News
-
"New Bluetooth Flaw Lets Hackers Take Over Android, Linux, macOS, and iOS Devices"Threat actors could use a critical Bluetooth security flaw to take control of Android, Linux, macOS, and iOS devices.
-
"Vulns in Android WebView, Password Managers Can Leak User Credentials"Researchers have shown that most popular password managers can leak credentials from Android devices when using the mobile operating system's WebView autofill function with malicious apps.
-
"Researchers Automated Jailbreaking of LLMs With Other LLMs"Artificial Intelligence (AI) security researchers from Robust Intelligence and Yale University have developed a Machine Learning (ML) method that can quickly jailbreak Large Language Models (LLMs) and do so in an automated way.
-
"For Domestic Violence Victim-Survivors, a Data or Privacy Breach Can Be Extraordinarily Dangerous"Cybersecurity data breaches present unique risks for victim-survivors of domestic violence.
-
"Ninety Percent of Energy Companies Suffer Supplier Data Breach"According to security researchers at SecurityScorecard, almost all (90%) of the world’s 48 biggest energy companies have suffered a supply chain data breach in the past 12 months.
-
"New SLAM Attack Steals Sensitive Data From AMD, Future Intel CPUs"Researchers from the Systems and Network Security Group (VUSec Group) at Vrije Universiteit Amsterdam have developed "Spectre based on LAM" (SLAM), a new side-channel attack that uses hardware features designed to improve security in upcoming Intel, AM
-
"UC Researchers Work on Knowledge Graph to Help Small Businesses Tackle Cybersecurity"As part of a new research project, Dr. Rosetta Romano, an assistant professor in Information Technology (IT) and Systems at the University of Canberra, will help small businesses by educating them about the criticality of cybersecurity. Dr.
-
"The Ethics of Synthetic Data and Its Impact on Cybersecurity Algorithms"Synthetic data can be used to improve cybersecurity algorithms, such as facial recognition and fingerprint matching. These applications have the potential to improve suspect identification in law enforcement and streamline border control processes.
-
"US and International Partners Issue Recommendations to Secure Software Products Through Memory Safety"The National Security Agency (NSA) has joined the Cybersecurity and Infrastructure Security Agency (CISA) and other US and international partners in releasing a Cybersecurity Information Sheet (CSI) titled "The Case for Memory Safe Roadmaps." The
-
"Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware"The recently released Cisco Talos Year in Review report highlights new trends in the cybersecurity threat landscape.
-
"Millions of Patient Scans and Health Records Spilling Online Thanks to Decades-Old Protocol Bug"Aplite researchers warn that thousands of exposed servers are leaking millions of patients' medical records and personal health information due to security flaws in a decades-old industry standard, Digital Imaging and Communications in Medicine (DICOM)
-
"Voting Experts Warn of 'Serious Threats' for 2024 From Election Equipment Software Breaches"Twenty-two computer scientists, election security experts, and voter advocacy organizations call for a federal investigation and a risk assessment of voting machines used in the US, emphasizing that software breaches have "urgent implications for the 2