News
-
"Fighting cyberattacks with volunteers"The Michigan Cyber Civilian Corps, MiC3, contains highly skilled volunteers from the public and private sector who are willing to provide assistance in the event that the state is targeted by a major cyberattack. However, the MiC3 has not yet been…
-
"Hackers use 'cloud-on-cloud' attacks to evade detection, attribution"Researchers at Skyhigh Networks have discovered attacks targeting Microsoft Office 365 accounts of senior employees within a wide range of Fortune 2000 companies. These attacks have been launched through the use of cloud infrastructure to perform…
-
"USB connections make snooping easy"Researchers at the University of Adelaide reveal that USB connections are more insecure than previously thought as they have discovered that this common interface is vulnerable to information leakage. Over 90% of the large variety of computers and…
-
"Scientists Hack a Computer Using DNA"Scientists at the University of Washington in Seattle have developed the first biological malware that is capable of successfully taking over a computer. Researchers were able to demonstrate this hack by encoding malicious software into DNA then using it…
-
"Cyber-Attack on Solar Panels Could Shut Down Power Grids via Domino Effect"New research by Dutch security engineer, Willem Westerhof, reveals the presence of vulnerabilities within photovoltaic panels, which could have an extensive impact on a country’s power grids. Westerhof claims that the vulnerabilities of photovoltaic…
-
"How a port misconfiguration exposed critical infrastructure data"UpGaurd researchers have discovered an open port in which hackers could use to exfiltrate data from the servers of Power Quality Engineering (PQE), a Texas-based firm. The discovery was made as Chris Vickery, UpGaurd Director of Cyber Risk Research, was…
-
"REnigma malware reverse-engineering tool commercialized"DHS S&T has announced the transition of an innovative malware analysis tool by the name of “REnigma”, into the marketplace as a new startup technology company. The transition of this technology into a commercially available product is supported…
-
"Researchers Add Profile-Based Anomaly Detection to SIEM"Researchers at Germany’s Fraunhofer Institute for Communication, Information Processing and Ergonomics (FKIE) have added profile-based anomaly detection software for security information and event management (SIEM) systems to help in the management of…
-
"NIST Releases Cybersecurity Definitions for the Workforce"The National Institute of Standards and Technology (NIST) has released a finalized draft version of its National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. The objective of this framework is to improve upon the…
-
"Sorry ‘cyberwarrior’, your password is pwned along with 320m others"Troy Hunt, a security researcher, has developed a new tool to help people discover if their current or older passwords have been compromised in data breaches. This tool by the name of “Pwned Passwords” is website that allows users to enter a…
-
"AI vs AI: New algorithm automatically bypasses your best cybersecurity defenses"Researchers at Endgame security firm have demonstrated the use of artificial intelligence to modify malware code in order to circumvent anti-malware machine learning within antivirus software. The experiment performed by researchers brings attention to…
-
"Inside the fight against malware attacks"Protecting systems against malware is an ongoing battle for security researchers as malware authors continue to improve upon the methods of which their malware attacks defeat anti-malware software. As malware authors encrypt their malware programs, the…