News
  • "Does Your Cybercrime Prevention Program Work?"
    KELA surveyed 400 security team members in the US responsible for gathering cybercrime threat intelligence to learn more about whether they are proactively scanning the dark web and other cybercriminal sources, what tools they are using, what gaps exist…
  • "Standards Body Publishes Guidelines for IoT Security Testing"
    A leading industry standards community called the Anti-Malware Testing Standards Organization (AMTSO) has published its first guidelines for the testing of IoT security products in a bid to drive independent benchmarking and certification efforts. AMTSO…
  • "REvil Claims Ransomware Attack on Multi-Billion-Dollar Manufacturing Giant Midea Group"
    The REvil ransomware gang has claimed responsibility for an attack on Midea Group, a Chinese electrical appliance manufacturer, and has already published what is suspected to be stolen data. The once-dominant REvil ransomware gang, also known as…
  • "Researchers Detail Emerging Cross-Platform BianLian Ransomware Attacks"
    The operators of the emerging cross-platform BianLian ransomware have increased their command-and-control (C2) infrastructure, indicating an increase in the group's activities. BianLian, which is written in the Go programming language, was discovered in…
  • "Over 1,000 iOS Apps Found Exposing Hardcoded AWS Credentials"
    Mobile app developers are using insecure practices that expose Amazon Web Services (AWS) credentials, making the supply chain vulnerable. Malicious actors could use this to gain access to private databases, resulting in data breaches and the exposure of…
  • "Hackers Compete To Confound Facial Recognition"
    Hackers are invited to participate in a new competition aimed at exposing vulnerabilities in facial recognition technology and raising awareness of the potential risks. Since 2019, the Machine Learning (ML) Security Evasion Competition has been a staple…
  • "Rensselaer To Advance Blockchain Tech"
    The Algorand Foundation has awarded $363,343 to Rensselaer Polytechnic Institute's Oshani Seneviratne, director of health data research at the Institute for Data Exploration and Applications (IDEA), and Lirong Xia, associate professor of computer science…
  • "FBI Official Explains Top Challenges in Securing Mobile Tech"
    The FBI has identified three top challenges that the agency plans to address as it prepares to make greater use of mobile technologies. Katie Noyes, the FBI's senior strategic advisor for technology policy, discussed a variety of 5G wireless technologies…
  • "Fixing the Noise Problem in Quantum Computing"
    Research conducted by Xiu Yang, an assistant professor of industrial and systems engineering in Lehigh University's P.C. Rossin College of Engineering and Applied Science, could accelerate the real-world adoption of quantum computing in various fields,…
  • "Collaboration, Training Key To Local Gov Cyber Defense, Officials Say"
    A recent cyberattack on Fremont County, Colorado, highlighted the importance of governments being prepared for hacks in the face of ever-changing cyber threats by increasing collaboration and free training. The attack disrupted government services,…
  • "Quantum Computing Vulnerabilities of National Critical Functions"
    Future quantum computing capabilities will be capable of breaching the security of current public-key cryptography implementations. Public-key cryptography is the fundamental building block for the security of national information and communication…
  • "Financial Data Inexpensive for Cybercriminals to Purchase Online"
    The cost of compromised data and accounts can be high regarding time and money for bank victims of identity theft or account infiltration. However, the price for cybercriminals who access or sell this information could be as low as the cost of a large…