News
  • "Study Confirms That Trust Following a Security Breach Is Best Retained When Organizations Are Up Front"
    According to new research from Durham University Business School, organizations that suffer security breaches in which customer information is compromised are far more likely to retain consumer trust if they are quick to communicate the incident and are…
  • "GenCyber Camp Will Help Local Teachers Integrate Cybersecurity Into Lesson Plans"
    A new Binghamton University-led initiative aims to provide teachers with the resources they need to help their students navigate today's cybersecurity threats. In summer 2023, the GenCyber program will provide a free eight-day cybersecurity camp for 25…
  • "Insider Threat Peaks to Highest Level in Q3 2022"
    According to Kroll's "Q3 Threat Landscape: Insider Threat the Trojan Horse of 2022" report, insider threats peaked at its highest level yet in the third quarter of 2022, making up nearly 35 percent of all unauthorized access threat incidents. In the…
  • "Majority of Security Managers Lack Threat Intelligence Skills"
    Security researchers at Vulcan Cyber have found that 73% percent of IT security managers have said they lack necessary threat intelligence (TI) skills, and 55% believe their threat intelligence data is not predictive enough.  The researchers stated…
  • "Lenovo Patches ThinkPad, Yoga, IdeaPad UEFI Secure Boot Vulnerability"
    Lenovo has issued patches to address two vulnerabilities that could have allowed cybercriminals to run malicious code by deactivating Unified Extensible Firmware Interface (UEFI) Secure Boot. According to researchers at ESET, the high-severity…
  • "Winners Announced in First Phase of UK-US Privacy-Enhancing Technologies Prize Challenges"
    The winners of the first phase of the US-UK Privacy-Enhancing Technologies (PETs) prize challenges have been announced by the UK and US governments. Innovators are taking part in two challenge tracks: using PETs to improve the detection of financial…
  • "Email Is the Top Vector for Cyberattacks"
    According to a report from Tessian, 40 percent of business emails contain unwanted content. In addition, email is currently the most common method of delivering cyberattacks. Ninety-four percent of organizations experienced a spear phishing or…
  • "Production Systems Cybersecurity Project Receives Significant Funding"
    Business Finland has funded a consortium project investigating cybersecurity in system integration led by Tapio Frantti, Professor of Practice at the University of Jyväskylä Faculty of Information Technology. Production systems in Finland are controlled…
  • "Could a Digital Red Cross Protect Hospitals From Ransomware?"
    Across a century of wars, the internationally recognized Red Cross symbol has marked people and facilities off-limits to attack. However, security experts are skeptical of a recent proposal to create a digital Red Cross marker to protect healthcare and…
  • "Ransomware-as-a-Service Transforms Gangs Into Businesses"
    According to a recent threat report, Malware-as-a-Service (MaaS) is becoming more accessible to threat actors. The cyber threat group, called 'Eternity Project,' operates through a Tor website and a Telegram channel, selling malware in a systematic…
  • "Apple Patches Remote Code Execution Flaws in iOS, macOS"
    Apple recently released out-of-band patches for iOS and macOS to address two arbitrary code execution vulnerabilities in the libxml2 library.  Written in the C programming language and originally developed for the Gnome project, libxml2 is a…
  • "Couple Get 40 Years for Navy Espionage Plot"
    A Maryland couple recently was sentenced to a combined 494 months behind bars after attempting to sell designs for the US navy’s nuclear-powered warships to a foreign power.  Jonathan Toebbe, 44, of Annapolis, was sentenced to over 19 years in…