8th ACM/IEEE Symposium on Edge Computing (SEC)

"SEC is a forum for top researchers, engineers, students, entrepreneurs, and government officials come together under one roof to discuss the opportunities and challenges that arise from rethinking cloud computing architectures and embracing edge computing. SEC takes a broad view of edge computing and solicits contributions from many fields of systems practice that embrace any aspect of edge computing."

Topics of interest include, but are not limited to security and privacy.

24th ACM/IFIP International Middleware Conference

"The annual ACM/IFIP Middleware conference is a major forum for the discussion of innovations and recent scientific advances of middleware systems with a focus on the design, implementation, deployment, and evaluation of distributed systems, platforms and architectures for computing, storage, and communication."

Topics of interest include, but are not limited to security and privacy.

ACM-SIAM Symposium on Discrete Algorithms (SODA24)

"This symposium focuses on research topics related to design and analysis of efficient algorithms and data structures for discrete problems. The scope includes theoretical analysis, as well as experimental validation, and the mathematical problems related to their development or limitations. The scope also includes aspects of combinatorics and discrete mathematics related to discrete algorithms."

Topics of interest include, but are not limited to cryptography, security and privacy.

"Hackers Are Exploiting 'CitrixBleed' Bug in the Latest Wave of Mass Cyberattacks"

"Hackers Are Exploiting 'CitrixBleed' Bug in the Latest Wave of Mass Cyberattacks"

According to security researchers, hackers are mass-exploiting CitrixBleed, a critical-rated vulnerability in Citrix NetScaler systems, to launch cyberattacks against top organizations globally. These cyberattacks have targeted the aerospace giant Boeing, the world's largest bank ICBC, one of the world's largest port operators DP World, and the international law firm Allen & Overy. Thousands of other organizations are still unpatched against the vulnerability, tracked as CVE-2023-4966.

Submitted by Gregory Rigby on

"Crypto Asset Discovery and the Post-Quantum Migration"

"Crypto Asset Discovery and the Post-Quantum Migration"

Quantum computers are expected to break RSA and ECC encryption within the next 7 to 10 years. RSA and ECC are public key encryption algorithms that serve as the foundation for nearly all cybersecurity systems, applications, and protocols. They secure credit card transactions, online banking, medical devices, connected cars, and other systems. Therefore, companies must prepare to ensure they are protected once an adequately advanced quantum computer has been developed.

Submitted by Gregory Rigby on

"VMware Disclosed a Critical and Unpatched Authentication Bypass Flaw in VMware Cloud Director Appliance"

"VMware Disclosed a Critical and Unpatched Authentication Bypass Flaw in VMware Cloud Director Appliance"

VMware has disclosed an authentication bypass vulnerability in its Cloud Director Appliance, tracked as CVE-2023-34060 with a CVSS score of 9.8, that can be exploited by an attacker with network access to the appliance to bypass login restrictions when authenticating on port 22 (SSH) or port 5480 (Appliance Management Console). This bypass is not present on port 443 (VCD provider and tenant login). It is also not present on a new installation of Cloud Director Appliance 10.5.

Submitted by Gregory Rigby on

"Pharmacy Provider Truepill Data Breach Hits 2.3 Million Customers"

"Pharmacy Provider Truepill Data Breach Hits 2.3 Million Customers"

Postmeds, a company doing business as Truepill, is sending data breach notifications, informing recipients that threat actors have compromised their sensitive personal information. Truepill is a Business-to-Business (B2B) pharmacy platform that uses Application Programming Interfaces (APIs) to fulfill orders and service delivery for Direct-to-Consumer (D2C) brands, digital health companies, and other healthcare organizations across the US.

Submitted by Gregory Rigby on

"WP Fastest Cache Plugin Bug Exposes 600K WordPress Sites to Attacks"

"WP Fastest Cache Plugin Bug Exposes 600K WordPress Sites to Attacks"

It has recently been discovered that the WordPress plugin WP Fastest Cache is vulnerable to an SQL injection vulnerability that could allow unauthenticated attackers to read the contents of the site’s database.  WP Fastest Cache is a caching plugin used to speed up page loads, improve visitor experience, and boost the site’s ranking on Google search.  According to WordPress.org stats, it is used by more than a million sites.

Submitted by Adam Ekwall on

"Reptar: New Intel CPU Vulnerability Impacts Multi-Tenant Virtualized Environments"

"Reptar: New Intel CPU Vulnerability Impacts Multi-Tenant Virtualized Environments"

Intel has addressed a high severity flaw called Reptar that affects its desktop, mobile, and server CPUs. The vulnerability, tracked as CVE-2023-23583 with a CVSS score of 8.8, can enable privilege escalation, information disclosure, and/or Denial-of-Service (DoS) via local access. According to Google Cloud, the successful exploitation of the vulnerability could also allow a bypass of the CPU's security boundaries. It is caused by how redundant prefixes are interpreted by the processor.

Submitted by Gregory Rigby on

"US Announces IPStorm Botnet Takedown and Its Creator’s Guilty Plea"

"US Announces IPStorm Botnet Takedown and Its Creator’s Guilty Plea"

The US government recently announced the takedown of the IPStorm botnet and the guilty plea of a man who created and operated the cybercrime service.  According to the Department of Justice (DoJ), the FBI dismantled the infrastructure associated with the IPStorm malware and the proxy network powered by the IPStorm botnet.  The malware was delivered to thousands of Windows, Linux, Mac, and Android devices worldwide, enabling cybercriminals to use the compromised devices for a proxy service.

Submitted by Adam Ekwall on
Subscribe to