-
"Engineers Build Zero-Trust, Real-Time Cybersecurity Tools to Protect Renewables on the Grid"
Researchers at Iowa State University are building zero-trust cybersecurity tools to protect power grids that include renewable resources such as wind or solar farms.
-
"Critical Vulnerabilities Expose mbNET.mini, Helmholz Industrial Routers to Attacks"
Germany's CERT@VDE has notified organizations of several critical and high-severity vulnerabilities found in industrial routers.
-
"Penn Engineering Research Discovers Critical Vulnerabilities in AI-Enabled Robots to Increase Safety and Security"
Researchers at the University of Pennsylvania's School of Engineering and Applied Science (Penn Engineering) discovered that certain features of Artificial Intelligence (AI)-governed robots have previously unidentified security vulnerabilities.
-
"Severe Flaws in E2EE Cloud Storage Platforms Used by Millions"
According to ETH Zurich researchers Jonas Hofmann and Kien Tuong Turong, multiple End-to-End Encrypted (E2EE) cloud storage platforms have security vulnerabilities that could expose user data to malicious actors.
-
"Half of Organizations Have Unmanaged Long-Lived Cloud Credentials"
Datadog's "State of Cloud Security 2024" report found that 46 percent of organizations have unmanaged users with long-lived credentials in cloud services, putting them at risk of data breaches.
-
"ESET Distributor's Systems Abused to Deliver Wiper Malware"
ESET is investigating the abuse of the systems of its official product distributor in Israel to send emails delivering wiper malware.
-
-
"New Algorithm Identifies Increase in Critical Infrastructure Security Vulnerabilities"
A team of researchers at the Georgia Tech School of Electrical and Computer Engineering (ECE) has developed an algorithm named "PLCHound" to improve critical infrastructure security.
-
"Using Generative AI to Outsmart Cyberattackers Before They Strike"
According to Mohamed Rahouti, a professor at Fordham University, generative Artificial Intelligence (GenAI) holds the key to a new system that anticipates potential cyberattacks and prepares systems to counter previously unknown cyber threats.
-
"PhD Student to Present Paper at Cybersecurity Conference"
Mir Ali Masood, PhD student at the University of Illinois Chicago, co-presents a paper titled "Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript Bundles" at the 2024 ACM Computer and Communication Security
-
"UTSA Researchers Reveal Oversight in AI Image Recognition Tools"
Researchers at the University of Texas at San Antonio (UTSA) have developed a proprietary attack named "AlphaDog" to study how hackers can exploit an oversight in Artificial Intelligence (AI) image recognition tools.
-
"For AI, Secrecy Often Doesn't Improve Security"
A team of researchers has concluded that limiting public access to the underlying structures of Artificial Intelligence (AI) systems could have several consequences.
News