News
-
"Administration Launches National Cyber Workforce and Education Strategy to Address Cyber Workforce Needs"The Biden-Harris Administration has unveiled the National Cyber Workforce and Education Strategy (NCWES) to address immediate and long-term cyber workforce needs. Filling the many cyber positions in the US is a national security imperative. The NCWES…
-
"Hackers Exploit BleedingPipe RCE to Target Minecraft Servers, Players"It has recently been discovered that hackers are actively exploiting a "BleedingPipe" remote code execution vulnerability in Minecraft mods to run malicious commands on servers and clients, allowing them to take control of the devices. BleedingPipe…
-
"Android Malware Steals User Credentials Using Optical Character Recognition"Researchers have uncovered malicious Android apps that use optical character recognition to steal credentials displayed on smartphone screens. The malware, dubbed CherryBlos by Trend Micro security researchers, has been embedded in at least four Android…
-
"FBI Says AI Is Making It Easier for Hackers to Write Malware"The FBI has further emphasized that Artificial Intelligence (AI) helps nearly every aspect of cybercriminal activity, from development to deployment, and this trend is continuing. On a recent media call, an FBI official suggested that free, customizable…
-
"Weintek Weincloud Vulnerabilities Allowed Manipulation, Damaging of ICS Devices"Security researchers at TXOne Networks have discovered that several vulnerabilities in a Weintek product could have been exploited to manipulate and damage industrial control systems (ICS). The security holes impact Taiwan-based Weintek's Weincloud…
-
"Hackers Threaten to Auction off DNA Patient Records From Oklahoma Hospital"The Karakurt ransomware group is targeting the McAlester Regional Health Center in Oklahoma, claiming to have stolen over 126 GB of data from the facility, including DNA patient records. Karakurt announced its plans to publish samples and auction 117 GB…
-
"AVRecon Botnet Leveraging Compromised Routers to Fuel Illegal Proxy Service"TheAVRecon botnet has been observed using compromised small office/home office (SOHO) routers since at least May 2021 as part of a multi-year campaign. Lumen Black Lotus Labs disclosed AVRecon earlier this month as malware capable of executing additional…
-
"Linux Version of Abyss Locker Ransomware Targets VMware ESXi Servers"The Abyss Locker operation has developed a Linux encryptor that targets VMware's ESXi Virtual Machine (VM) platform for enterprise-level attacks. As businesses migrate from individual servers to VMs for improved resource management, performance, and…
-
"Web Browsing Is the Primary Entry Vector for Ransomware Infections"Researchers at Palo Alto Networks discovered that in 2022, the most widely used ransomware delivery method was URL or web browsing. In 2021, it was email attachments (i.e., delivery via SMTP, POP3, and IMAP protocols), but in 2022, only 12 percent of…
-
"Another AI Pitfall: Digital Mirroring Opens New Cyberattack Vector""Digital twins" or Artificial Intelligence (AI) assistants trained to serve needs by learning about and, in some ways imitating users, can be turned against people in various ways. According to Ben Sawyer, a professor at the University of Central Florida…
-
"Pacific Northwest National Laboratory and The University of Texas at El Paso Collaborate to Strengthen Data Protection"Researchers are collaborating to enhance the privacy and security of sensitive data that may include Personally Identifiable Information {PII). Tony Chiang, Data Scientist at Pacific Northwest National Laboratory (PNNL), and Amy Wagler, Professor of…
-
"Improving Cybersecurity: New Ways to Protect Data"Nektarios Tsoutsos, an assistant professor in the Department of Electrical and Computer Engineering in the College of Engineering at the University of Delaware, is developing new methods to protect data when cloud services are compromised. With support…