News
-
"Ninety Percent of Energy Companies Suffer Supplier Data Breach"According to security researchers at SecurityScorecard, almost all (90%) of the world’s 48 biggest energy companies have suffered a supply chain data breach in the past 12 months.
-
"New SLAM Attack Steals Sensitive Data From AMD, Future Intel CPUs"Researchers from the Systems and Network Security Group (VUSec Group) at Vrije Universiteit Amsterdam have developed "Spectre based on LAM" (SLAM), a new side-channel attack that uses hardware features designed to improve security in upcoming Intel, AM
-
"UC Researchers Work on Knowledge Graph to Help Small Businesses Tackle Cybersecurity"As part of a new research project, Dr. Rosetta Romano, an assistant professor in Information Technology (IT) and Systems at the University of Canberra, will help small businesses by educating them about the criticality of cybersecurity. Dr.
-
"The Ethics of Synthetic Data and Its Impact on Cybersecurity Algorithms"Synthetic data can be used to improve cybersecurity algorithms, such as facial recognition and fingerprint matching. These applications have the potential to improve suspect identification in law enforcement and streamline border control processes.
-
"US and International Partners Issue Recommendations to Secure Software Products Through Memory Safety"The National Security Agency (NSA) has joined the Cybersecurity and Infrastructure Security Agency (CISA) and other US and international partners in releasing a Cybersecurity Information Sheet (CSI) titled "The Case for Memory Safe Roadmaps." The
-
"Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware"The recently released Cisco Talos Year in Review report highlights new trends in the cybersecurity threat landscape.
-
"Millions of Patient Scans and Health Records Spilling Online Thanks to Decades-Old Protocol Bug"Aplite researchers warn that thousands of exposed servers are leaking millions of patients' medical records and personal health information due to security flaws in a decades-old industry standard, Digital Imaging and Communications in Medicine (DICOM)
-
"Voting Experts Warn of 'Serious Threats' for 2024 From Election Equipment Software Breaches"Twenty-two computer scientists, election security experts, and voter advocacy organizations call for a federal investigation and a risk assessment of voting machines used in the US, emphasizing that software breaches have "urgent implications for the 2
-
"Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts"Threat actors can use Amazon Web Services Security Token Service (AWS STS) to infiltrate cloud accounts and launch follow-on attacks.
-
"How AI Is Revolutionizing 'Shift Left' Testing in API Security"Preventing exploitable vulnerabilities requires catching coding errors in Application Programming Interface (API) preproduction before they go live.
-
"Chrome 120 Patches 10 Vulnerabilities"Google recently announced the release of Chrome 120 to the stable channel with patches for 10 vulnerabilities.
-
"HTC Global Services Confirms Cyberattack After Data Leaked Online"IT services and business consulting company HTC Global Services has recently confirmed that they suffered a cyberattack after the ALPHV ransomware gang began leaking screenshots of stolen data.