-
"Threat Actor Phishing PyPI Users Identified"A previously unknown group dubbed "JuiceLedger" has been identified as the threat actor behind a recent phishing campaign specifically targeting users of the Python Package Index (PyPI). The threat actor first appeared earlier this year and is focused on…
-
"Researcher Unveils Smart Lock Hack for Fingerprint Theft"A paper recently published by James Cook University Singapore describes how an attacker could covertly harvest fingerprints using off-the-shelf hardware through a smart lock hack technique called droplock. According to author and senior cybersecurity…
-
"Google Chrome Bug Lets Sites Silently Overwrite System Clipboard Content"A security flaw in Google Chrome and Chromium-based alternatives could allow malicious web pages to overwrite clipboard content without user consent or interaction simply by visiting them. According to developer Jeff Johnson, the clipboard poisoning…
-
"Health-ISAC Provides Zero Trust Security Guidance to Healthcare CISOs"The Health Information Sharing and Analysis Center (Health-ISAC) published a guide to help healthcare CISOs better understand and implement zero trust security strategies. Identity and Access Management (IAM), cloud security gateways, data and network…
-
"Privacy-Preserving Camera Captures Only the Objects You Want"Digital cameras are present in embedded in smartphones, smart eyewear, security surveillance systems, autonomous vehicles, facial recognition technologies, and more. As the volume of image data captured by cameras has increased, so have concerns about…
-
"NCSC and Federal Partners Focus on Countering Risk in Digital Spaces During National Insider Threat Awareness Month 2022"The National Counterintelligence and Security Center (NCSC), the National Insider Threat Task Force (NITTF), the Office of the Under Secretary of Defense Intelligence and Security, the Defense Counterintelligence and Security Agency (DCSA), and the…
-
"NSA, CISA, ODNI Release Software Supply Chain Guidance for Developers"The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and the Office of the Director of National Intelligence (ODNI) have released the guide, "Securing the Software Supply Chain for Developers." The guidance is…
-
"Apple Releases Update for iOS 12 to Patch Exploited Vulnerability"Apple has recently released an iOS 12 update for older iPhone and iPad devices, patching a vulnerability that was reportedly exploited by threat actors. According to Apple, the flaw would allow the processing of maliciously crafted web content,…
-
"Ragnar Locker Ransomware Targets Energy Sector, Cybereason Suggests"On Saturday, August 20, Greece’s largest natural gas supplier DESFA said it was hit by a cyberattack that impacted the availability of some of its systems. Ragnar Locker hacking group claimed responsibility for the ransomware attack, saying it had…
-
"UW-Platteville Faculty, Student Researchers to Create Microgrid Cybersecurity Testbed"A team of University of Wisconsin (UW)-Platteville faculty and student researchers seek to contribute solutions to the growing threat of cyberattacks on critical infrastructure. UW-Platteville will soon house a smart microgrid cybersecurity testbed with…
-
"Ransomware Attacks Target Government Agencies in Latin America"Several government agencies in Latin America have been targeted in ransomware attacks in the past months, and the latest victims are Chile and the Dominican Republic. Chile's Ministry of Interior recently reported that a government agency had its…
-
"DoD Grants Fund Cybersecurity Research for Maritime Industry"The Department of Defense (DoD) has made millions of dollars in grant funding available to a Rhode Island research consortium that will fund cybersecurity and supply chain research for the maritime industry. The DoD designated six new Defense…
News