News
-
"CDM Policies Provide a Vital Shield Against Climate-Driven Cyberattacks, Experts Say"According to cybersecurity experts, critical infrastructure operators can use traditional but increasingly innovative security practices to prevent emerging threats related to extreme heat waves, massive storms, and other weather events exacerbated by…
-
"Ransomware Attackers Are Targeting Exposed Microsoft SQL Databases, Report Says"Researchers at Securonix found ransomware campaigns using Internet-exposed Microsoft SQL (MSSQL) databases as a launching point for attacks against victim systems. Oleg Kolesnikov, vice president of threat research at Securonix, says the typical attack…
-
"Telegram's Popularity Continues to Soar as Catalog of Available Cyber Crime Services Matures"The Telegram messaging application has become cybercriminals' go-to assistant for various cyberattacks, as it provides services similar to those found on the dark web via a more accessible platform. Phishing and other cyberattack services are often…
-
Pub Crawl #77Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
-
"Researchers Released a Free Decryptor for the Key Group Ransomware"The threat intelligence company EclecticIQ has released a free decryption tool for the Key Group ransomware that enables victims to recover their data without paying the demanded ransom. Since at least January 2023, the Key Group ransomware gang has been…
-
"A Brief History of ICS-Tailored Attacks"According to Oleg Brodt, Chief Innovation Officer for Cyber at Ben-Gurion University of the Negev, Industrial Control System (ICS)-specific malware is relatively difficult to develop for malware authors. It takes more effort to attack ICS. ICS facilities…
-
"North Korean Hackers Behind Malicious VMConnect PyPI Campaign"North Korean state-sponsored hackers are responsible for the VMConnect campaign, which uploaded malicious packages to the Python Package Index (PyPI) repository. One of the packages mimicked the VMware vSphere connector module vConnector. The packages…
-
"New SuperBear Trojan Emerges in Targeted Phishing Attack on South Korean Activists"SuperBear, a novel Remote Access Trojan (RAT), was discovered due to a new phishing attack targeting civil society groups in South Korea. According to Interlabs, the attack targeted an unnamed activist who was contacted in late August 2023 and received a…
-
"Cybercriminals Use Research Contests to Create New Attack Methods"According to Sophos, adversary-sponsored research contests on cybercriminal forums focus on novel attack and evasion techniques. The contests mirror legitimate security conference 'Call For Papers' and provide winners with monetary rewards, peer…
-
"UTIA Analyzes Data Security and Privacy Concerns of Precision Dairy Management Systems"A team of researchers at the University of Tennessee Institute of Agriculture has received a US Department of Agriculture (USDA)-National Institute of Food and Agriculture (NIFA) new investigator seed grant to explore data security and privacy risks…
-
"New Principles for Patient Data Use Balance Research Benefits, Individual Privacy"The American Heart Association (AHA) has published new policy guidance regarding collecting, storing, ethically using, and sharing patient data. Consumers and patients likely know about social media companies' health information collection strategies and…
-
"School of Engineering Establishes Virtual Institute to Combat Cyber Threats"A newly established virtual institute at the University of Kansas (KU) School of Engineering will prepare the next generation of military and civilian leaders to fight the growing threat of cyberattacks and protect the electromagnetic spectrum (EMS). The…