News
-
"Researchers Discover New Vulnerability in Large Language Models"Large Language Models (LLMs) apply deep learning techniques to process and generate text. This Artificial Intelligence (AI) technology has resulted in the development of open source and publicly accessible tools, such as ChatGPT, Claude, Google Bard, and…
-
"New Cybersecurity Advisory Warns About Web Application Vulnerabilities"The National Security Agency (NSA) collaborated with US and international cyber agencies to issue the Cybersecurity Advisory (CSA) titled "Preventing Web Application Access Control Abuse," which warns that vulnerabilities in web applications, including…
-
"Hackers Abusing Windows Search Feature to Install Remote Access Trojans"Hackers could exploit a legitimate Windows search feature to download arbitrary payloads from remote servers and compromise targeted systems with Remote Access Trojans (RATs) such as AsyncRAT and Remcos RAT. According to Trellix, the novel attack…
-
"WordPress Ninja Forms Plugin Flaw Lets Hackers Steal Submitted Data"Three vulnerabilities in the popular WordPress form-building plugin Ninja Forms could enable attackers to escalate privileges and steal user data. Patchstack disclosed the three vulnerabilities to the plugin's developer, Saturday Drive, warning that they…
-
"Blocking Access to ChatGPT Is a Short Term Solution to Mitigate Risk"According to Netskope, for every 10,000 enterprise users, an enterprise organization faces around 183 incidents of sensitive data being posted to ChatGPT per month. Source code makes up the largest share of exposed sensitive data. Based on data from…
-
"Despite Post-Log4J Security Gains, Developers Can Still Improve"Developers are increasingly implementing security testing as part of the development pipeline. However, there is still room for improvement as only a minority of companies test software during development or before committing code. According to Snyk's…
-
"New Study Reveals Insights Into Insider Computer Abuse and Organizational Security"Insider Computer Abuse (ICA), also known as the unauthorized and intentional misuse of organizational information resources by insiders, remains a significant threat to the security of organizational information systems. Recent studies have shown that…
-
"Keeping Emergency Field Hospitals Cyber Secure"Field hospitals and emergency response Information Technology (IT) infrastructure are confronted with the same cybersecurity challenges as any other IT infrastructure, but the consequences can be fatal. Hackers and scammers attempting to exploit…
-
"Researchers Demonstrate 'Unconditionally Secure' Quantum Digital Payments"New research from the University of Vienna may soon enable a completely secure, unhackable, and private digital payment system. In a recently published paper titled "Demonstration of quantum-digital payments," a team of researchers from the Vienna Center…
-
"Concerns Grow about MFA Bypass Attacks"Multi-factor authentication (MFA) involves authentication factors such as passwords, fingerprints, and smartphones to secure systems and data. Security experts encourage consumers and organizations to adopt MFA, because it is more difficult for hackers…
-
"This New Tool Could Protect Your Pictures From AI Manipulation"People can take a photo posted online and edit it with advanced generative Artificial Intelligence (AI) systems for malicious purposes. Due to the sophistication of these systems, it may be impossible to prove that the resulting image is fake. However, a…
-
Pub Crawl #76Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.