"Court Data Exposed by Vulnerabilities in Software Used by US Government: Researcher"

Cybersecurity researcher Jason Parker found that several e-filing and record management systems used by government organizations in the US were impacted by serious vulnerabilities, which exposed court records and other types of information. They were found in products used in Georgia, Florida, Ohio, Arizona, South Carolina, and other states. This article continues to discuss the vulnerabilities discovered in several e-filing and record management systems.

"Share of Women in UK Cyber Roles Now Just 17%"

"Share of Women in UK Cyber Roles Now Just 17%"

According to security researchers at Socura, cybersecurity is now the fastest-growing IT role in the UK, but the share of women in such positions has fallen dramatically since 2021.  The researchers claimed the number of security professionals has more than doubled since Jan-Dec 2021, from 28,500 to 65,000 in March 2024.  An increase of 128% makes it the fastest-growing of any IT-related profession over that period, followed by IT support (42%), IT trainers (33%), and IT business analysts, architects, and systems designers (33%).

Submitted by Adam Ekwall on

"CeranaKeeper Emerges as New Threat to Thai Government Networks"

"CeranaKeeper Emerges as New Threat to Thai Government Networks"

Security researchers at ESET have recently identified a new China-aligned threat group named CeranaKeeper, which is targeting governmental institutions in Thailand.  This group has been active since early 2022 and leverages an evolving toolset to exfiltrate sensitive data by abusing legitimate cloud services such as Dropbox, OneDrive, and GitHub.  While some of CeranaKeeper's tools were previously attributed to the Mustang Panda group, the researchers' new analysis revealed technical differences, suggesting these are distinct entities.

Submitted by Adam Ekwall on

"Crypto-Doubling Scams Surge Following Presidential Debate"

"Crypto-Doubling Scams Surge Following Presidential Debate"

Security researchers at Netcraft have warned of a new wave of investment scams attempting to cash in on public awareness of the presidential debate last month. The researchers found 24 such domains related to the debate, including 14 phishing sites using the word “debate” in their domain. Many of the websites exploit the image of Republican presidential nominee Donald Trump, tech entrepreneur and billionaire Elon Musk, or a blend of both. The researchers noted that criminals likely use these personas to add legitimacy to their crypto investment theme.

Submitted by Adam Ekwall on

CfP: 31st IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2025)

CfP: 31st IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2025)

RTAS is a top-tier conference with a focus on systems with timing requirements. RTAS’25 welcomes papers describing applications, case studies, methodologies, tools, algorithms or operating systems, middleware or hardware innovations that contribute to the state of the art in the design, implementation, validation, verification, and evolution of systems with timing requirements.
Submitted by Amy Karns on

31st IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2025)

Submitted by Amy Karns on

RTAS is a top-tier conference with a focus on systems with timing requirements. RTAS’25 welcomes papers describing applications, case studies, methodologies, tools, algorithms or operating systems, middleware or hardware innovations that contribute to the state of the art in the design, implementation, validation, verification, and evolution of systems with timing requirements.

"Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug"

"Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug"

Independent security researchers found a flaw in a web portal operated by the carmaker Kia that allowed them to track millions of cars, unlock doors, and start engines. The flaw discovered in the web portal enabled them to reassign control of most modern Kia vehicles' Internet-connected features, from the car owner's smartphone to their own phone or computer.

Submitted by Gregory Rigby on

"Python-Based Malware Slithers Into Systems via Legit VS Code"

"Python-Based Malware Slithers Into Systems via Legit VS Code"

"Mustang Panda," a Chinese Advanced Persistent Threat (APT) group, is suspected of being behind an ongoing sophisticated cyber espionage campaign. It involves malicious emails, and the use of Visual Studio Code (VS Code) to spread Python-based malware, which gives attackers persistent remote access to infected machines. The Cyble Research and Intelligence Lab (CRIL) discovered the campaign spreading a .lnk file posing as a legitimate setup file to download a Python distribution package. It is actually used to run a malicious Python script.

Submitted by Gregory Rigby on

"After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks"

"After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks"

Researchers at Akamai have found that the Common UNIX Printing System (CUPS) could be abused for large Distributed Denial-of-Service (DDoS) attacks following researcher Simone Margaritelli's warning regarding the system being vulnerable to unauthenticated Remote Code Execution (RCE). CUPS is an open source printing system based on the Internet Printing Protocol (IPP). It is mainly for Linux and UNIX-like operating systems. Margaritelli recently disclosed several unpatched CUPS vulnerabilities that, when chained together, can lead to RCE.

Submitted by Gregory Rigby on

"ACSC and CISA Launch Critical OT Cybersecurity Guidelines"

"ACSC and CISA Launch Critical OT Cybersecurity Guidelines"

The Australian Cyber Security Centre (ACSC) has released a new guide titled "Principles of Operational Technology Cybersecurity" in collaboration with US Cybersecurity and Infrastructure Security Agency (CISA) and international partners. The guide contains information for organizations looking to secure their Operational Technology (OT) environments in the critical infrastructure sectors. It delves into fundamental principles such as safety, data protection, network segmentation, and others to help organizations manage risks and protect against cyber threats their OT systems face.

Submitted by Gregory Rigby on
Subscribe to