"Preparing Neurodivergent Learners for Cybersecurity Careers"

"Preparing Neurodivergent Learners for Cybersecurity Careers"

Researchers at the University of Missouri are developing a Virtual Reality (VR) platform named "USucceed" to help teach cybersecurity to people with autism, dyslexia, attention deficit disorders, and other neurodevelopmental differences. Noah Glaser, an assistant professor and director of the Information Experience Laboratory in Mizzou's College of Education and Human Development, explained that the platform serves two critical functions, the first of which aims to meet the growing demand for a skilled cybersecurity workforce.

Submitted by Gregory Rigby on

"Identifying What's 'Not Normal' Could Help Protect Electric Power Systems"

"Identifying What's 'Not Normal' Could Help Protect Electric Power Systems"

Cybersecurity researchers at the Georgia Institute of Technology (Georgia Tech) seek to identify "abnormal" and "illogical" control system commands suggesting the presence of insider threats or malicious attackers. They are doing so by gaining further insight into what are considered "normal" operations within electric power systems. Understanding normal operations and detecting suspicious activities will rely on using Artificial Intelligence (AI) to understand what the complex grid systems usually do and to identify actions that logically should not happen.

Submitted by Gregory Rigby on

"College of Education Researchers to Integrate Cybersecurity with Math, Science Lessons through $2 Million Grant-funded Project"

"College of Education Researchers to Integrate Cybersecurity with Math, Science Lessons through $2 Million Grant-funded Project"

Researchers at North Carolina State University are conducting a project to raise awareness among young students about the safety risks that come with being online, as well as prepare elementary school teachers to teach cybersecurity topics. The project, funded by a National Science Foundation (NSF) DRK-12 grant and conducted in collaboration with the University of Delaware, will develop and test a professional development program that will support teachers in integrating cybersecurity lessons into fourth and fifth-grade math and science instruction.

Submitted by Gregory Rigby on

"For Just $20, Researchers Seize Part of Internet Infrastructure"

"For Just $20, Researchers Seize Part of Internet Infrastructure"

Researchers at watchTowr showed the ability to seize part of the Internet's infrastructure for just $20, bringing attention to the fragility of the trust and cybersecurity mechanisms that organizations and users depend on. While looking for Remote Code Execution (RCE) vulnerabilities in WHOIS clients, the researchers found that the WHOIS server for the .mobi Top Level Domain (TLD) (for mobile-optimized sites) had migrated years ago from "whois.dotmobiregistry.net" to "whois.nic.mobi".

Submitted by Gregory Rigby on

"Apple Patches Vision Pro Vulnerability to Prevent GAZEploit Attacks"

"Apple Patches Vision Pro Vulnerability to Prevent GAZEploit Attacks"

Apple has patched its Vision Pro Mixed Reality (MR) headset after researchers showed that an attacker could track a user's eyes to infer what they are typing. Vision Pro users can type by using a virtual keyboard and looking at each of the keys they want to press. "GAZEploit," an attack method shown by a team of researchers from the University of Florida and Texas Tech University, can be used to guess what a Vision Pro user is typing by tracking their avatar's eye movement. This article continues to discuss Apple's patching of Vision Pro following researchers' GAZEploit demonstration.

Submitted by Gregory Rigby on

"TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud"

"TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud"

Researchers at Cleafy found a new variant of the Android banking trojan called "TrickMo" that can evade analysis and display fake login screens to steal victims' banking credentials. According to Cleafy, the new capabilities involve using malformed ZIP files together with JSONPacker. The application is installed via a dropper app with the same anti-analysis mechanisms. This article continues to discuss findings regarding the new variant of TrickMo.

Submitted by Gregory Rigby on

"Socially Savvy Scattered Spider Traps Cloud Admins in Web"

"Socially Savvy Scattered Spider Traps Cloud Admins in Web"

One of the most dangerous ransomware groups, "Scattered Spider," has been using its clever social engineering approach to launch targeted, sophisticated phishing attacks against financial and insurance companies to steal high-level cloud permissions and deliver ransomware. Scattered Spider has been conducting smishing and vishing attacks to target the accounts of Information Technology (IT) service desk administrators and other high-privileged accounts.

Submitted by Gregory Rigby on

"House Report Shows Chinese Cranes a Security Risk to US Ports"

"House Report Shows Chinese Cranes a Security Risk to US Ports"

According to the Select Committee on the Chinese Communist Party (CCP) and House Committee on Homeland Security, US seaports are dangerously dependent on Chinese cranes, which could threaten US port infrastructure security. A new joint report by the two committees focuses on Shanghai Zhenhua Heavy Industries (ZPMC), a company owned and controlled by the People's Republic of China (PRC) that operates about 80 percent of US Ship-to-Shore (STS) port cranes.

Submitted by Gregory Rigby on

"Record $65m Settlement for Hacked Patient Photos"

"Record $65m Settlement for Hacked Patient Photos"

A record $65 million settlement was reached for a Pennsylvania healthcare company's medical record hack, which affected hundreds of patients and employees. The case involved about 135,000 patients and employees of the Pennsylvania-based independent healthcare network Lehigh Valley Health Network (LVHN). LVHN's data breach exposed 600 patients' and employees' medical records and Personally Identifiable Information (PII). The exposed data included addresses, email addresses, birthdates, Social Security numbers, passport information, medical data, and nude patient photos.

Submitted by Gregory Rigby on

"New 'Hadooken' Linux Malware Targets WebLogic Servers"

"New 'Hadooken' Linux Malware Targets WebLogic Servers"

Aqua Security's Nautilus research team warns that "Hadooken" Linux malware has been targeting Oracle WebLogic servers to launch additional malware and steal credentials for lateral movement. The malware is used in attacks that exploit weak passwords for initial access. After compromising a WebLogic server, the attackers downloaded shell and Python scripts to fetch and run the malware. This article continues to discuss findings regarding the Hadooken malware targeting Oracle WebLogic applications and its link to multiple ransomware families.

Submitted by Gregory Rigby on
Subscribe to