"Catching The Man-in-the-Middle"

"Catching The Man-in-the-Middle"

Dr. Santosh Ganji, a computer engineering doctoral graduate, and Dr. P.R. Kumar, a Department of Electrical and Computer Engineering professor at Texas A&M University, are working on improving wireless network security. When two entities communicate wirelessly, it is difficult to determine whether a Man-in-the-Middle (MitM) is present. Kumar and Ganji have discovered how to flush out the MitM using a timing-based protocol called REVEAL, which overloads the MitM with messages and causes it to fail.

Submitted by Gregory Rigby on

"Cybersecurity Spending Expected to be Slashed in 41% of SMEs"

"Cybersecurity Spending Expected to be Slashed in 41% of SMEs"

According to security researchers at JumpCloud, cybersecurity spending is predicted to be cut by 41% of SMEs over the coming year amid the challenging economic environment.  Nearly three-quarters (72%) of IT admins surveyed in the US, UK, and India agreed that any cuts to their security budgets would increase organizational risk.  The researchers noted that SMEs in India were most likely to experience cybersecurity cuts (58%).  This was followed by the US (40%) and UK (25%).

Submitted by Adam Ekwall on

"How Are State-Sponsored Threat Actors Leveraging AI?"

"How Are State-Sponsored Threat Actors Leveraging AI?"

Microsoft and OpenAI have pointed out the different ways in which state-sponsored threat actors have attempted to use Large Language Models (LLMs) to improve their cyber operations. Threat actors, like defenders, are using Artificial Intelligence (AI), specifically LLMs, to increase efficiency. For example, the Iranian threat actor called Crimson Sandstorm, also known as CURIUM, has used LLMs to get help with social engineering, error troubleshooting, code development, and more.

Submitted by Gregory Rigby on

12th Annual Best Scientific Cybersecurity Paper Competition

12th Annual Best Scientific Cybersecurity Paper Competition

Nominations are now open for the 12th Annual Best Scientific Cybersecurity Paper Competition. The National Security Agency (NSA) welcomes nominations of papers published in 2023 in peer-reviewed journals and technical conferences that show an outstanding contribution to cybersecurity science. Winners will be announced at the end of 2024.

Submitted by Gregory Rigby on

"German Battery Maker Varta Halts Production After Cyberattack"

"German Battery Maker Varta Halts Production After Cyberattack"

Battery maker VARTA AG was recently targeted by a cyberattack that forced it to shut down IT systems, causing production to stop at its plants.  VARTA is a German manufacturer of batteries for the automotive, consumer, and industrial sectors, partially owned by Energizer Holdings.  VARTA's annual revenue exceeds $875 million.  The company announced that hackers targeted parts of its IT infrastructure on the night of February 12th, causing a severe disruption in five production units.

Submitted by Adam Ekwall on

"Just One Bad Packet Can Bring down a Vulnerable DNS Server Thanks to DNSSEC"

"Just One Bad Packet Can Bring down a Vulnerable DNS Server Thanks to DNSSEC"

Through the exploitation of a 20-year-old design flaw dubbed KeyTrap in the DNSSEC specification, one packet can exhaust a vulnerable DNS server's processing capacity, effectively disabling the machine. According to the researchers who uncovered this flaw, associated with the German National Research Center for Applied Cybersecurity (ATHENE) in Darmstadt, DNS server software makers briefed on the vulnerability described it as the worst DNS attack ever discovered. The KeyTrap security flaw, tracked as CVE-2023-50387, has received a CVSS severity rating of 7.5 out of 10.

Submitted by Gregory Rigby on

"NSA Awards Authors of Study of Automated Attacks on New Webservers"

"NSA Awards Authors of Study of Automated Attacks on New Webservers"

The National Security Agency (NSA) Research Directorate selected "Uninvited Guests: Analyzing the Identity and Behavior of Certificate Transparency Bots" as the 11th Annual Best Scientific Cybersecurity Paper Competition winner. The winning paper by Stony Brook University researchers looked into automated attacks on new webservers and how a web browser can trust an organization's publicly available cryptographic credentials.

Submitted by Gregory Rigby on

"Zoom Patches Critical Vulnerability in Windows Applications"

"Zoom Patches Critical Vulnerability in Windows Applications"

Video messaging giant Zoom recently announced patches for seven vulnerabilities in its desktop and mobile applications, including a critical severity bug in Windows software.  The critical issue tracked as CVE-2024-24691 (CVSS score of 9.6) is described as an improper input validation that could allow an attacker with network access to escalate privileges.

Submitted by Adam Ekwall on

"Computer Science Ph.D. Student Awarded Prestigious Best Paper Award at IEEE Conference"

"Computer Science Ph.D. Student Awarded Prestigious Best Paper Award at IEEE Conference"

A student at Oklahoma State University received the Best Paper Award at the Institute of Electrical and Electronics Engineers (IEEE) Consumer Communications and Networking Conference for his paper, "A Lightweight Aggregate Authentication Protocol For Internet of Drones." Image Bhattarai's motivation behind this paper stemmed from an interest in data privacy and the identification of a gap in existing knowledge regarding lightweight authentication for drones.

Submitted by Gregory Rigby on

"SAP Patches Critical Vulnerability Exposing User, Business Data"

"SAP Patches Critical Vulnerability Exposing User, Business Data"

Enterprise software maker SAP has recently announced the release of 13 new and three updated security notes as part of its February 2024 Security Patch Day, including one addressing a critical vulnerability in the SAP ABA cross-application component.  The critical issue, a code injection bug tracked as CVE-2024-22131 (CVSS score of 9.1), could be exploited by an attacker with remote execution authorization to use a vulnerable interface to invoke an application function and perform actions without permission.

Submitted by Adam Ekwall on
Subscribe to