"Georgia Tech's New Tool Can Detect Malware on Android Phones"

"Georgia Tech's New Tool Can Detect Malware on Android Phones"

Researchers at the Georgia Institute of Technology (Georgia Tech) have developed a new tool named "Detector of Victim-specific Accessibility" (DVa) to check for malware on Android phones. DVa runs on the cloud, checking the phone for malware, then producing a report for the user that outlines which apps are malware and how to remove them. Smartphones are accessible to people with disabilities because of the implementation of screen readers, voice-to-text, and other features. However, these features also make phones more hackable.

Submitted by Gregory Rigby on

"Juniper Networks Patches Dozens of Vulnerabilities"

"Juniper Networks Patches Dozens of Vulnerabilities"

Juniper Networks has recently released patches for dozens of vulnerabilities in its Junos OS and Junos OS Evolved network operating systems, including multiple flaws in several third-party software components. Fixes were announced for around a dozen high-severity security defects impacting components such as the packet forwarding engine (PFE), routing protocol daemon (RPD), routing engine (RE), kernel, and HTTP daemon.

Submitted by Adam Ekwall on

"OpenAI Confirms Threat Actors Use ChatGPT to Write Malware"

"OpenAI Confirms Threat Actors Use ChatGPT to Write Malware"

OpenAI disrupted over 20 malicious cyber operations involving ChatGPT, its Artificial Intelligence (AI)-driven chatbot. Threat actors have used ChatGPT to develop malware, evade detection, and more. OpenAI's report is the first to officially confirm that generative mainstream AI tools are being used for offensive cyber operations. In April, Proofpoint reported that "TA547," also known as "Scully Spider," launched an AI-written PowerShell loader for the "Rhadamanthys" infostealer.

Submitted by Gregory Rigby on

"US DOD Tightens Cybersecurity Standards for Defense Contractors"

"US DOD Tightens Cybersecurity Standards for Defense Contractors"

The finalization of the latest version of the Cybersecurity Maturity Model Certification (CMMC) program empowers US Department of Defense (DOD) officials to better assess cybersecurity measures implemented by defense contractors. Defense contractors must pass the program to bid on DOD contracts. The CMMC will verify that DOD's thousands of contractors comply with Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) protections. This article continues to discuss the evolution of the CMMC program.

Submitted by Gregory Rigby on

"Cyber Insurer Says Ransomware Attacks Drove a Spike in Claim Sizes"

"Cyber Insurer Says Ransomware Attacks Drove a Spike in Claim Sizes"

The cyber insurance provider Coalition reported that its customers made fewer claims in the first half of 2024 than in the same period in 2023, but their average loss increased by 14 percent to $122,000. According to the company, the rise in ransomware severity increased losses, and threat actors targeted larger businesses. This article continues to discuss findings regarding the rise in ransomware demands and claim sizes.

Submitted by Gregory Rigby on

"Pokémon Developer Game Freak Suffers Data Breach"

"Pokémon Developer Game Freak Suffers Data Breach"

Japanese game developer Game Freak, the firm behind the Pokémon franchise, has recently suffered a security breach exposing the data of 2606 employees and partners.  The leak first appeared on forum 4chan in early October and is now circulating on social media and online forums under the name "TeraLeak."  TeraLeak contains multiple gigabytes of information.

Submitted by Adam Ekwall on

"Casio Confirms Ransomware Outage and Data Breach"

"Casio Confirms Ransomware Outage and Data Breach"

Casio has recently revealed that some of its corporate systems and services are still damaged and personal information has been compromised, after a ransomware attack over a week ago.  The Japanese electronics giant said it was alerted to an unauthorized intrusion after a system failure on October 5 rendered several systems unusable.  The full extent of the damage is still under investigation, but the company has set up a task force and is currently working diligently to quickly restore internal systems and resume operations.

Submitted by Adam Ekwall on

"Penn State Leads $8.5M, Multi-Institution DARPA Project on Mixed-Reality Systems"

"Penn State Leads $8.5M, Multi-Institution DARPA Project on Mixed-Reality Systems"

Penn State researchers will lead a multi-institution project called "Verified Probabilistic Cognitive Reasoning for Tactical Mixed Reality Systems (VeriPro)" funded by the Defense Advanced Research Projects Agency (DARPA) to identify cognitive threats faced by Mixed Reality (MR) systems as part of the agency's "Intrinsic Cognitive Security" program. The project aims to model risks, human behaviors, and potential attacks and mitigations within MR systems.

Submitted by Gregory Rigby on

"Explore Cybersecurity Through Art at New Exhibition"

"Explore Cybersecurity Through Art at New Exhibition"

In a new art exhibition, Virginia researchers and artists challenge our cybersecurity perceptions. The Commonwealth Cyber Initiative (CCI)-funded "CyberArts 2024 Exhibit" includes projects from Blue Ridge Community College, George Mason University, James Madison University, Old Dominion University, Virginia Commonwealth University, and Virginia Tech. A project named "Hidden Within" delves into steganography, a practice that can be used in a cyberattack. It involves hiding a message within a digital picture or music.

Submitted by Gregory Rigby on
Subscribe to