News
  • "Hackers Posed as Reporters in Attacks on North Korea Experts, Google Says"
    According to a new report by researchers from Google's Threat Analysis Group (TAG), government-sponsored hackers with ties to the North Korean military posed as journalists and targeted individuals with expertise in North Korea policy issues. TAG's…
  • "Rogers Communications Data Allegedly Sold on a Hacker Forum"
    Attackers are claiming that data for sale on the dark web belongs to Rogers Communications, a Canadian media giant that provides wireless, cable, and Internet services. The advertisement includes three of Rogers' Active Directory (AD) databases: users,…
  • "ALPHV Ransomware Exploits Veritas Backup Exec Bugs for Initial Access"
    An ALPHV/BlackCat ransomware affiliate was observed exploiting three Veritas Backup product vulnerabilities to gain initial network access. ALPHV emerged in December 2021 and is believed to be run by former members of the Darkside and Blackmatter…
  • "Purdue Researchers Uncover Vulnerabilities in Smart TVs"
    Researchers from Purdue University have discovered vulnerabilities in Smart TVs that can allow attackers to take control of the devices and steal any data stored on them. Google has acknowledged a vulnerability, tracked as CVE-2021-0889, in its Android…
  • "Why Banks Need to Boost Their Cybersecurity Investments"
    Cyberattacks on the banking industry are widespread, but system-wide investments in cybersecurity are insufficient, thus increasing the risk of financial instability, privacy violations, and bank runs. In a study titled "Cybersecurity and Financial…
  • "Fayetteville State University Students Place Third in Nationwide Cybersecurity Hackathon"
    A team of five student researchers from the Intelligent Systems Laboratory (ISL) at Fayetteville State University (FSU) recently placed third in a nationwide cybersecurity hackathon event held at FSU's Center for Defense and Homeland Security (CDHS). The…
  • "A Fresh Approach to New and Secure Encryption"
    As digitalization advances, the amount of data that must be protected increases exponentially, which calls for sophisticated cryptographic methods that are both fast and efficient in practice as well as completely secure. The "SymTrust" research project…
  • "Lasers for Secure Communication"
    Several solutions for information encryption, anti-counterfeiting, and secure communication have emerged as the world generates more data. Researchers at Nanyang Technological University (NTU) want to contribute by developing a new way to encode…
  • "Turning Hackers' Behavior against Them"
    The new Reimagining Security with Cyberpsychology-Informed Network Defenses (ReSCIND) program aims to use cyberpsychology to discourage and thwart cybercriminals. According to the Intelligence Advanced Research Projects Activity (IARPA), cyberpsychology…
  • "Phishing Campaign Goes Cutting-Edge With IPFS"
    Malicious actors behind credential harvesting attacks are spreading customized phishing links using a distributed file protocol. Since the InterPlanetary File System (IPFS) is designed to be resilient against content takedowns, researchers report that…
  • "HEAT Attacks: A New Spin on Browser Exploit Techniques"
    Cybercriminals looking to breach an endpoint to infiltrate a network are increasingly targeting web browsers. Increased business use of browsers on networks lacking the perimeter security infrastructure of traditional campus networks has rendered them…
  • "New Tool Helps Mobile App Developers Create More Accurate iOS Privacy Labels"
    Researchers at Carnegie Mellon University's (CMU) CyLab Security and Privacy Institute have been working on privacy nutrition labels, seeking a quick and simple approach to enlighten technology users on how their data is being collected and used. Apple…