News
-
"Engineers Build Zero-Trust, Real-Time Cybersecurity Tools to Protect Renewables on the Grid"Researchers at Iowa State University are building zero-trust cybersecurity tools to protect power grids that include renewable resources such as wind or solar farms.
-
"Critical Vulnerabilities Expose mbNET.mini, Helmholz Industrial Routers to Attacks"Germany's CERT@VDE has notified organizations of several critical and high-severity vulnerabilities found in industrial routers.
-
"Penn Engineering Research Discovers Critical Vulnerabilities in AI-Enabled Robots to Increase Safety and Security"Researchers at the University of Pennsylvania's School of Engineering and Applied Science (Penn Engineering) discovered that certain features of Artificial Intelligence (AI)-governed robots have previously unidentified security vulnerabilities.
-
"Severe Flaws in E2EE Cloud Storage Platforms Used by Millions"According to ETH Zurich researchers Jonas Hofmann and Kien Tuong Turong, multiple End-to-End Encrypted (E2EE) cloud storage platforms have security vulnerabilities that could expose user data to malicious actors.
-
"Half of Organizations Have Unmanaged Long-Lived Cloud Credentials"Datadog's "State of Cloud Security 2024" report found that 46 percent of organizations have unmanaged users with long-lived credentials in cloud services, putting them at risk of data breaches.
-
"ESET Distributor's Systems Abused to Deliver Wiper Malware"ESET is investigating the abuse of the systems of its official product distributor in Israel to send emails delivering wiper malware.
-
"New Algorithm Identifies Increase in Critical Infrastructure Security Vulnerabilities"A team of researchers at the Georgia Tech School of Electrical and Computer Engineering (ECE) has developed an algorithm named "PLCHound" to improve critical infrastructure security.
-
"Using Generative AI to Outsmart Cyberattackers Before They Strike"According to Mohamed Rahouti, a professor at Fordham University, generative Artificial Intelligence (GenAI) holds the key to a new system that anticipates potential cyberattacks and prepares systems to counter previously unknown cyber threats.
-
"PhD Student to Present Paper at Cybersecurity Conference"Mir Ali Masood, PhD student at the University of Illinois Chicago, co-presents a paper titled "Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles" at the 2024 ACM Computer and Communication Security
-
"UTSA Researchers Reveal Oversight in AI Image Recognition Tools"Researchers at the University of Texas at San Antonio (UTSA) have developed a proprietary attack named "AlphaDog" to study how hackers can exploit an oversight in Artificial Intelligence (AI) image recognition tools.
-
"For AI, Secrecy Often Doesn't Improve Security"A team of researchers has concluded that limiting public access to the underlying structures of Artificial Intelligence (AI) systems could have several consequences.