"Seeking the Biometric Bill of Rights"

"Seeking the Biometric Bill of Rights"

Katina Michael, a professor in the School for the Future of Innovation in Society and School of Computing and Augmented Intelligence at Arizona State University, calls for better measures to secure sensitive biometric data. Biometric data refers to the unique physical characteristics of a person, including voice, fingerprint, palm, face, and DNA. Such data can help hackers carry out cybercriminal activities. This article continues to discuss Michael's insights and recommendations regarding cybersecurity and privacy for biometrics.

Submitted by Gregory Rigby on

Policy Analytics for Cybersecurity of Cyber-Physical Systems Compilation

Policy Analytics for Cybersecurity of Cyber-Physical Systems 

Compilation by Nazli Choucri (Professor of Political Science) and Jerome Anaya (Research Assistant). 

This complication is a Report of the MIT Project on Policy analytics for Cybersecurity of Cyber-Physical Systems. Gaurav Agarwal [a.k.a. Gaurav], MIT alumnus, served as Lead researcher for the Proof-of-Concept case presented here. 

October 2024

"Notable Post-Quantum Cryptography Initiatives Paving the Way Toward Q-Day"

"Notable Post-Quantum Cryptography Initiatives Paving the Way Toward Q-Day"

"Q-Day," when quantum computers can break existing cryptographic algorithms, is predicted to happen within the next decade, leaving digital information vulnerable under current encryption protocols. Post-Quantum Cryptography (PQC) is one of the top priorities for the security community as it works to build and implement encryption capable of withstanding post-quantum threats and attacks. This article continues to discuss the latest efforts aimed at helping with the creation, development, and migration to PQC.

Submitted by Gregory Rigby on

"Gamers Tricked Into Downloading Lua-Based Malware via Fake Cheating Script Engines"

"Gamers Tricked Into Downloading Lua-Based Malware via Fake Cheating Script Engines"

Users looking for game cheats are being tricked into downloading Lua-based malware that can establish persistence on infected systems and deliver additional payloads. Morphisec researcher Shmuel Uzan explained that these attacks take advantage of the popularity of Lua gaming engine supplements. This malware strain is widely distributed throughout North America, South America, Europe, Asia, and Australia. This article continues to discuss the delivery of Lua-based malware through fake cheating script engines.

Submitted by Gregory Rigby on

"Websites Are Losing the Fight Against Bot Attacks"

"Websites Are Losing the Fight Against Bot Attacks"

DataDome's "2024 Global Bot Security Report" found that 95 percent of advanced bot attacks go undetected, emphasizing the need for better detection and mitigation strategies. Some organizations may have basic defenses but need to prepare for more sophisticated attacks involving Artificial Intelligence (AI) and Machine Learning (ML). Recent statistics show that organizations must prioritize and strengthen security against bot attacks. According to DataDome, 65 percent of websites are vulnerable to bot attacks. This article continues to discuss recent findings regarding bot attacks.

Submitted by Gregory Rigby on

"European Government Air-Gapped Systems Breached Using Custom Malware"

"European Government Air-Gapped Systems Breached Using Custom Malware"

"GoldenJackal," an Advanced Persistent Threat (APT) hacking group, successfully breached air-gapped government systems in Europe. The APT group used two custom toolsets to steal sensitive data such as emails, encryption keys, images, archives, and documents. According to ESET, this occurred at least twice against the embassy of a South Asian country in Belarus and a European government organization. This article continues to discuss new findings regarding GoldenJackal's attacks on air-gapped government systems. 

Submitted by Gregory Rigby on

"Phishing Attacks Armed With AI Capabilities Are on the Rise"

"Phishing Attacks Armed With AI Capabilities Are on the Rise"

According to the security vendor Egress, phishing attempts increased 28 percent in the second quarter of the year as threat actors gained new tools. An analysis of phishing kits offered for sale on the dark web found that 75 percent advertised Artificial Intelligence (AI) capability. This article continues to discuss findings regarding the rise in phishing attacks.

SC Media reports "Phishing Attacks Armed With AI Capabilities Are on the Rise"

Submitted by grigby1

Submitted by Gregory Rigby on

"Cloud Security Risks Surge as 38% of Firms Face Exposures"

"Cloud Security Risks Surge as 38% of Firms Face Exposures"

The 2024 "Tenable Cloud Risk Report" found that 38 percent of organizations worldwide face critical exposures due to a mix of security gaps in modern cloud environments. The report identified a "toxic cloud triad" of publicly exposed, critically vulnerable, and highly privileged cloud workloads that put these companies at risk. This triad makes them vulnerable to cyberattacks that could disrupt applications, take over systems, and steal data. This article continues to discuss key findings regarding cloud security risks.

Submitted by Gregory Rigby on

"Ukrainian Pleads Guilty to Running Raccoon Infostealer Malware, Agrees to Pay Nearly $1 Million"

"Ukrainian Pleads Guilty to Running Raccoon Infostealer Malware, Agrees to Pay Nearly $1 Million"

According to the US Department of Justice (DoJ), a Ukrainian national named Mark Sokolovsky pleaded guilty to operating the "Raccoon Infostealer" malware in US federal court. Sokolovsky was previously accused of being one of the "key administrators" of the malware that steals email addresses, ID numbers, bank account details, and cryptocurrency information. Raccoon Infostealer was sold as Malware-as-a-Service (MaaS) for $200 per month in cryptocurrency. This article continues to discuss the Raccoon Infostealer malware and the Ukrainian national who has pleaded guilty to running it.

Submitted by Gregory Rigby on

"Healthcare Organizations Warned of Trinity Ransomware Attacks"

"Healthcare Organizations Warned of Trinity Ransomware Attacks"

The US Department of Health and Human Services (HHS) warns of "Trinity" ransomware attacks on healthcare and public health organizations. HHS notes that Trinity, a relatively new ransomware family first seen in May 2024, adds the '.trinitylock' extension to encrypted files. It has similarities to "2023Lock" and "Venus" ransomware. This article continues to discuss the Trinity ransomware attacks faced by the healthcare sector.  

Submitted by Gregory Rigby on
Subscribe to