"Exploitation Accounts For 29% of Education Sector Attacks"

"Exploitation Accounts For 29% of Education Sector Attacks"

In a new report, security researchers at Critical Start claimed that the education sector is a prime target for threat actors, with 29% of attacks originating from vulnerability exploitation and 30% from phishing campaigns on K-12 schools in 2023.  Another key finding by the researchers is the increasing use of Quick Response (QR) codes in phishing attacks.  The researchers noted that in these attacks, cybercriminals disguise themselves as Microsoft security notifications and embed QR codes within PNG images or PDF attachments to deceive victims.

Submitted by Adam Ekwall on

"One-Click 'GNOME' Exploit Is a Supply Chain Risk for Linux OSes"

"One-Click 'GNOME' Exploit Is a Supply Chain Risk for Linux OSes"

Researchers have discovered a security flaw in a library within the GNU Object Model Environment (GNOME) for Linux systems. If embedded in a malicious link, the vulnerability could allow instantaneous machine takeover by attackers. GNOME is an open-source desktop environment used by popular Linux distributions such as Ubuntu and Fedora. According to GitHub Security Lab, one of the default GNOME applications contains a dependency with an out-of-bounds array access vulnerability rated "High" (8.8 out of 10) in severity.

Submitted by Gregory Rigby on

"It's Time to Treat Satellites as Critical Infrastructure"

"It's Time to Treat Satellites as Critical Infrastructure"

Satellite hacking could result in massive disruptions to communications, transportation, and weather forecasts, as well as the loss of sensitive data. Last February, Russia-linked hackers launched destructive malware against the American satellite provider Viasat an hour before the invasion of Ukraine. SpaceX's Starlink satellite also encountered interference from signal jamming, thus limiting bandwidth. As demonstrated at last year's Black Hat conference, a researcher created a tool to hack into Starlink for only $25.

Submitted by Gregory Rigby on

"CMU's Synergy Lab Presents Multiple Papers on Ubiquitous Sensing at UbiComp"

"CMU's Synergy Lab Presents Multiple Papers on Ubiquitous Sensing at UbiComp"

Researchers from the Systems, Networking, and Energy Efficiency (Synergy) Lab at Carnegie Mellon University (CMU) are presenting several multi-year studies on their work regarding ubiquitous sensing at the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp). The Synergy Lab, led by School of Computer Science Associate Professor Yuvraj Agarwal, focuses on developing more energy-efficient computing in buildings, improving the security and privacy of Internet of Things (IoT) devices, and advancing mobile systems.

Submitted by Gregory Rigby on

"Air Europa Data Breach: Customers Warned to Cancel Credit Cards"

"Air Europa Data Breach: Customers Warned to Cancel Credit Cards"

Spanish airline Air Europa, the country's third-largest airline and a member of the SkyTeam alliance, recently warned customers to cancel their credit cards after attackers accessed their card information in a recent data breach.  The credit card details exposed in the breach include card numbers, expiration dates, and the 3-digit CVV (Card Verification Value) code on the back of the payment cards.

Submitted by Adam Ekwall on

"NSA and US Agencies Issue Best Practices for Open-Source Software in Operational Technology Environments"

"NSA and US Agencies Issue Best Practices for Open-Source Software in Operational Technology Environments"

The National Security Agency (NSA) and US federal partners have released cybersecurity guidance to promote understanding Open-Source Software (OSS) implementation and to provide best practices for securing Operational Technology (OT) and Industrial Control Systems (ICS) environments.

Submitted by Gregory Rigby on

41st IEEE International Conference on Computer Design

"ICCD encompasses a wide range of topics in the research, design, and implementation of computer systems and their components. ICCD’s multi-disciplinary emphasis provides an ideal environment for developers and researchers to discuss practical and theoretical work covering systems and applications, computer architecture, verification and test, design tools and methodologies, circuit design, and technology."

Topics include, but are not limited to security.

2023 6th IEEE Conference on Dependable and Secure Computing (IEEE DSC 2023)

"The IEEE Conference on Dependable and Secure Computing solicits papers, posters, practices, and experiences for presenting innovative research results, problem solutions, and new challenges in the field of dependable and secure computing. The whole spectrum of IT systems and application areas, including hardware design and software systems, with stringent relevance to dependability and security concerns, are of interest to DSC.

2023 International Defense Excellence and Security Symposium (IDEaS)

"The International Defence and Security (IDEaS) Symposium is an Annual Event that brings together participants in innovation ecosystems from Defence, Industry and Academia to exchange ideas and information and to foster connections and collaborations among Military operations, Defence decision-makers, Academic researchers and Industry capability developers.

2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)

"The IEEE TrustCom-2023 is a forum for presenting leading works on trusted computing and communications, with regard to trust, security, privacy, reliability, dependability, survivability, availability, and fault tolerance aspects of computer systems and networks."

Subscribe to