News
  • "Preventing AI From Divulging Its Own Secrets"
    A computer system's secrets can be revealed by studying its power usage patterns as it conducts operations. Therefore, researchers are working to protect AI systems' power signatures from snoopers. According to researchers, the AI systems most…
  • "Group Behind WannaCry Now Using New Malware"
    The Lazarus Group, also known as Hidden Cobra, is associated with the North Korean Government and has been tied to several high-profile attacks, including WannaCry.  They are now using three new malware variants, according to CISA researchers.…
  • "Audit Trails Critical for Tracking Network Activity"
    As the distribution and complexity of networks continue the grow, it is becoming more difficult for IT professionals to keep track of the events that occur on their networks. However, logging network activity remains essential in detecting, tracking, and…
  • "Ninety-One Percent of Commercial Applications Contain Outdated or Abandoned Open Source Components"
    Synopsys' 2020 Open Source Security and Risk Analysis (OSSRA) report discusses findings from the examination of more than 1,250 audited commercial codebases. The report highlights the latest shifts and patterns in the use of open source components in…
  • "Ransomware Reminder: Paying Ransoms Doesn't Pay"
    Researchers have conducted a new survey of 5,000 IT professionals across 25 countries. 51 percent of the participants said that their organizations experienced a "significant" ransomware attack in the last 12 months, of which 73 percent resulted in…
  • "Enhancing Privacy Protections for Android Applications"
    A platform, called Privacy Enhancements for Android (PE for Android), has been developed by a team of researchers led by Two Six Labs and Raytheon BBN Technologies under DARPA's Brandeis program. PE for Android was developed to support the creation of a…
  • "Software Developed by SMU Stops Ransomware Attacks"
    Engineers from Southern Methodist University's (SMU) Darwin Deason Institute for Cybersecurity have developed new software to detect ransomware attacks. SMU's software differs from existing methods, such as antivirus software or other intrusion detection…
  • "How Two Researchers Used an App Store to Demonstrate Hacks on a Factory"
    A malware attack experienced by the German car parts manufacturer Rheinmetall Automotive resulted in the disruption of production at the company's plants that cost an estimate of $4 million per week. The incident brought further attention to the…
  • "Healthcare Giant Magellan Struck with Ransomware, Data Breach"
    Magellan Health has recently discovered that it has suffered a data breach.  An unauthorized adversary gained access to Magellan's systems after sending a phishing email on April 6th.  The adversaries sent the phishing email impersonating as a…
  • "REvil Ransomware Attack Hits A-List Celeb Law Firm"
    A popular law firm that works with several A-List Celebrities, including Madonna, Lady Gaga, and Drake, has been hit with a REvil ransomware attack.  The adversaries were able to steal 756 gigabytes worth of data, including client contracts,…
  • "Microsoft and Intel Project Converts Malware Into Images Before Analyzing It"
    Microsoft researchers are working with Intel Labs on a project, called STAMINA (Static Malware-as-Image Network Analysis). The project explores a new approach to detecting and classifying malware that involves the application of deep learning techniques…
  • "Researchers Find Bitcoin’s Lightning Network Susceptible to Cyberattacks"
    Bitcoin is a cryptocurrency that is not centrally managed or facilitated by banks or other financial institutions. According to researchers at Florida International University, the Lightning Network originally designed to increase the speed and…