News
-
"AI-Designed Camera Only Records Objects of Interest While Being Blind to Others"Digital cameras have been widely adopted in various aspects of society and are now widely used in mobile phones, security surveillance, autonomous vehicles, and facial recognition. Huge amounts of image data are generated by these cameras, thus raising…
-
"Universal Database of Device Vulnerability Information Launched"A universal database of agentless devices currently being used on enterprise networks has been announced by DeviceTotal. The new repository allows the company's customers to identify the accurate security posture for each device in their…
-
"Creating the Culture: Professor's Fulbright Research Examines Cybersecurity Threats Through the Lens of Newly Tech-Reliant Countries"Maurice Dawson, assistant professor of information technology and management at the Illinois Institute of Technology, used his award from the US Fulbright Scholar Program to investigate cybersecurity issues in developing countries and their global impact…
-
"Cyberattacks a Growing Threat to Farm, Food Security, Warn U of G Researchers"According to Dr. Ali Dehghantanha, a University of Guelph (UG) computer scientist, the threat of cyberattacks against Canadian farmers is growing as they adopt more on-farm smart technologies. His lab is the only Canadian university research center…
-
"Which Security Bugs Will Be Exploited? Researchers Create an ML Model to Find Out"The University of Maryland at College Park and Arizona State University researchers are attempting to give companies additional information on which vulnerabilities could be or are likely to be exploited. Using machine learning trained on data from…
-
"U.S. Cyber Command Completes Defensive Cyber Mission in Croatia"A U.S. Cyber Command team of defensive cyber experts returned from Croatia last month, where they were dispatched on a so-called “hunt forward” operation. This mission is the 35th proactive cyber defense mission to be undertaken by the command as…
-
"Software Developer Cracks Hyundai Car Security with Google Search"Daniel Feldman, a software engineer, based in Minneapolis, Minnesota, wanted to customize the in-vehicle infotainment (IVI) system in his 2021 Hyundai Ioniq SEL. He discovered that the car's manufacturer had secured its system using keys that were not…
-
"A Janet Jackson Song Could Crash Windows XP Laptops"According to a Microsoft software engineer, a sound frequency in Janet Jackson's famous Rhythm Nation song could disrupt a laptop hard drive used in a number of Windows XP notebook models. In a blog post, Microsoft software engineer Raymond Chen…
-
"Quarter of All Gambling Sites Hit by DDoS Attacks in June"Security researchers at Imperva have found that a quarter of all gambling sites were hit with distributed denial-of-service (DDoS) attacks executed by botnets in June. The researchers stated that the figures suggest DDoS attacks increased and…
-
"Russian Man Extradited to US for Laundering Ryuk Ransomware Money"A Russian national has recently been extradited from the Netherlands to the United States, where he faces charges related to his alleged role in the Ryuk ransomware operation. The suspect is 29-year-old Denis Mihaqlovic Dubnikov, whose trial is…
-
"New Threat Intelligence Solution Launched by Google Cloud"With the threat landscape becoming increasingly complex and security teams' environments gradually expanding to keep up, an increasing number of organizations are looking to do more with less. Threat intelligence is one of the key technologies enabling…
-
"BlackByte Ransomware Gang Is Back with New Extortion Tactics"The BlackByte ransomware has returned with version 2.0 of their operation, which includes a new data leak site and new extortion techniques adapted from LockBit. Following a brief hiatus, the ransomware operation is now promoting a new data leak site on…