News
-
"Zoom ZTP & AudioCodes Phones Flaws Uncovered, Exposing Users to Eavesdropping"Multiple security flaws in AudioCodes desk phones and Zoom's Zero Touch Provisioning (ZTP) could be exploited by an adversary to conduct remote attacks. Using the vulnerabilities discovered in AudioCodes desk phones and Zoom's ZTP feature, an external…
-
"Authorities Take Down Lolek Bulletproof Hosting Provider"Police have recently taken down a Lolek bulletproof hosting service criminals used to launch cyberattacks worldwide. The takedown was part of a coordinated effort between the Polish Central Cybercrime Bureau and the US Department of Justice (DoJ),…
-
"SwRI Micropatch Algorithm Improves Ground-To-Spacecraft Software Update Efficiency"Southwest Research Institute (SwRI) has developed an algorithm to remotely update and fix spacecraft software using less time and data than other techniques. Not only does the tool improve the overall efficiency of satellite software transmissions, but…
-
"A Puzzling Approach to Encryption"An advancement in data security is discussed in the International Journal of Information and Computer Security. The Japanese puzzle known as Sudoku promises a cryptographic system for text information, which works even in situations where there is…
-
"Gootloader SEO Watering Hole Malware Targets Law Firms"Gootloader, a Search Engine Optimization (SEO) watering hole technique, has been observed targeting legal-related search terms. It has been identified as a threat to law firms and individuals conducting research online for legal information. According to…
-
"Federated Learning: How Private Is It Really?"Federated Learning (FL) is a popular structure that enables one to learn a Machine Learning (ML) model collaboratively. The classical FL structure involves multiple clients, each with their own local data that they may want to keep private, and a server…
-
"Multiple Flaws Found in the Avada WordPress Theme and Plugin"Multiple vulnerabilities have recently been identified in the widely used Avada theme and its accompanying Avada Builder plugin. Security researchers at Patchstack discovered the flaws. The researchers noted the Avada Builder plugin exhibits…
-
"CISA Discovered a New Backdoor, Named Whirlpool, Used in Barracuda ESG Attacks"Whirlpool, a new backdoor discovered by the US Cybersecurity and Infrastructure Security Agency (CISA), was used in attacks against Barracuda Email Security Gateway (ESG) devices. Barracuda, a provider of network security solutions, warned customers at…
-
"Most VPNs Can Be Tricked Into Leaking Traffic"According to university researchers, nearly 70 Virtual Private Network (VPN) clients and servers are vulnerable to an attack that can cause them to leak user traffic. The multi-campus collaboration named their attack TunnelCrack and has released proof-of…
-
"How Sure Is Sure? Incorporating Human Error Into Machine Learning"Many Artificial Intelligence (AI) systems fail to grasp human error and uncertainty, especially in systems where a human provides the Machine Learning (ML) model with feedback. These systems are often programmed with the assumption that humans are always…
-
"Cybersecurity Project Plans to Connect Researchers Across the Country"As technology advances, the manufacturing industry increasingly adapts to digital instruction, from the production of fighter jets to cars. Mechanical parts can be designed on a computer and sent via the network to a manufacturing machine that follows…
-
"Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach"Northern Ireland’s top police officer recently apologized for what he described as an “industrial scale” data breach in which the personal information of more than 10,000 officers and staff was released to the public. The incident is particularly…