"Researchers Undermine 'Windows Hello' on Lenovo, Dell, Surface Pro PCs"

"Researchers Undermine 'Windows Hello' on Lenovo, Dell, Surface Pro PCs"

Researchers have discovered a way to compromise three of the most commonly used fingerprint readers in today's PCs. With Microsoft's support, Blackwing Intelligence analysts attempted to circumvent the biometric security provided by a Dell Inspiron 15, a Lenovo ThinkPad T14, and the Microsoft Surface Pro 8/X.

Submitted by Gregory Rigby on

"General Electric Investigates Alleged DARPA Breach"

"General Electric Investigates Alleged DARPA Breach"

A prolific threat actor was recently spotted on the dark web selling what they claim to be sensitive information stolen from General Electric.  A threat actor, IntelBroker, is selling data stolen from the company on a popular dark web marketplace.  IntelBroker claimed that the data includes a lot of DARPA-related military information, files, SQL files, and documents.  The malicious actor also shared screenshots of some of the data to prove the information was authentic.  IntelBroker has a history of successful high-profile breaches to their name.

Submitted by Adam Ekwall on

"Released: AI Security Guidelines Backed by 18 Countries"

"Released: AI Security Guidelines Backed by 18 Countries"

The UK National Cyber Security Centre (NCSC) has published Artificial Intelligence (AI) cybersecurity guidelines developed with the help of the US Cybersecurity and Infrastructure Security Agency (CISA), similar agencies, CERTs from around the world, and industry experts. They hope to help developers and providers of AI-powered systems in building AI systems that work as intended, are available when needed, and do not reveal sensitive data to unauthorized parties.

Submitted by Gregory Rigby on

"KyberSwap Says Hackers Stole $55m in Crypto"

"KyberSwap Says Hackers Stole $55m in Crypto"

Decentralized exchange KyberSwap has recently become the latest crypto firm to lose millions to digital thieves.  The company revealed that a cyberattack took place on November 22, resulting in a loss of nearly $55m in users’ funds.  On November 22 at 10:54 PM UTC, attackers exploited KyberSwap Elastic smart contracts using a series of complex actions to conduct exploitative swaps, enabling the withdrawal of users’ funds into the attackers’ wallets.  Around $54.7m of users’ funds were exploited by the attackers.

Submitted by Adam Ekwall on

"185,000 Individuals Impacted by MOVEit Hack at Car Parts Giant AutoZone"

"185,000 Individuals Impacted by MOVEit Hack at Car Parts Giant AutoZone"

Car parts giant AutoZone, which has over 7,000 stores across the Americas, has recently informed nearly 185,000 individuals that their personal information was compromised as a result of the massive MOVEit hacking campaign.  AutoZone revealed that cybercriminals have stolen information, including social security numbers after exploiting a vulnerability in the MOVEit Transfer managed file transfer application.  However, the company is unaware of instances where the exposed information has been used for fraud.

Submitted by Adam Ekwall on

"Microsoft Launches Defender Bug Bounty Program"

"Microsoft Launches Defender Bug Bounty Program"

Microsoft has recently launched another bug bounty program, this time with the goal of making its Microsoft Defender-branded products and services more resilient to attack.  The Microsoft Defender Bounty Program will offer ethical hackers between $500 and $20,000 for significant vulnerabilities that have a direct and demonstrable impact on the security of their customers.  Microsoft noted that the largest sum for a novel vulnerability will go to researchers able to find critical remote code execution bugs and deliver a high-quality report.

Submitted by Adam Ekwall on

"Employee Policy Violations Cause 26% of Cyber Incidents"

"Employee Policy Violations Cause 26% of Cyber Incidents"

According to security researchers at Kaspersky, a substantial 26% of cyber incidents in businesses over the last two years are the result of intentional security protocol violations by employees.  This figure closely rivals the 20% attributed to external hacking attempts.  The researchers discovered that intentional policy violations by employees, spanning both IT and non-IT staff, played a significant role in cyber incidents.

Submitted by Adam Ekwall on

"Explainability in Cybersecurity Data Science"

"Explainability in Cybersecurity Data Science"

Cybersecurity is data-rich, making it an ideal setting for Machine Learning (ML), but many challenges impede ML deployment in cybersecurity systems and organizations. According to researchers from Carnegie Mellon University's Software Engineering Institute (SEI), one significant challenge is that the human-machine relationship is rooted in a lack of explainability. Cybersecurity data science has two directions of explainability: model-to-human and human-to-model.

Submitted by Gregory Rigby on

"UOW-Led Project Aims to Protect Drones from Cyber Attacks"

"UOW-Led Project Aims to Protect Drones from Cyber Attacks"

A project led by the University of Wollongong (UOW) to improve security measures for Unmanned Aerial Vehicles (UAVs), such as drones, against adversarial Machine Learning (ML) attacks has been funded by the Australian Research Council (ARC) Linkage Projects Scheme. The project is in alignment with the Australian Government's strategy to promote and protect critical and emerging technologies.

Submitted by Gregory Rigby on

"USTC Achieves Zero-knowledge Proof Based on Device-independent Quantum Random Number Beacon"

"USTC Achieves Zero-knowledge Proof Based on Device-independent Quantum Random Number Beacon"

Zero-Knowledge Proof (ZKP) is a cryptographic tool that enables the verification of validity between mutually untrusted parties without disclosing additional information. Non-Interactive Zero-Knowledge Proof (NIZKP) is a ZKP variant that does not require multiple information exchanges. Therefore, NIZKP is used in the digital signature, blockchain, and identity authentication fields. Since a true random number generator is challenging to implement, deterministic pseudorandom number algorithms are often used as a substitute, but this method has potential security vulnerabilities.

Submitted by Gregory Rigby on
Subscribe to