
"Moola Market Reveals $9m Crypto Exploit"Decentralized finance (DeFi) platform Moola Market has suffered a security incident leading to a loss of up to $9m worth of cryptocurrency. The Celo blockchain-based platform admitted that an incident had occurred on Tuesday, October 18. The…
-
"Thousands of Publicly Exposed API Tokens Could Threaten Software Integrity"Security researchers at JFrog have spotted thousands of publicly exposed, active application programming interface (API) tokens across the web that could threaten software integrity and allow bad actors to access confidential information, data, or…
-
"(ISC)² Study Finds an Industry Shortage of 3.4M Cybersecurity Workers"The International Information System Security Certification Consortium ((ISC)2) has made the findings of a new study public, revealing a significant increase in the shortage of cybersecurity experts. According to the 2022 (ISC)2 Cybersecurity Workforce…
-
"Hackers Can Extract Private Encryption Keys and Completely Takeover Siemens Industrial Devices"Researchers from Claroty's Team 82 found a way to compromise the entire Siemens product lines by obtaining private encryption keys from Siemens industrial devices. Siemens began storing global hardcoded cryptographic keys a decade ago to ensure software…
-
"Deep Learning With Light"When asking a smart home device for the weather forecast, the device takes several seconds to respond. One reason for this latency is that connected devices lack the amount of memory and power to store and run the massive Machine Learning (ML)…
-
"List of Common Passwords Accounts for Nearly All Cyberattacks"Rapid7 recorded every attempt to compromise two common types of servers over a 12-month period using its honeypot network, discovering that the attempted credential attacks resulted in 512,000 permutations. Almost all of those passwords are found in a…
-
"Cyber-Enabled Crimes Are Biggest Police Concerns"According to the first ever Interpol Global Crime Trend report, Cyber-related crimes such as money laundering, ransomware, and phishing pose the biggest threat to society. The inaugural study was compiled from data received from the 195 member…
-
"Google Releases Open-Source Security Tool to Centralize SBOM Management"Open-source security is a major theme in enterprise security. Following a surge of software supply chain attacks against vendors such as SolarWinds and Colonial Pipeline, President Biden issued an Executive Order (EO) requiring organizations to develop…
-
"3M Advocate Aurora Health Patients Face PHI Exposure Tied to Tracking Pixels"Advocate Aurora Health informed 3 million patients of a data breach that may have exposed Protected Health Information (PHI). The breach was caused by the nonprofit health system's use of Google and Meta tracking pixels, which are widely used tools for…