News
-
"Researchers Foil MitM Attack on Military Robots With Algorithm"Researchers from the University of South Australia have been successful in preventing Man-in-the-Middle (MitM) attacks on autonomous military robots by teaching the robot to detect MitM attacks using an algorithm.
-
"EPA Withdraws Water Sector Cybersecurity Rules Due to Lawsuits"The US Environmental Protection Agency (EPA) recently withdrew cybersecurity rules for public water systems due to lawsuits filed by states and non-profit water associations.
-
"Europe Mulls Open-Sourcing TETRA Emergency Services' Encryption Algorithms"The European Telecommunications Standards Institute (ETSI) is considering open-sourcing the proprietary encryption algorithms used to secure emergency radio communications in response to the public backlash caused by the discovery of security vulnerabi
-
"Researchers Test Large Language Model that Preserves Patient Privacy"According to a new study conducted by the National Institutes of Health Clinical Center (NIH CC), locally run Large Language Models (LLMs) may be a feasible option for extracting data from text-based radiology reports while protecting patient privacy.
-
"QR Code Phishing on the Rise"AT&T warns of a new trend of malicious QR codes being embedded in phishing attempts.
-
"Fine-Tuning LLMs Compromises Their Safety, Study Finds"A recent study by Princeton University, Virginia Tech, and IBM Research reveals that fine-tuning Large Language Models (LLMs) can weaken the safety measures designed to prevent the models from generating harmful content such as malware, illegal activit
-
"WS_FTP Servers Targeted in Ransomware Attacks"The maximum severity vulnerability in unpatched WS_FTP servers from Progress Software has been exploited in ransomware attacks.
-
"Quantum Risk Is Real Now: How to Navigate the Evolving Data Harvesting Threat"Due to the threat posed by Harvest Now, Decrypt Later (HNDL), data transmission itself is inherently vulnerable. To protect data from risks of the future, organizations must take proactive steps to secure data against quantum risks.
-
"DarkGate Operator Uses Skype, Teams Messages to Distribute Malware"A threat actor has been compromising Skype and Microsoft Teams accounts to distribute DarkGate, a loader associated with information theft, keylogging, cryptocurrency mining, and Black Basta ransomware.
-
"Juniper Networks Patches Over 30 Vulnerabilities in Junos OS"Networking equipment manufacturer Juniper Networks recently announced patches for more than 30 vulnerabilities in Junos OS and Junos OS Evolved, including nine high-severity flaws.
-
"Malicious Solana, Kucoin Packages Infect NuGet Devs With SeroXen RAT"In order to infect developers with the SeroXen Remote Access Trojan (RAT), malicious NuGet packages with over 2 million downloads impersonate cryptocurrency wallets, cryptocurrency exchanges, and Discord libraries.
-
"FBI, CISA Warn of Rising AvosLocker Ransomware Attacks Against Critical Infrastructure"According to a new advisory issued by the US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI, the AvosLocker ransomware gang has been linked to attacks targeting critical infrastructure sectors in the US.