News
  • "Researchers Work to Fulfill Promise of Resilient Autonomous Control Systems"
    The primary objective of the Resilient, Autonomous, Networked Control Systems (RANCS) Research Group at the University of South Florida is to make the world smarter by investing in the autonomy of Networked Control Systems (NCSs). However, while autonomy…
  • "The Rise of the Traffers Ecosystem and Why You Need to Know About It"
    Traffers stem from the ecosystem of credential theft, posing a threat to businesses. The theft of credentials is a significant problem for companies. According to a recent IBM report on data breaches, compromised credentials were the primary vector of…
  • "MIT Researchers Make Language Models Scalable Self-Learners"
    A group of researchers at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) devised an approach to the long-standing issues of privacy and inefficiency associated with Large Language Models (LLMs). They came up with a logic-aware…
  • "Google Launches Secure AI Framework to Help Secure AI Technology"
    Google has announced the launch of the Secure AI Framework (SAIF), which is a conceptual framework for securing Artificial Intelligence (AI) systems. Google, the owner of the generative AI chatbot Bard and parent company of the AI research lab DeepMind,…
  • "Top Vulnerabilities So Far of 2023: Apache Superset, Papercut, MOVEit and, Yes, ChatGPT"
    It is no longer possible to patch everything because security teams are significantly overwhelmed with managing vulnerabilities. Due to the current skills gap, security teams with inadequate staffing must prioritize the most necessary patches for their…
  • "Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks"
    A new backdoor called "Stealth Soldier" has been used in a series of highly-targeted espionage attacks in North Africa. According to researchers at Check Point, Stealth Soldier malware is a custom backdoor that mainly carries out surveillance…
  • "PoC Released for Windows Win32k Bug Exploited in Attacks"
    Researchers have published a proof-of-concept (PoC) exploit for an actively exploited Windows local privilege escalation flaw. The Win32k subsystem manages the operating system's window manager, screen output, input, and graphics, as well as functions as…
  • "Factors Influencing IT Security Spending"
    According to Netrix Global, security executives want more Artificial Intelligence (AI) solutions in 2023 to help them combat the expanding cybersecurity threat landscape. Twenty-two percent of respondents want to see AI increasingly used in cybersecurity…
  • "Cybercrooks Scrape OpenAI API Keys to Pirate GPT-4"
    Recently, the moderators of the r/ChatGPT Discord channel banned a script kiddie who shared stolen OpenAI Application Programming Interface (API) keys with hundreds of other users. API keys enable developers to integrate OpenAI's technologies into their…
  • "Detecting and Grouping Malware Using Section Hashes"
    As technological advancement continues to accelerate, nation-states and unaffiliated individuals are quickly developing new malicious computer viruses to exploit computer system vulnerabilities and achieve their political and personal goals. To protect…
  • "What Businesses Need to Know About the EU IoT Bill"
    The Cyber Resilience Act is Europe's proposed legislation that will establish minimum cybersecurity standards for connected devices and require updates to products throughout their lifespan. This legislation will be a significant victory for consumers…
  • "Hacking Group Seen Mixing Cybercrime and Cyber Espionage"
    A hacking group aligned with Belarusian government interests appears to combine cybercrime and cyber espionage. According to a new report by malware researcher Matthieu Faou at the security company ESET, the group known as "Asylum Ambuscade" has been…