News
-
"Researchers Used Wi-Fi Signals to See Through Walls. Game-Changing Breakthrough? Or Privacy Nightmare Waiting to Happen?"Using Wi-Fi signals, scientists have developed a technology that enables people to see objects and read letters through walls. The system, developed by UC Santa Barbara researchers, traces the edges of objects on the opposite side of solid barriers. In…
-
"Ransomware Gang Takes Credit for Disruptive MGM Resorts Cyberattack"A known ransomware gang has recently taken credit for the highly disruptive cyberattack on MGM Resorts, and the hospitality and entertainment giant has yet to restore many of the impacted systems. It is unknown how long the hackers had access to…
-
"NSA, US Federal Agencies Advise on Deepfake Threats"The National Security Agency (NSA) and US federal agency partners have issued new guidance regarding deepfakes. This emerging threat may pose a cybersecurity challenge for National Security Systems (NSS), the Department of Defense (DoD), and Defense…
-
"Playing Hide and Seek with a New Breed of Malware Threatening Millions of Users"Georgia Tech's Cyber Forensics Innovation (CyFI) Lab discovered that Web App Engaged (WAE) malware has increased by 226 percent since 2020. Therefore, the team created a tool that enables cybersecurity incident responders to purge almost 80 percent of…
-
"3 Activities for Making Software Secure by Design"According to Carnegie Mellon University (CMU) Software Engineering Institute (SEI)'s Robert Schiela, technical manager of the Secure Coding group, and Carol Woody, a principal researcher in the SEI's Computer Emergency Response Team (CERT) Division,…
-
"Quantum-Safe Data Encryption"Quantum computers are expected to break current encryption methods due to their unique functioning. A competition started by the National Institute of Standards and Technology (NIST) seeks to change this by looking for algorithms that can withstand…
-
"An Empirical Investigation Into Organization Cyber Security Readiness From the IT Employee and Manager Perspectives"New research highlights the essential elements for bolstering cybersecurity readiness. This study examines five critical factors influencing organizations' cybersecurity readiness management, which include employee expertise, awareness, organizational…
-
"NSA-Funded GenCyber Cybersecurity Summer Bootcamp Reveals Exciting Career Opportunities for Richmond-Area Students"At the Virginia Commonwealth University (VCU) College of Engineering's GenCyber Cybersecurity Summer Bootcamp, over 40 middle and high school students from the Richmond area learned about cybersecurity. The program is part of a nationwide initiative…
-
"API Security Doesn't Get the Priority Treatment It Needs"Traceable and Ponemon Institute's research calls for more attention on Application Programming Interface (API) security. While threats continue to increase, organizations do not assess their APIs nearly enough for vulnerabilities. Traceable warns of the…
-
"75% of Education Sector Attacks Linked to Compromised Accounts"According to security researchers at Netwrix, 69% of organizations in the education sector suffered a cyberattack within the last 12 months. Phishing and user account compromise were the most common attack paths for these organizations, while…
-
"Lazarus Steals $41M From Virtual Betting Site"The FBI has revealed that the North Korean threat group Lazarus stole $41 million in cryptocurrencies from Stake[.]com, including Ethereum. According to the FBI, its investigation has found that North Korean cyber actors moved stolen funds associated…
-
"New Phishing Campaign Launched via Google Looker Studio"Security researchers at Check Point have observed threat actors using Google Looker Studio to create fake crypto pages that are then delivered to the intended victims in emails sent from the legitimate tool itself. The message contains a link to…