Open Source Summit

"Open Source Summit is the premier event for open source developers, technologists, and community leaders to collaborate, share information, solve problems, and gain knowledge, furthering open source innovation and ensuring a sustainable open source ecosystem. It is the gathering place for open-source code and community contributors. Open Source Summit is a conference umbrella, composed of a collection of events covering the most important technologies, topics, and issues affecting open source today."

Southeast Cybersecurity Summit

"The purpose of the Summit is to strengthen and promote the internet security profession in the southeastern United States region. That goal is achieved through event activities which result in relationship building, information sharing, and ongoing education and training focused on current technology challenges and solutions."



 

#CS4CA: Cyber Security Summit USA

"As critical infrastructure continues its transition from analog to digital, the surface for cyber attacks has expanded and the resulting risks to an organization’s physical assets, people, financial liability, and reputation are increasing in frequency and potency.  With this in mind, the Cyber Security for Critical Assets Summit brings together senior cybersecurity leaders from across US critical infrastructure, for 2-days of in-depth knowledge exchange, strategy planning and insight building on March 26-27th 2024.

"SIM Swappers Hijacking Phone Numbers in eSIM Attacks"

"SIM Swappers Hijacking Phone Numbers in eSIM Attacks"

Subscriber Identity Module (SIM) swappers have changed their attacks to steal a target's phone number by porting it to a new Embedded SIM (eSIM) card, which is a digital SIM in a rewritable chip found in many modern smartphones. An eSIM is a digital card stored on the chip of a mobile device that performs the same functions as physical SIM cards but can be remotely reprogrammed and provisioned, as well as deactivated, swapped, and deleted.

Submitted by Gregory Rigby on

"ChatGPT Spills Secrets in Novel PoC Attack"

"ChatGPT Spills Secrets in Novel PoC Attack"

Researchers from Google DeepMind, Open AI, ETH Zurich, McGill University, and the University of Washington have developed a new attack that extracts key architectural information from proprietary Large Language Models (LLMs) such as ChatGPT and Google PaLM-2. The study shows how adversaries can extract supposedly hidden data from an LLM-enabled chatbot, allowing them to duplicate or steal its functionality. The attack is one of several highlighted in the past year that have delved into the security flaws of Artificial Intelligence (AI) technologies.

Submitted by Gregory Rigby on

"Only 13% of Medical Devices Support Endpoint Protection Agents"

"Only 13% of Medical Devices Support Endpoint Protection Agents"

According to Claroty, healthcare networks have been found to contain 63 percent of the Known Exploited Vulnerabilities (KEVs) tracked by the US Cybersecurity and Infrastructure Security Agency (CISA). Twenty-three percent of medical devices, including imaging devices, clinical Internet of Things (IoT) devices, and surgery devices, have at least one KEV.

Submitted by Gregory Rigby on

"French Employment Agency Data Breach Could Affect 43 Million People"

"French Employment Agency Data Breach Could Affect 43 Million People"

France’s Employment Agency recently suffered a data breach that could affect users who registered over the past 20 years, representing 43 million potential users’ data exposed.  France Travail, the French national employment agency, announced on March 13, 2024, that its IT systems and those of Cap Emploi, a government employment service that supports people with disabilities, were breached.

Submitted by Adam Ekwall on

"Nissan Data Breach Affects 100,000 Individuals"

"Nissan Data Breach Affects 100,000 Individuals"

Nissan Oceania recently announced that roughly 100,000 individuals were affected by a data breach resulting from a ransomware attack conducted by a known cybercrime group in late 2023.  Nissan said it detected an intrusion on December 5, 2023, and informed customers about a disruptive cyber incident the same day.  The attack impacted Nissan Motor Corporation and Nissan Financial Services in Australia and New Zealand.

Submitted by Adam Ekwall on

"Ineffable Cryptography: A New Approach to Cybersecurity for Critical Infrastructure"

"Ineffable Cryptography: A New Approach to Cybersecurity for Critical Infrastructure"

A team of mathematics researchers from RMIT University's Centre for Cyber Security Research and Innovation (CCSRI) collaborated with a tech startup called Tide Foundation to develop a breakthrough cybersecurity technology. The new technology, called "ineffable cryptography," enables data and devices to be locked with keys that no one will ever hold. It involves secretly generating and operating keys across a decentralized network of servers run by independent organizations. Only a part of a key is held by each server in the network.

Submitted by Gregory Rigby on

"VR Headsets Can Be Hacked With an Inception-Style Attack"

"VR Headsets Can Be Hacked With an Inception-Style Attack"

Researchers at the University of Chicago explored a security flaw in Meta's Quest Virtual Reality (VR) system that could enable hackers to hijack users' headsets, steal sensitive information, and manipulate social interactions. In the "inception attack," hackers develop an app that injects malicious code into the Meta Quest VR system. They then launch a clone of the VR system's home screen and apps, appearing identical to the user's original screen. When inside, attackers can monitor, record, and modify everything the user does with the headset.

Submitted by Gregory Rigby on
Subscribe to