News
-
Cyber Scene #9 - Private Sector Cyber Voices Speak as Congressional Committees Move to Closed SessionsCyber Scene Cyber Scene is intended to provide an informative, timely backdrop of events, thinking, and developments that feed into technological advancement of SoS Cybersecurity collaboration and extend its outreach.…
-
"Lightbend to offer security analysis for Scala through HPE Security Fortify integration "Lightbend, the providing company of the Scala programming language and the Reactive application development platform for developing distributed systems, has recently announced its collaboration with HPE Security Fortify to further improve the Scala…
-
"IoT malware clashes in a botnet territory battle"Mirai, the notorious IoT malware, faces new competition as a new malware emerges by the name of “Hajime”. Security researchers have discovered this new malware to be much more resilient than Mirai in that it forms botnets by communicating over a…
-
"How Fog Computing Will Shape The Future Of IoT Applications And Cybersecurity"According to projections made by Markets and Markets, fog computing is predicted to expand at a significant rate during the next five years as a result of the rising demand for IoT device interconnectivity, machine communication, and real-time…
-
"Pentagon, Fearing Cyber Attack, Moves to Find Alternative Comms Network"As tensions rise between the U.S. and North Korea, the Pentagon is seeking to develop an alterative communications network in hopes of protecting the U.S. power grids from potential cyberattacks. Defense Advanced Research Project Agency (…
-
"Apple ransom highlights danger of credential stuffing"On April 7, a group of hackers by the name of “Turkish Crime Family” claimed to have breached Apple’s databases, demanding that Apple pay $75,000 to prevent the leakage of millions of user credentials. Though Apple has stated that their…
-
"Bastille warns radio-based hacks pose risk to national infrastructure"Bastille, leader in enterprise threat detection via software-defined radio, is trying to bring more attention to the potential rise in radio frequency hacking. A recent case sparks concern as a hack was performed through radio frequencies of the Dallas…
-
"Automation Advancement: The Road to Emergent Security AI?"The increasing emergence of big data and IoT is cultivating more ideas for organizations as well as raising concerns about the security of network services and data. ABI Research predicts that security automation could significantly improve security…
-
"Attackers caught defacing sites with difficult to spot techniques"Sucuri researchers have discovered another rush of attacks targeting and vandalizing websites through the use of images, applying a technique that complicates the process of detection as well as the identification of the compromised site as…
-
"Inmates hid self-built PCs in the ceiling and connected them to prison network"Ohio Inspector General’s Office has released a report on an investigation that reveals the unauthorized access to Marion Correctional Institution’s network by two prison inmates, through the use of self-built PCs hidden in the ceiling of a…