News
-
"3 Activities for Making Software Secure by Design"According to Carnegie Mellon University (CMU) Software Engineering Institute (SEI)'s Robert Schiela, technical manager of the Secure Coding group, and Carol Woody, a principal researcher in the SEI's Computer Emergency Response Team (CERT) Division,…
-
"Quantum-Safe Data Encryption"Quantum computers are expected to break current encryption methods due to their unique functioning. A competition started by the National Institute of Standards and Technology (NIST) seeks to change this by looking for algorithms that can withstand…
-
"An Empirical Investigation Into Organization Cyber Security Readiness From the IT Employee and Manager Perspectives"New research highlights the essential elements for bolstering cybersecurity readiness. This study examines five critical factors influencing organizations' cybersecurity readiness management, which include employee expertise, awareness, organizational…
-
"NSA-Funded GenCyber Cybersecurity Summer Bootcamp Reveals Exciting Career Opportunities for Richmond-Area Students"At the Virginia Commonwealth University (VCU) College of Engineering's GenCyber Cybersecurity Summer Bootcamp, over 40 middle and high school students from the Richmond area learned about cybersecurity. The program is part of a nationwide initiative…
-
"API Security Doesn't Get the Priority Treatment It Needs"Traceable and Ponemon Institute's research calls for more attention on Application Programming Interface (API) security. While threats continue to increase, organizations do not assess their APIs nearly enough for vulnerabilities. Traceable warns of the…
-
"75% of Education Sector Attacks Linked to Compromised Accounts"According to security researchers at Netwrix, 69% of organizations in the education sector suffered a cyberattack within the last 12 months. Phishing and user account compromise were the most common attack paths for these organizations, while…
-
"Lazarus Steals $41M From Virtual Betting Site"The FBI has revealed that the North Korean threat group Lazarus stole $41 million in cryptocurrencies from Stake[.]com, including Ethereum. According to the FBI, its investigation has found that North Korean cyber actors moved stolen funds associated…
-
"New Phishing Campaign Launched via Google Looker Studio"Security researchers at Check Point have observed threat actors using Google Looker Studio to create fake crypto pages that are then delivered to the intended victims in emails sent from the legitimate tool itself. The message contains a link to…
-
"Emsisoft Tells Users to Update Products, Reboot Systems Due to Certificate Mishap"Endpoint security firm Emsisoft urges its users to update their anti-malware and other security products and reboot their systems after using an improperly issued digital certificate to sign them. The company stated that the problem affects its…
-
"Patch 'Em or Weep: Study Reveals Most Vulnerable IoT, Connected Assets"Armis, a company specializing in asset visibility and security, has identified the connected assets that pose the greatest threat to global enterprises. New research from Armis, based on an analysis from its Asset Intelligence Engine, focuses on…
-
"Atomic macOS Stealer Malware Delivered via Malvertising Campaign"According to security researchers at Malwarebytes, a piece of malware named Atomic macOS Stealer, or AMOS, has been delivered by cyber criminals through a malvertising campaign. AMOS emerged in the spring when its creators started advertising it…
-
"North Korean Hackers Target Security Researchers With Zero-Day Exploit"Using a zero-day exploit, North Korean threat actors are attempting to compromise the machines of security researchers. The warning comes from Google's security researchers Clement Lecigne and Maddie Stone, who have described the government-backed attack…