News
  • "Low-Power Encrypted Computing Solutions"
    The smart devices we use in our daily lives, such as smartphones, smartwatches, and smart health devices, generate large amounts of data. As the number of data sources such as these low-resource client devices continues to grow, the demand for…
  • "Senate Passes Strengthening American Cybersecurity Act"
    The United States Senate has passed the Strengthening American Cybersecurity Act, requiring critical infrastructure operators and federal agencies to report cyberattacks within 72 hours and ransomware payments within 24 hours.  The Act combines…
  • "Vulnerabilities in Over 100k Medical Infusion Pumps"
    Security researchers at Palo Alto Network's Unit 42 have discovered that most smart medical infusion pumps have known security gaps that make them vulnerable to hackers.  Smart infusion pumps are network-connected medication delivery devices that…
  • "Taking a Systems Approach to Cybersecurity"
    A new study conducted by researchers at the International Institute for Applied Systems Analysis (IIASA) proposes a framework that takes a more holistic approach to cybersecurity. They also proposed a model that explicitly represents multiple dimensions…
  • "Researchers Show They Can Steal Data During Homomorphic Encryption"
    Researchers at NC State University have demonstrated that it is possible to steal data during homomorphic encryption. Homomorphic encryption has been highlighted as a next-generation data security technology, but the team discovered a vulnerability that…
  • "Phishing Campaign Targeted Those Aiding Ukraine Refugees"
    According to a new report from researchers at Proofpoint, cyberattackers are using a compromised Ukrainian military email address to deliver malicious macros to EU government employees who have been helping manage the logistics of refugees fleeing…
  • "HSB Survey Finds EV Security Fears"
    According to new research, small business owners in America are expanding their service fleets with electric vehicles (EVs) despite having fears about the machines’ cybersecurity.  An online survey for the Hartford Steam Boiler Inspection and…
  • "Most Disclosed ICS Vulnerabilities are Low Complexity"
    Securing researchers at Claroty during new research have found that industrial control system (ICS) vulnerability disclosures have surged, and most vulnerabilities reported are low complexity.  The researchers found that the volume of disclosures…
  • "Conti Ransomware Source Code Leaked"
    A hacker claiming to be Ukrainian has leaked Conti ransomware source code after the cybercrime gang behind the ransomware showed support for Russia. The Conti ransomware group released a statement saying it would target the critical infrastructure of…
  • "The Biggest Threat to ICS/OT Is a Lack of Prioritization"
    Findings from a survey conducted by the SANS Institute suggest that cyberattackers have a robust understanding of Operational Technology (OT) and Industrial Control System (ICS) engineering, as they have executed attacks that can gain access and impact…
  • "Personal Data From T-Mobile Breach Still Spreading on Dark Web, State Governments Warn"
    The top law enforcement officials from multiple states are alerting people affected by an August 2021 breach at T-Mobile that their personal data might be circulating in cybercrime forums online.  New York Attorney General Letitia James stated that…
  • "NATO Completes Quantum-Safe Comms Test"
    NATO has successfully completed a trial of new “quantum-safe” technology designed to mitigate the future risks posed by quantum computers cracking asymmetric cryptography.  A company called Post Quantum revealed that the NATO Cyber Security Centre (…