News
  • "Mobile Malware Bypasses Banks' 2-Factor Authentication"
    IBM X-Force researchers have released details about a variant of the TrickBot Trojan, dubbed "TrickMo," which was first discovered by the federal computer emergency response team of German (CERT-Bund) in September 2019. The malware has mainly targeted…
  • NCSU Lablet PI Wins 2020 ACM/SIGAI Autonomous Agents Research Award
    Professor Munindar Singh was recognized with the 2020 ACM/SIGAI Autonomous Agents Research Award. This award acknowledges the contributions of outstanding researchers in the field of autonomous agents, and is granted each year to one individual whose…
  • "China Borrowing Russian Tactics to Spread Coronavirus Disinformation"
    China's state-backed information operations are starting to follow Russia's playbook for spreading disinformation.  The Chinese state-backed information operations usually run disinformation operations aimed at controlling a narrative.  …
  • "Vulnerability in Windows is Already Being Used in 'Limited Targeted Attacks'"
    Microsoft recently reported a security vulnerability, which has been rated high in severity. The vulnerability affects millions of Windows users as it is found in Windows 10, 8, 7, and other recent versions of the operating system. According to Microsoft…
  • "New Mirai Variant Exploits NAS Device Vulnerability"
    A new variant of the infamous Mirai IoT botnet, called Mukashi, is exploiting vulnerabilities contained by Zyxel network-attached storage (NAS) devices to execute distributed denial-of-service (DoS) attacks. The flaw exploited by the Mukashi botnet is…
  • "Widely Available ICS Attack Tools Lower the Barrier for Attackers"
    As the number of publicly available ICS-specific intrusion and attack tools increases, the possibility of successful attacks against ICS grows. FireEye researchers have pointed out that specialized skills are often needed to execute attacks against such…
  • "Google's Security Measures Failed to Find Android Malware in Play Store"
    Google has recently introduced many new security measures to prevent malicious apps from appearing on the Play Store.  After these measures were put into place, researchers from Check Point found malware lurking within 56 apps that had been…
  • "Pwn2Own Hackers Go Remote, Then Crack macOS and Oracle Machines Anyway"
    Pwn2Own is a hacking contest in which ethical hackers can earn rewards for discovering vulnerabilities in different programs. Global technology firms are now using the competition as a way to recruit bug hunters who can help improve the security of their…
  • CMU is the NSA Featured School of the Quarter
    Each quarter, The National Security Agency recognizes the agency's engagement with an academic institution. This quarter, the school is Carnegie Mellon University in Pittsburgh, PA. CMU has many relationships with the NSA including hosting an SoS Lablet…
  • "Data Privacy and Security in the Travel Industry"
    The COVID-19 outbreak has had a significant impact on the travel industry, temporarily forcing operations to shut down. The cruise, airline, and hotel sectors could take this time to examine and improve the privacy and security of the personally…
  • "Vulnerability Exposed Tesla Central Touchscreen to DoS Attacks"
    Researchers have discovered a flaw in Tesla Model 3's web interface.  Tesla Model 3's web interface has a denial of service (DoS) vulnerability.  To exploit the vulnerability, a user would have to go to a malicious webpage.  If the user…
  • "Process Injection Tops Attacker Techniques for 2019"
    Red Canary's "2020 Threat Detection Report" highlights findings from the analysis of 15,000 confirmed threats that appeared in customer environments from the past year. Researchers' findings shared in the report give insight into the most common attack…