News
-
"NSA and ESF Partners Release Recommended Practices for Managing Open Source Software and Software Bill of Materials"The National Security Agency (NSA), the Office of the Director of National Intelligence (ODNI), the Cybersecurity and Infrastructure Security Agency (CISA), and industry partners have released a Cybersecurity Technical Report (CTR) titled "Securi
-
"Cybercriminals Continue Targeting Open Remote Access Products"According to WatchGuard, cybercriminals continue to prefer open remote access products or legitimate remote access tools for hiding their actions.
-
"Lazarus Group Is Still Juicing Log4Shell, Using RATs Written in 'D'"North Korean hackers continue to exploit Log4Shell, recently using that access to launch one of three new Remote Access Trojans (RATs) written in the "D" (dlang) programming language.
-
"Norton Healthcare Ransomware Hack: 2.5 Million Personal Records Stolen"Kentucky healthcare organization Norton Healthcare started informing 2.5 million individuals that their personal information was compromised in a ransomware data extortion hack earlier this year.
-
"Over 30% Of Log4j Apps Use a Vulnerable Version of the Library"About 38 percent of applications using the Apache Log4j library are still vulnerable to security issues, including Log4Shell, a critical vulnerability with the highest severity rating.
-
"Cybersecurity Protects Food, Agriculture"The Pacific Northwest National Laboratory (PNNL) is working on the first US Department of Homeland Security (DHS)-sponsored effort to explore the cybersecurity vulnerabilities and potential impact of increasingly smart agriculture technologies on US so
-
"Saddling up Cryptosystems for a Quantum Showdown"A team of researchers may have discovered the key to tackling threats from a large-scale quantum attack in an algebraic structure known as a quadratic twist.
-
"QR-Code Phishing Has Multiplied: How Detection Helps Security Teams Win"A new wave of Microsoft-themed email messages emerged in June. The messages appeared legitimate, with the Microsoft logo prominently displayed and a familiar email template requiring the user to update their two-factor authentication (2FA) code.
-
"Pretexting: A Growing Threat That Avoids Phishing's Obvious Tells"Phishing attacks on businesses pose a constant threat of data compromise, which is why many businesses invest in phishing awareness training. Training has resulted in more employees being aware of phishing strategies.
-
"Ransomware Surge is Driving UK Inflation, Says Veeam"According to security researchers at Veeam, the ransomware epidemic hitting UK businesses is leading many to increase their prices, adding to already high inflation.
-
"How Companies Should Think About Compensating Users for Private Data"As data-hungry Artificial Intelligence (AI) and Machine Learning (ML) technologies become more efficient, the key question, according to Ali Makhdoumi, an associate professor of decision sciences at Duke University's Fuqua School of Business, is
-
"HCU Cyber Engineering Team Wins First Place in 'Capture the Flag' Cyber Competition"A team of Houston Christian University (HCU) cyber engineering students took first place in the 2023 Capture the Flag (CTF) competition at the annual Alamo AFCEA chapter event (Alamo ACE).