News
  • "Individuals May Legitimize Hacking When Angry With System or Authority"
    According to a new study conducted by researchers at the University of Kent, individuals are more likely to support hackers' disruptive actions when they are against systems or authorities that they believe are unjust or dismissive of their demands…
  • "Feds: Iran Behind ‘Proud Boys’ Email Attacks on Democratic Voters"
    Federal officials have discovered that Iranian threat actors are trying to interfere with the election.  Iranian threat actors are behind two separate email campaigns that went out to Democratic voters this week.  The emails contain threats to…
  • "Finally: A Usable and Secure Password Policy Backed by Science"
    The password-focused research group at Carnegie Mellon's CyLab Security and Privacy Institute developed a scientifically-backed password policy said to maintain the balance between security and usability. The policy developed by the group does away with…
  • "This New Malware Uses Remote Overlay Attacks to Hijack Your Bank Account"
    IBM security researchers discovered a new malware variant called Vizom that is focused on compromising bank accounts via large Brazilian banks' online financial services. The malware applies remote overlay techniques and DLL hijacking to remain hidden…
  • "Pharma Giant Pfizer Exposes Patient Data on Unsecured Cloud Storage"
    The pharmaceutical giant Pfizer has experienced a data breach that exposes sensitive patient information. According to researchers at vpnMentor, the exposed data was discovered on a misconfigured Google Cloud storage bucket. The data included transcripts…
  • "Facebook: A Top Launching Pad For Phishing Attacks"
    Researchers have found that Facebook has been a top cybercriminal favorite in phishing attacks so far this year.  There were 4.5 million phishing attempts on the social media platform between April and September 2020.  Messenger app WhatsApp is…
  • "Safari, Other Mobile Browsers Affected by Address Bar Spoofing Flaws"
    A security researcher has recently discovered address bar spoofing vulnerabilities in several mobile browsers.  These vulnerabilities could allow adversaries to trick victims into sharing sensitive information through legitimate-looking phishing…
  • "Modern Attacks Include Supply Chain 'Hopping' and Reversing Agile Environments"
    Cybercriminal groups are getting more creative in the execution of attacks against digitally transformed and agile environments, as indicated by a new report by VMware Carbon Black. According to the report, more than 80% of attacks now include cases…
  • Michael Rausch & William Sanders win Best Paper Award at QEST 2020
    Congratulations to Michael Rausch & William Sanders for winning the Best Paper Award at QEST 2020!  "Sensitivity Analysis and Uncertainty Quantification of State-Based Discrete-Event Simulation Models through a Stacked Ensemble of Metamodels…
  • Himanshu Neema wins Best Paper Award at HoTSoS 2020
    Congratulations to Himanshu Neema for winning the Best Paper Award at HoTSoS 2020!  "Simulation Testbed for Railway Infrastructure Security and Resilience Evaluation" was submitted to HoTSoS 2020 earlier this year and presented by Dr. Neema, on…
  • "NSA Warns Defense Contractors of Recent Chinese Government-Backed Hacking"
    The National Security Agency (NSA) is warning that defense contractors should be wary of Chinese government-backed hackers who are actively exploiting a multitude of known vulnerabilities. The hackers are specifically going after 25 known vulnerabilities…
  • "$1M Cyber Resiliency Fund Launched to Support Security Operations Impacted by Pandemic"
    The Cybersecurity Collaborative is a membership organization that facilitates the collaboration between senior cybersecurity leaders to share best practices and address complex enterprise security challenges. Together with its parent CyberRisk Alliance,…