News
-
"Understanding Cyber Threats in IoT Networks"New research delves into how Internet of Things (IoT) devices, which are not as well protected as traditional computers regarding firewalls, antivirus, and malware protection, can represent a significant system vulnerability.
-
"Signal Jamming Defense Not up to the Task? These Researchers Have a Solution"As growing and maturing data services demand faster Internet speeds and operating systems call for better security, hackers and adversaries continue to interfere.
-
"What's Wrong With This Picture? NIST Face Analysis Program Helps to Find Answers"Face recognition software is often implemented to gatekeep access to secure websites and electronic devices. Researchers are looking into the possibility of defeating it simply by wearing a mask resembling another person's face.
-
"Professor to Continue Work Developing Automated Security Policies"Vijay Atluri, a Rutgers University professor, received a grant supporting her research on information security, particularly on how protection can be enabled automatically based on user credentials and the types of resources that require protection.
-
"Russian State Hackers Attempted to Block Ukrainians From Opening US Bank Accounts"During two weeks in March 2022, 95 percent of the accounts opened at major US banks were fraudulently created.
-
"National Security Agency is Starting an Artificial Intelligence Security Center"The National Security Agency has announced that it is starting an artificial intelligence security center. Army Gen.
-
"MOVEit Maker Warns of New Critical Bug Affecting Thousands"Progress Software, the maker of the MOVEit Transfer tool that hackers exploited to compromise thousands of businesses, has announced that its WS_FTP Server software requires a patch for a critical flaw.
-
"Censys Reveals Open Directories Share More Than 2,000 TB of Unprotected Data"Open directories pose a significant security threat to organizations as they could leak sensitive data, intellectual property, or technical data that may enable an attacker to compromise an entire system.
-
"FBI: Dual Ransomware Attack Victims Now Get Hit Within 48 Hours"The FBI has issued a warning regarding a new trend of ransomware attacks in which multiple strains are launched on victims' networks to encrypt systems in less than two days.
-
"Phishing, Smishing Surge Targets US Postal Service"Security researchers at DomainTools have witnessed a significant increase in cyberattacks targeting the US Postal Service (USPS), mainly through phishing and smishing campaigns.
-
"Lazarus Group Impersonates Recruiter from Meta to Target Spanish Aerospace Firm"The Lazarus Group has been linked to a cyber espionage attack against an unnamed aerospace company in Spain. The threat actor posed as a recruiter for Meta and approached the company's employees.
-
"NSA Releases Guidance on Acceptance Testing for Supply Chain Risk Management"The National Security Agency's (NSA) Cybersecurity Information Sheet (CSI) titled "Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers" encourages US Government departments and agencies operating National Security Syste