"Signal Jamming Defense Not up to the Task? These Researchers Have a Solution"

"Signal Jamming Defense Not up to the Task? These Researchers Have a Solution"

As growing and maturing data services demand faster Internet speeds and operating systems call for better security, hackers and adversaries continue to interfere. For some, this involves infiltrating home and office wireless networks to steal personal or business information. These attackers often use high-powered signal jamming devices, which are wireless portable devices that impede devices' communication with each other. These jammers also serve as a defense for users trying to avoid these attacks.

Submitted by Gregory Rigby on

"What's Wrong With This Picture? NIST Face Analysis Program Helps to Find Answers"

"What's Wrong With This Picture? NIST Face Analysis Program Helps to Find Answers"

Face recognition software is often implemented to gatekeep access to secure websites and electronic devices. Researchers are looking into the possibility of defeating it simply by wearing a mask resembling another person's face. The National Institute of Standards and Technology (NIST) recently published research on software designed to detect this type of spoof attack. The new study is published alongside another that evaluates the ability of software to identify potential issues with a photograph or digital facial image, such as one captured for a passport.

Submitted by Gregory Rigby on

"Professor to Continue Work Developing Automated Security Policies"

"Professor to Continue Work Developing Automated Security Policies"

Vijay Atluri, a Rutgers University professor, received a grant supporting her research on information security, particularly on how protection can be enabled automatically based on user credentials and the types of resources that require protection. Her project titled "Generating Machine-Enforceable Security Policies from Natural Language Text" aims to identify certain policy sentences, convert them into attribute-based access control rules, and then generate code that can be used to automatically enforce the rules.

Submitted by Gregory Rigby on

"Russian State Hackers Attempted to Block Ukrainians From Opening US Bank Accounts"

"Russian State Hackers Attempted to Block Ukrainians From Opening US Bank Accounts"

During two weeks in March 2022, 95 percent of the accounts opened at major US banks were fraudulently created. According to Rachel Wilson, managing director and head of cybersecurity for Morgan Stanley's Wealth Management division, many were created by Russian state hackers who conducted a Denial-of-Service (DoS) attack to block Ukrainian war refugees from transferring their money to American financial institutions.

Submitted by Gregory Rigby on

"National Security Agency is Starting an Artificial Intelligence Security Center"

"National Security Agency is Starting an Artificial Intelligence Security Center"

The National Security Agency has announced that it is starting an artificial intelligence security center.  Army Gen. Paul Nakasone said the center would be incorporated into the NSA’s Cybersecurity Collaboration Center, where it works with private industry and international partners to harden the U.S. defense-industrial base against threats from adversaries led by China and Russia.

Submitted by Adam Ekwall on

"MOVEit Maker Warns of New Critical Bug Affecting Thousands"

"MOVEit Maker Warns of New Critical Bug Affecting Thousands"

Progress Software, the maker of the MOVEit Transfer tool that hackers exploited to compromise thousands of businesses, has announced that its WS_FTP Server software requires a patch for a critical flaw. The company recently disclosed vulnerabilities impacting the interface and Ad Hoc Transfer module of the WS_FTP Server secure file transfer software. Progress Software's advisory notes that attackers could exploit a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.

Submitted by Gregory Rigby on

"Censys Reveals Open Directories Share More Than 2,000 TB of Unprotected Data"

"Censys Reveals Open Directories Share More Than 2,000 TB of Unprotected Data"

Open directories pose a significant security threat to organizations as they could leak sensitive data, intellectual property, or technical data that may enable an attacker to compromise an entire system. According to new research from the Internet intelligence platform, Censys, over 2,000 TB of unprotected data, including complete databases and documents, is currently accessible in open directories globally.

Submitted by Gregory Rigby on

"FBI: Dual Ransomware Attack Victims Now Get Hit Within 48 Hours"

"FBI: Dual Ransomware Attack Victims Now Get Hit Within 48 Hours"

The FBI has issued a warning regarding a new trend of ransomware attacks in which multiple strains are launched on victims' networks to encrypt systems in less than two days. The FBI issued a Private Industry Notification in response to trends observed in July 2023. The federal law enforcement agency explains that ransomware affiliates and operators have been observed targeting victim organizations with two different variants. AvosLocker, Diamond, Hive, Karakurt, LockBit, and Quantum are some of the variants used in these dual ransomware attacks.

Submitted by Gregory Rigby on

"Phishing, Smishing Surge Targets US Postal Service"

"Phishing, Smishing Surge Targets US Postal Service"

Security researchers at DomainTools have witnessed a significant increase in cyberattacks targeting the US Postal Service (USPS), mainly through phishing and smishing campaigns.  One smishing message raised suspicions due to its peculiar language, suggesting the involvement of a non-native English speaker or reliance on translation services.  The researchers traced a domain marked with a high-risk score, leading to the discovery of 163 related domains associated with email addresses following a familiar naming convention.

Submitted by Adam Ekwall on

"Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm"

"Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm"

The Lazarus Group has been linked to a cyber espionage attack against an unnamed aerospace company in Spain. The threat actor posed as a recruiter for Meta and approached the company's employees. Peter Kálnai, an ESET security researcher, explained that employees of the targeted company were contacted by a fake recruiter via LinkedIn and tricked into opening a malicious executable file disguised as a coding challenge or quiz.

Submitted by Gregory Rigby on
Subscribe to