News
  • "For Cyberattackers, Popular EDR Tools Can Turn into Destructive Data Wipers"

    Many trusted Endpoint Detection and Response (EDR) technologies may contain a flaw that allows attackers to cause products to erase almost all data on installed systems. Or Yair, a SafeBreach security researcher who discovered the flaw, tested 11 EDR…

  • "Applying AI Techniques in Cybersecurity, Counterterrorism, and International Security"

    Artificial Intelligence (AI) has shown promise as a valuable tool for protecting against malicious actors. AI has been used to help predict terrorist attacks, destabilize terrorist networks, and mitigate cyberattacks in real-time. A newly established…

  • "Flaw in Aged Boa Web Server Threatens Supply Chain"

    Microsoft retired the Boa web server in 2005, but it is still widely used. The company recently revealed that malicious actors in attacks against the energy industry have exploited a vulnerability in the server's open-source component. This development…

  • "Georgia Tech and PNNL Launch Joint Cybersecurity Institute"

    The Georgia Institute of Technology (Georgia Tech) and the Pacific Northwest National Laboratory (PNNL) announced the formation of a joint institute, the Institute for Cybersecurity and Resilient Infrastructure Studies (ICARIS), to focus on critical…

  • "Scattered Spider Cybercrime Group Targets Mobile Carriers via Telecom, BPO Firms"

    Security researchers at CrowsStrike are warning that a threat actor tracked as "Scattered Spider" is targeting telecommunications and business process outsourcing (BPO) companies in an effort to gain access to mobile carrier networks and perform SIM…

  • "Swiss Government Wants to Implement Mandatory Duty to Report Cyberattacks"

    The Swiss government has recently asked its Parliament to amend the Information Security Act to make it mandatory for critical infrastructure providers to report cyberattacks to the National Cyber Security Centre (NCSC).  Doing this will be aimed at…

  • "Organizations Failing to Unlock the Full Potential of Zero Trust"

    Over 90 percent of organizations migrating to the cloud have or are in the process of implementing a zero trust architecture. However, according to a new Zscaler study, only 22 percent of global Information Technology (IT) decision-makers are 'fully…

  • "Are We Taking Patient Privacy as Seriously as We Ought to Be?"

    Anita Allen, University of Pennsylvania professor of law and philosophy, kicked off the 2022 HIMSS Healthcare Cybersecurity Forum with a discussion on patient privacy in an era of widespread data sharing. Allen wanted to use her expertise in law and…

  • "Gen Z Internet Users "Normalize" Cybercrime - Report"

    A new study conducted by researchers at the University of East London (UEL) has found that a large proportion of young internet users are engaging in some form of cyber-related crimes, including money muling, digital piracy, and posting hate speech.…

  • "FCC's Proposal to Strengthen Emergency Alert Security Might Not Go Far Enough"

    The US Federal Communications Commission (FCC) issued a Notice of Proposed Rulemaking (NPRM) in October to bolster the security of the nation's Emergency Alert System (EAS) and Wireless Emergency Alerts (WEA). These systems alert the public about…

  • "Amnesty International Canada Says It Was Hacked by Beijing"

    The Canadian branch of Amnesty International recently announced that it was the target of a cyberattack sponsored by China.  The human rights organization said it first detected the breach on October 5th and hired forensic investigators and…

  • "Iran-Backed Hackers Linked to Espionage Campaign Targeting Journalists and Activists"

    According to Human Rights Watch, hackers backed by the Iranian government targeted human rights activists, journalists, diplomats, and politicians working in the Middle East as part of an ongoing social engineering and credential phishing campaign. Human…