"MITRE-Harris Poll Finds US Public Is Worried about the Security of Our Critical Infrastructure"

"MITRE-Harris Poll Finds US Public Is Worried about the Security of Our Critical Infrastructure"

According to a new public opinion poll conducted by MITRE and The Harris Poll, the US public believes cyberattacks to be of the greatest risk to critical infrastructure. Seventy-eight percent are concerned about cyberattacks, and 51 percent are not confident that the US is prepared to recover from an attack.

Submitted by grigby1 CPVI on

"As Attackers Refine Tactics, 'Speed Matters,' Experts Warn"

"As Attackers Refine Tactics, 'Speed Matters,' Experts Warn"

According to security researchers at Palo Alto's Unit 42 threat intelligence group, advanced attackers are increasingly seeking speed. The researchers analyzed hackers' preferred strategies for infiltrating organizations, exfiltrating data, crypto-locking systems with ransomware, and more in 2023. Wendi Whitmore, senior vice president at Unit 42, cautioned that the time between initial compromise and data exfiltration is shrinking. She goes on to say that attackers are sometimes beginning to exfiltrate data in hours rather than days, calling on defenders speed up their operations.

Submitted by grigby1 CPVI on

"Moldovan National Sentenced in E-Root Cybercrime Marketplace Case"

"Moldovan National Sentenced in E-Root Cybercrime Marketplace Case"

According to the US Department of Justice (DOJ), a Moldovan national has been sentenced to 42 months in US federal prison for running a set of websites selling access to compromised computers worldwide. He was the administrator for the E-Root Marketplace, which listed over 350,000 compromised credentials for sale. E-Root operated on a widely distributed network and took steps to hide the identities of its administrators, buyers, and sellers.

Submitted by grigby1 CPVI on

17th Cyber Security Experimentation and Test Workshop (CSET)

For 16 years, the Workshop on Cyber Security Experimentation and Test (CSET) has been an important and lively space for discussing all-encompassing or “meta” cybersecurity topics related to reliability, validity, reproducibility, transferability, ethics, and scalability — in practice, in research, and in education. Submissions are particularly encouraged to employ a scientific approach to cybersecurity and demonstrably grow community resources.

"Key MITRE ATT&CK Techniques Used by Cyber Attackers"

"Key MITRE ATT&CK Techniques Used by Cyber Attackers"

A Red Canary report tracked the MITRE ATT&CK techniques adversaries used the most throughout 2023, finding that two new and notable entries jumped to the top ten: email forwarding rules and cloud accounts. Cloud account compromises are becoming more common as organizations adopt Software-as-a-Service (SaaS) for critical productivity applications such as email, file storage, and messaging, resulting in a large volume of data being stored in the cloud. Adversaries see just as much value in compromising cloud identities as they do in traditional endpoints.

Submitted by grigby1 CPVI on

"FCC Approves Cyber Labeling Program for IoT Devices"

"FCC Approves Cyber Labeling Program for IoT Devices"

The Federal Communications Commission (FCC) voted to establish a voluntary cybersecurity labeling program for Internet of Things (IoT) devices and other consumer-facing products that require an Internet connection. The vote is a component of the Biden administration's effort to place labels on smart devices to help consumers shop for products less vulnerable to cyberattacks. Smart products covered by the rule that meet specific cybersecurity standards will have a label similar to the ENERGY STAR label.

Submitted by grigby1 CPVI on

"Discontinued Security Plugins Expose Many WordPress Sites to Takeover"

"Discontinued Security Plugins Expose Many WordPress Sites to Takeover"

Security researchers at Defiant are warning that thousands of WordPress websites are potentially at risk of takeover due to a critical severity vulnerability in two MiniOrange plugins that were discontinued recently.  The two plugins, Malware Scanner and Web Application Firewall from MiniOrange were closed on March 7, two days after the critical flaw was reported to the maintainers.

Submitted by Adam Ekwall on

NSF Funded Undergraduate Computer Research in Cybersecurity and AI (UnCoRe-CyberAI)

NSF Funded Undergraduate Computer Research in Cybersecurity and AI (UnCoRe-CyberAI)

NSF Funded Undergraduate Computer Research in Cybersecurity and AI (UnCoRe-CyberAI)

Program Duration: 5/20/2024 ~ 7/26/2024
Application Deadline: 3/31/2024
Application Link: https://etap.nsf.gov/award/6667/opportunity/9110


Sharing this on behalf of Oakland University.

Please see and share the attached flyer for an NSF REU (research experience for undergraduates) program in Cybersecurity and AI at Oakland University.  A summary is below.

Submitted by Regan Williams on

"StopCrypt: Most Widely Distributed Ransomware Evolves to Evade Detection"

"StopCrypt: Most Widely Distributed Ransomware Evolves to Evade Detection"

StopCrypt ransomware, also known as STOP Djvu, has evolved with a new multi-stage execution process that better evades detection by security tools. It is the most widely distributed ransomware in existence, typically targeting consumers instead of businesses. The ransomware operation's goal is to generate tens of thousands of small $400 to $1,000 ransom payments rather than a single large multi-million-dollar demand. The ransomware is mainly distributed through malvertising and malicious websites that deliver adware bundles disguised as free software, game cheats, and software cracks.

Submitted by grigby1 CPVI on
Subscribe to