News
-
"Smart Inverters' Vulnerability to Cyberattacks Needs to Be Identified and Countered, According to Concordia Researchers"Distributed Energy Resources (DERs) are facilities owned by individuals or small businesses that can generate, store, and return power to energy grids, thus changing how power is used. As society seeks alternative energy sources, the technology is…
-
"Sandworm Hacking Group Linked to New Ransomware Deployed in Ukraine"According to recent research from the cybersecurity firm ESET, there is a wave of ransomware attacks in Ukraine that may be the work of the state-backed Russian hacking group Sandworm. Several Ukrainian organizations were affected by RansomBoggs malware…
-
"Control Failures Are the Primary Reason for Most Data Breaches"Panaseer has released the third edition of its Security Leaders Peer Report, which examines the concerns and constraints that CISOs and other senior cybersecurity leaders face in the US and the UK. According to Censuswide's survey of more than 800…
-
"Predatory Loan Apps Found Targeting Victims in Google Play and Apple App Store"Researchers at the cybersecurity company Lookout discovered over 300 loan apps in both Google Play and the Apple App Store exhibiting predatory behavior, such as exfiltrating sensitive user data and harassing borrowers for payment. The apps, which can be…
-
"MIT Policy Hackathon Produces New Solutions for Technology Policy Challenges"The MIT Policy Hackathon, run by students from the Institute for Data, Systems, and Society (IDSS), is an interdisciplinary competition that brings together participants from all over the world to explore potential solutions to some of society's most…
-
"Cyber and Physical Threats Illuminate Need for Security Convergence in Energy Sector"Security convergence refers to joining cyber and physical security into a single organizational structure. Since ASIS International and the Information Systems Audit and Control Association (ISACA) established the Alliance for Enterprise Security Risk…
-
"Three Out of Four Organizations Are Still Vulnerable to Log4Shell"The Log4j or Log4Shell vulnerability first made headlines in December 2021, sending shockwaves through the cybersecurity community. According to new Tenable research based on data from more than 500 million tests, 72 percent of organizations are still…
-
"Majority of US Defense Contractors Not Meeting Basic Cybersecurity Requirements"According to researchers at CyberSheath, nearly nine in 10 (87%) of US defense contractors are failing to meet basic cybersecurity regulation requirements. The researchers surveyed 300 US-based Department of Defense (DoD) contractors and found that…
-
"New Connected Device Security Maturity Model Helps Orgs Strengthen Cybersecurity"Ordr, a connected device security firm, has released a maturity model to aimed at helping healthcare organizations evaluate and improve their connected devices' security. The guide is divided into five maturity stages, each with recommended actions and…
-
Spotlight on Lablet Research #36 - Coordinated Machine Learning-Based Vulnerability and Security Patching for Resilient Virtual Computing InfrastructureSpotlight on Lablet Research #36 - Coordinated Machine Learning-Based Vulnerability and Security Patching for Resilient Virtual Computing Infrastructure