News
-
"Web Browsing Is the Primary Entry Vector for Ransomware Infections"Researchers at Palo Alto Networks discovered that in 2022, the most widely used ransomware delivery method was URL or web browsing. In 2021, it was email attachments (i.e., delivery via SMTP, POP3, and IMAP protocols), but in 2022, only 12 percent of…
-
"Another AI Pitfall: Digital Mirroring Opens New Cyberattack Vector""Digital twins" or Artificial Intelligence (AI) assistants trained to serve needs by learning about and, in some ways imitating users, can be turned against people in various ways. According to Ben Sawyer, a professor at the University of Central Florida…
-
"Pacific Northwest National Laboratory and The University of Texas at El Paso Collaborate to Strengthen Data Protection"Researchers are collaborating to enhance the privacy and security of sensitive data that may include Personally Identifiable Information {PII). Tony Chiang, Data Scientist at Pacific Northwest National Laboratory (PNNL), and Amy Wagler, Professor of…
-
"Improving Cybersecurity: New Ways to Protect Data"Nektarios Tsoutsos, an assistant professor in the Department of Electrical and Computer Engineering in the College of Engineering at the University of Delaware, is developing new methods to protect data when cloud services are compromised. With support…
-
"Impact of Password Management Strategies on the Trust Enhancement in the Digital Era"According to research published in the International Journal of Business Performance Management, password management strategies can boost trust in digital services. The most significant barrier to password management is a lack of awareness among…
-
"Research Shows That Business Continuity Response Measures Are Not Keeping Pace With Cyber Threats"New research commissioned by Cohesity reveals that most businesses lack the cyber resilience strategies and data security capabilities necessary to address today's escalating cyber threats and maintain business continuity. In addition, cyber resilience…
-
"Field Campaign Assesses Vulnerabilities of 5G Networks"A team from the MIT Lincoln Laboratory traveled to Hill Air Force Base (AFB) near Salt Lake City, Utah, to assess the vulnerabilities of 5G networks. Fifth-generation, or 5G, mobile network technology is designed to provide higher data rates, ultralow…
-
"University of Rochester Updates Investigation Into Data Breach"On Tuesday, the University of Rochester sent an update to faculty, students, and staff regarding a June data breach impacting dozens of organizations through a third-party vendor MOVEit. A spokesperson from the University of Rochester stated that…
-
"Sandia Helps Develop Digital Tool to Track Cloud Hackers"Sandia programmers are helping the US Cybersecurity and Infrastructure Security Agency (CISA) in its hunt for hackers and cyber terrorists through an innovative program that enlists Microsoft cloud users worldwide. In March, Untitled Goose Tool was…
-
"Cryptography May Offer a Solution to the Massive AI-Labeling Problem"The European Union (EU) will soon require some technology platforms to label their Artificial Intelligence (AI)-generated images, audio, and videos with "prominent markings" showing their synthetic origins. In addition, the White House wants major AI…
-
"Zimbra Patches Exploited Zero-Day Vulnerability"Zimbra recently released patches for a cross-site scripting (XSS) vulnerability in Collaboration Suite that has been exploited in malicious attacks. The vulnerability is tracked as CVE-2023-37580 and was disclosed earlier this month when Zimbra…
-
"North Korean Hackers Bag Another $100m in Crypto Heists"North Korea’s infamous Lazarus hacking group has been linked to two new attacks on cryptocurrency firms which led to the theft of nearly $100m in virtual currency. CoinsPaid said in an update this week that $37.3m was stolen from the firm. …