-
"Cybercriminals Follow the News Too and Change Tactics Accordingly"Threat Vector researchers have brought attention to the adaptation of threat actors to the exposure of their operations, tools, and techniques by publications. Threat actors will continue to alter their malicious activities in an attempt to escape the…
-
"New Technology from Purdue Advances Protection of Critical Systems from Insider-Assisted Attacks"A new covert defense algorithm has been developed by a team of researchers at Purdue University. The algorithm applies techniques aimed at misleading attackers in the targeting of critical systems such as nuclear plants, driverless vehicles, refineries,…
-
"At Least 57 Negative Impacts from Cyber-Attacks"Cybersecurity researchers from Kent's School of Computing and the Department of Computer Science at the University of Oxford have presented findings of a study in which they delved deeper into the negative impacts of cyberattacks. They have found at…
-
"Hackers Steal Data of 75,000 Users After Healthcare.Gov FFE Breach"A HealthCare.gov sign-up system, named Federally Facilitated Exchanges (FFE), has been breached by hackers. The system is used by healthcare insurance agents and brokers to help people sign up for the coverage available on HealthCare.gov. Personal…
-
"AWS FreeRTOS Vulnerabilities Could Crash IoT Devices, Warn Cyber Security Researchers"Security flaws have been discovered in an operating system that is commonly used in IoT devices. The 13 flaws discovered in the FreeRTOS operating system could allow hackers to disrupt the operations of IoT devices, leak data, and more. This article…
-
"New Security Woes for Popular IoT Protocols"Researchers will provide further details on vulnerabilities contained by popular IoT protocols, Message Queuing Telemetry Transport (MQTT) and the Constrained Application Protocol (CoAP), at Black Hat Europe 2018. According to researchers, the security…
-
"Vulnerable Controllers Could Allow Attackers to Manipulate Marine Diesel Engines"Four vulnerabilities in relation to authentication and encryption have been discovered to be contained by the firmware of marine diesel engine controllers manufactured by Auto-Maskin. The exploitation of these vulnerabilities can allow attackers to…
-
"Defending Against Spectre and Meltdown Attacks"A significant advancement has been made by MIT researchers in the effort to defend against Spectre and Meltdown attacks. Researchers have developed a method, called Dynamically Allocated Way Guard (DAWG), that complicates the exploitation of…
-
"Threat Intelligence Computing for Efficient Cyber Threat Hunting"A cyber reasoning paradigm has been developed by IBM researchers for the purpose of establishing and easing the process of discovering cyber threats. The paradigm, called threat intelligence computing (TIC), improves upon the observation of cyber facts,…
-
Learn and Teach Robot HackingCyber-Physical Systems (CPS) Cybersecurity Curriculum Free curriculum with supporting technologies to introduce students to the exciting field of cybersecurity. Enable K-12 educators and students to understand the methods of hacking and defensive…
-
"Army Researcher Minimizes the Impact of Cyber-Attacks in Cloud Computing"An algorithm has been developed by a team of researchers to reduce the effects of potential cybersecurity attacks within the cloud computing environment. The algorithm addresses cybersecurity concerns surrounding the hypervisor in cloud computing. This…
-
"SEC Warns Corporate Cyber Weakness Could Violate Federal Law"The U.S. Securities and Exchange Commission (SEC) has issued a warning pertaining to the potential violation of federal law by companies that do not implement sufficient cybersecurity controls. The warning highlights the duty of all public companies to…
News