"College of Education Researchers to Integrate Cybersecurity with Math, Science Lessons through $2 Million Grant-funded Project"

"College of Education Researchers to Integrate Cybersecurity with Math, Science Lessons through $2 Million Grant-funded Project"

Researchers at North Carolina State University are conducting a project to raise awareness among young students about the safety risks that come with being online, as well as prepare elementary school teachers to teach cybersecurity topics. The project, funded by a National Science Foundation (NSF) DRK-12 grant and conducted in collaboration with the University of Delaware, will develop and test a professional development program that will support teachers in integrating cybersecurity lessons into fourth and fifth-grade math and science instruction.

Submitted by Gregory Rigby on

"For Just $20, Researchers Seize Part of Internet Infrastructure"

"For Just $20, Researchers Seize Part of Internet Infrastructure"

Researchers at watchTowr showed the ability to seize part of the Internet's infrastructure for just $20, bringing attention to the fragility of the trust and cybersecurity mechanisms that organizations and users depend on. While looking for Remote Code Execution (RCE) vulnerabilities in WHOIS clients, the researchers found that the WHOIS server for the .mobi Top Level Domain (TLD) (for mobile-optimized sites) had migrated years ago from "whois.dotmobiregistry.net" to "whois.nic.mobi".

Submitted by Gregory Rigby on

"Apple Patches Vision Pro Vulnerability to Prevent GAZEploit Attacks"

"Apple Patches Vision Pro Vulnerability to Prevent GAZEploit Attacks"

Apple has patched its Vision Pro Mixed Reality (MR) headset after researchers showed that an attacker could track a user's eyes to infer what they are typing. Vision Pro users can type by using a virtual keyboard and looking at each of the keys they want to press. "GAZEploit," an attack method shown by a team of researchers from the University of Florida and Texas Tech University, can be used to guess what a Vision Pro user is typing by tracking their avatar's eye movement. This article continues to discuss Apple's patching of Vision Pro following researchers' GAZEploit demonstration.

Submitted by Gregory Rigby on

"TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud"

"TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud"

Researchers at Cleafy found a new variant of the Android banking trojan called "TrickMo" that can evade analysis and display fake login screens to steal victims' banking credentials. According to Cleafy, the new capabilities involve using malformed ZIP files together with JSONPacker. The application is installed via a dropper app with the same anti-analysis mechanisms. This article continues to discuss findings regarding the new variant of TrickMo.

Submitted by Gregory Rigby on

"Socially Savvy Scattered Spider Traps Cloud Admins in Web"

"Socially Savvy Scattered Spider Traps Cloud Admins in Web"

One of the most dangerous ransomware groups, "Scattered Spider," has been using its clever social engineering approach to launch targeted, sophisticated phishing attacks against financial and insurance companies to steal high-level cloud permissions and deliver ransomware. Scattered Spider has been conducting smishing and vishing attacks to target the accounts of Information Technology (IT) service desk administrators and other high-privileged accounts.

Submitted by Gregory Rigby on

"House Report Shows Chinese Cranes a Security Risk to US Ports"

"House Report Shows Chinese Cranes a Security Risk to US Ports"

According to the Select Committee on the Chinese Communist Party (CCP) and House Committee on Homeland Security, US seaports are dangerously dependent on Chinese cranes, which could threaten US port infrastructure security. A new joint report by the two committees focuses on Shanghai Zhenhua Heavy Industries (ZPMC), a company owned and controlled by the People's Republic of China (PRC) that operates about 80 percent of US Ship-to-Shore (STS) port cranes.

Submitted by Gregory Rigby on

"Record $65m Settlement for Hacked Patient Photos"

"Record $65m Settlement for Hacked Patient Photos"

A record $65 million settlement was reached for a Pennsylvania healthcare company's medical record hack, which affected hundreds of patients and employees. The case involved about 135,000 patients and employees of the Pennsylvania-based independent healthcare network Lehigh Valley Health Network (LVHN). LVHN's data breach exposed 600 patients' and employees' medical records and Personally Identifiable Information (PII). The exposed data included addresses, email addresses, birthdates, Social Security numbers, passport information, medical data, and nude patient photos.

Submitted by Gregory Rigby on

"New 'Hadooken' Linux Malware Targets WebLogic Servers"

"New 'Hadooken' Linux Malware Targets WebLogic Servers"

Aqua Security's Nautilus research team warns that "Hadooken" Linux malware has been targeting Oracle WebLogic servers to launch additional malware and steal credentials for lateral movement. The malware is used in attacks that exploit weak passwords for initial access. After compromising a WebLogic server, the attackers downloaded shell and Python scripts to fetch and run the malware. This article continues to discuss findings regarding the Hadooken malware targeting Oracle WebLogic applications and its link to multiple ransomware families.

Submitted by Gregory Rigby on

"RansomHub Claims Kawasaki Cyberattack, Threatens to Leak Stolen Data"

"RansomHub Claims Kawasaki Cyberattack, Threatens to Leak Stolen Data"

The "RansomHub" ransomware gang is threatening to leak data allegedly stolen from Kawasaki Motors Europe (KME). The company has announced it is recovering from the cyberattack that disrupted service. The company is investigating and cleaning any suspicious material on its systems after the attack on its EU headquarters. KME is a subsidiary of Kawasaki Heavy Industries, a global Japanese company that makes motorcycles, utility vehicles, and other motorized products.

Submitted by Gregory Rigby on

SecureWorld Pacific Virtual Conference

"Join your fellow InfoSec professionals for high-quality training and collaboration, whether virtual or in-person. Earn 6-18 CPE credits through 20-40 educational elements, learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and networking opportunities. Evaluate top vendor solutions and meet with local chapters of security associations."

Subscribe to