News
  • "DHS S&T Seeks Solutions to Software Vulnerabilities"

    The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has announced a new solicitation in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA) that addresses vulnerabilities in software, which is…

  • "Lithuanian Energy Firm Disrupted by DDOS Attack"

    Lithuanian energy company Ignitis Group was recently hit by what it described as its "biggest cyberattack in a decade" when numerous distributed denial of service (DDoS) attacks were aimed at it, disrupting its digital services and websites.  Pro-…

  • "Spike in Amazon Prime Scams Expected"

    For online shoppers, Amazon Prime Day has become an annual retail event, an opportunity to pick up bargains and save money.  Security researchers at Avanan have warned of an increase in phishing and credential harvesting email attempts in June…

  • "Researchers Defeat Facial Recognition Systems With Universal Face Mask"

    A team of researchers at Ben-Gurion University of the Negev and Tel Aviv University have proven that it is possible for attackers to create a face mask capable of defeating modern facial recognition systems. They validated the effectiveness of their…

  • "'Callback' Phishing Campaign Impersonates Security Firms"

    A new callback phishing campaign impersonates well-known security firms in order to trick potential victims into making a phone call that will instruct them to download malware. CrowdStrike Intelligence researchers discovered the campaign because…

  • "Paladin Cloud Launches New Cloud Security and Governance Platform"

    Securing the infrastructure remains challenging as more organizations migrate their data, applications, and workloads to the cloud. Because security teams do not always know what is going on in each cloud environment, it is difficult to detect when…

  • "Hackers Can Unlock Honda Cars Remotely in Rolling-PWN Attacks"

    A group of security researchers discovered that several modern Honda vehicle models have a vulnerable rolling code mechanism that allows remote unlocking and engine starting. The vulnerability, called Rolling-PWN, enables replay attacks in which a threat…

  • "Building Trust and Protecting Data to Support Kids in Iowa"

    Determining whether early childhood services should be improved or expanded needs good data, but obtaining that data is difficult when the entities providing resources and support to families with young children, such as federal and state departments,…

  • "NSA Issued an Advisory for System Administrators to use PowerShell for Detecting Malicious Activity"

    NSA recommends that system administrators use PowerShell to manage systems. The Windows program can detect and prevent hacking and other suspicious activity. This tool with its inherent security features can be helpful to admins trying to defend systems…

  • "Your Brain Is Better at Busting Deepfakes Than You"

    Deepfake videos, images, audio, or text may appear to be authentic, but they are computer-generated clones intended to mislead people and sway public opinion. They are used to spread disinformation and appear in cybersecurity, politics, counterfeiting,…

  • "Pro-Russian Cybercriminals Briefly DDoS Congress.gov"

    Recently a pro-Russian cybercrime group attacked the Congress.gov web domain resulting in temporary downtime that "briefly affected public access," the Library of Congress stated.  KillNet, a pro-Russian group, launched a series of distributed…

  • "Twitter Says it Removes 1 Million Spam Accounts a Day"

    Twitter recently announced that it removes 1 million spam accounts each day.  Twitter said the spam accounts represent well below 5% of its active user base each quarter. To calculate how many accounts are malicious spam, Twitter reviews “…