News
-
"Hardware Security Verification"Cynthia Sturton, associate professor at the University of North Carolina at Chapel Hill, has received two grants from the National Science Foundation (NSF) in support of projects to strengthen hardware security verification.
-
"Telegram, AWS Users Targeted by Hidden Malware Code"According to researchers at the cybersecurity company Checkmarx, Telegram, AWS, and Alibaba Cloud users are the target of a new malware campaign that hides malicious code within specific software functions to make it more difficult to detect.
-
"Novel Approach to Personal Identification Based on Eye Movements for Recognition and Security Applications"New research explores the application of deep learning to analyze spectrogram images of the human eye and its movements as a biometric tool.
-
"'Predator Files' Report Prompts Call for Worldwide Ban on Spyware"Amnesty International has reported on a series of Predator spyware attacks against EU, US, and Asia civil society, journalists, politicians, and academics.
-
"California Enacts Delete Act For Data Privacy"California Governor Gavin Newsom recently signed into law the first bill in the US compelling data brokers to delete all personal data of state residents upon request.
-
"Vulnerability Exposed in WordPress Plugin User Submitted Posts"Security researchers at Patchstack have discovered a new vulnerability in the User Submitted Posts WordPress plugin (versions 20230902 and below).
-
"NSA Releases a Repository of Signatures and Analytics to Secure Operational Technology"Through the exploitation of Internet-accessible and vulnerable Operational Technology (OT) assets, cyber actors have demonstrated their continued determination to conduct malicious cyber activity against critical infrastructure.
-
"Ransomware Vulnerability Warning Pilot updates: Now a One-stop Resource for Known Exploited Vulnerabilities and Misconfigurations Linked to Ransomware"Many ransomware incidents are perpetrated by threat actors exploiting known Common Vulnerabilities and Exposures (CVEs). However, many organizations may not know that a vulnerability used by ransomware threat actors is on their network.
-
"Shadow PC Warns of Data Breach as Hacker Tries to Sell Gamers' Info"Shadow PC, a provider of high-end cloud computing services, is alerting its customers of a data breach that exposed private information for over 500,000 customers. A threat actor claims to be selling the stolen data.
-
"Everest Cybercriminals Offer Corporate Insiders Cold, Hard Cash for Remote Access"In what researchers believe is a significant transition, the Everest ransomware group is intensifying its efforts to purchase access to corporate networks from employees.
-
"ShellBot Uses Hex IPs to Evade Detection in Attacks on Linux SSH Servers"The threat actors behind ShellBot, also known as PerlBot, are using IP addresses transformed into its hexadecimal notation in order to compromise inadequately managed Linux SSH servers and launch the Distributed Denial-of-Service (DDoS) malware.
-
"US Smashes Annual Data Breach Record With Three Months Left"According to the Identity Theft Resource Center (ITRC), there were 2116 reported US data breaches and leaks in the first nine months of 2023, making it the worst year on record with a whole quarter left to go.