News
-
"CISA Cybersecurity Strategic Plan: Shifting the Arc of National Risk to Create a Safer Future"President Biden issued the National Cybersecurity Strategy in March, outlining a clear and imperative path for the US. As the nation's Cyber Defense Agency, the Cybersecurity and Infrastructure Security Agency (CISA) plays a pivotal role in advancing…
-
"New York Couple Plead Guilty to Bitcoin Laundering"A married couple from New York dubbed “Bitcoin Bonnie and Crypto Clyde” recently pleaded guilty to laundering billions of dollars in stolen bitcoin. Ilya Lichtenstein, 35, and Heather Morgan, 33, were arrested in February last year after the US…
-
"CPU Security Loophole: Analysis of Energy Consumption Allows Data Theft"Central Processing Units (CPUs) are designed to run multiple applications simultaneously, which is advantageous for productivity, but poses a security risk. By analyzing the processor's energy consumption, researchers at TU Graz and the Helmholtz Center…
-
"Credentials Account For Over Half of Cloud Compromises"Google recently discovered that over half (55%) of public cloud compromises in the first three months of the year were down to a missing or weak password. Google noted that the second most common compromise factor in the period was misconfiguration…
-
"U-M Researchers Play Role in Creating New California Privacy Choice Icon"California has enacted a new online privacy icon designed to give users greater authority over their personal information. Researchers from the University of Michigan's School of Information (UMSI) led the research to create the icon, simplifying…
-
"Malicious npm Packages Found Exfiltrating Sensitive Data from Developers"Researchers have found a new set of malicious packages on the npm package registry that are designed to steal sensitive developer information. On July 31, 2023, the software supply chain company Phylum discovered the "test" packages, which showed…
-
"Hacktivists Fund Their Operations Using Common Cybercrime Tactics"Hacktivist groups that operate for political or ideological reasons use various strategies to finance their operations. Although hacktivism appears to be about inflicting service disruption through Distributed Denial-of-Service (DDoS) attacks or…
-
"VPNs Remain a Risky Gamble for Remote Access"According to a new Zscaler report, organizations are concerned about network security because of the threats posed by Virtual Private Networks (VPNs). Due to the increased threat of cybercriminals exploiting VPN vulnerabilities, the report emphasizes the…
-
"Exclusive: CISA Sounds the Alarm on UEFI Security"The Cybersecurity and Infrastructure Security Agency (CISA) is calling for improved security for Unified Extensible Firmware Interface (UEFI) update mechanisms in the wake of the debacle that has been mitigating the BlackLotus bootkit. CISA urges the…
-
"Researcher Explores Effect of Hospital Mergers on Data Breaches"According to research conducted by a University of Texas at Dallas doctoral student, patient data is especially vulnerable during and after hospital mergers and acquisitions, when the likelihood of a cybersecurity breach more than doubles. Nan Clement, a…
-
"Researchers Strengthen Defenses Against Common Cyberattack"Scientists have developed a method that improves the detection of a common Internet attack by 90 percent compared to current methods. The new technique developed by computer scientists at the Pacific Northwest National Laboratory (PNNL) of the US…
-
"Satellites Easier to Hack Than a Windows Device"According to a new paper by a team of researchers from Ruhr University Bochum and the CISPA Helmholtz Center for Information Security in Saarbrücken, satellites are vulnerable to cyberattacks and do not even use basic cryptography. The research team…