News
-
"Blocking Access to ChatGPT Is a Short Term Solution to Mitigate Risk"According to Netskope, for every 10,000 enterprise users, an enterprise organization faces around 183 incidents of sensitive data being posted to ChatGPT per month. Source code makes up the largest share of exposed sensitive data. Based on data from…
-
"Despite Post-Log4J Security Gains, Developers Can Still Improve"Developers are increasingly implementing security testing as part of the development pipeline. However, there is still room for improvement as only a minority of companies test software during development or before committing code. According to Snyk's…
-
"New Study Reveals Insights Into Insider Computer Abuse and Organizational Security"Insider Computer Abuse (ICA), also known as the unauthorized and intentional misuse of organizational information resources by insiders, remains a significant threat to the security of organizational information systems. Recent studies have shown that…
-
"Keeping Emergency Field Hospitals Cyber Secure"Field hospitals and emergency response Information Technology (IT) infrastructure are confronted with the same cybersecurity challenges as any other IT infrastructure, but the consequences can be fatal. Hackers and scammers attempting to exploit…
-
"Researchers Demonstrate 'Unconditionally Secure' Quantum Digital Payments"New research from the University of Vienna may soon enable a completely secure, unhackable, and private digital payment system. In a recently published paper titled "Demonstration of quantum-digital payments," a team of researchers from the Vienna Center…
-
"Concerns Grow about MFA Bypass Attacks"Multi-factor authentication (MFA) involves authentication factors such as passwords, fingerprints, and smartphones to secure systems and data. Security experts encourage consumers and organizations to adopt MFA, because it is more difficult for hackers…
-
"This New Tool Could Protect Your Pictures From AI Manipulation"People can take a photo posted online and edit it with advanced generative Artificial Intelligence (AI) systems for malicious purposes. Due to the sophistication of these systems, it may be impossible to prove that the resulting image is fake. However, a…
-
Pub Crawl #76Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
-
"New Smartphone Vulnerability Discovered by Northeastern Ph.D. Student Reveals Hackers Could Track Your Location"According to Evangelos Bitsikas, a Ph.D. student at Northeastern University, a recently discovered vulnerability in text messaging may allow attackers to track a user's location. His research team found the flaw by applying a sophisticated Machine…
-
"8 Million People Hit by Data Breach at US Govt Contractor Maximus"U.S. government services contractor Maximus has recently disclosed a data breach warning that hackers stole the personal data of 8 to 11 million people during the recent MOVEit Transfer data-theft attacks. Maximus is a contractor that manages and…
-
"Akira Ransomware Compromised at Least 63 Victims Since March, Report Says"According to researchers at the cybersecurity company Arctic Wolf, the recently discovered Akira ransomware actively targets small and medium-sized businesses (SMBs) worldwide, with the US and Canada as its primary targets. Since its discovery in March…
-
"'Call of Duty' Players Are Being Hit With Self-Spreading Malware"Hackers are targeting Call of Duty players with a massive malware push that can self-replicate and spread through the game's multiplayer lobbies. The malware infection appears to have been sufficient for Activision to take the game offline. Some members…