News
  • "Phishing Attack Exploits Craigslist and Microsoft OneDrive"
    The email security provider Inky has released a report detailing a new phishing campaign in which both Craigslist and OneDrive are used to trick people into installing malware. The attackers behind the phishing campaign used different tactics to pull off…
  • "Hackers Target SMEs Using Bug in Popular Billing Software"
    A threat actor, which has not yet been identified, has been seen exploiting a vulnerability contained by the time and billing system BillQuick to execute ransomware attacks. Cybersecurity researchers at Huntress were alerted of an incident…
  • "Wardrivers Can Still Easily Crack 70% of Wi-Fi Passwords"
    Ido Hoorvitch, a security researcher at the identity and access management provider CyberArk discovered that he could recover network passwords for over 70 percent of the networks he scanned just by using information gathered as he biked, walked, or…
  • CfP: The AAAI-22 Workshop on Artificial Intelligence for Cyber Security (AICS)
    CALL FOR PAPERS Association for the Advancement of Artificial Intelligence (AAAI) Artificial Intelligence for Cybersecurity (AICS) Feb 22 - March 1, 2022  |  Vancouver, BC, Canada  |  http://aics.site/AICS2022
  • "Almost All US Organizations Experienced a Cyber Event in the Past Year"
    Security researchers at Deloitte did a new study where they surveyed  577 C-suite executives worldwide on their organization’s cybersecurity programs.  The researchers found that almost all (98%) US-based organizations and 86% of non-US…
  • Challenge Problem - CAGE Reinforcement Learning for Cyberdefense
    Recent advances in artificial intelligence (AI) technologies show promise for autonomous cyber operations (ACO), offering the potential for distributed, adaptive defensive measures at machine speed and scale. The cyber domain is a particularly…
  • "Global Security Skills Shortage Falls to 2.7 Million Workers"
    According to researchers at (ISC)2, the global cybersecurity skills shortage has fallen for the second consecutive year, but the size of the workforce is still 65% below what it needs to be.  The researchers interviewed 4,753 cybersecurity…
  • "Protecting Hardware from Software Attacks"
    The Defense Advanced Research Projects Agency's (DARPA) System Security Integration Through Hardware and Firmware (SSITH) program aims to develop Application-Specific Integrated Circuit (ASIC) hardware with new protections that can mitigate software…
  • "Critical Vulnerabilities Found in AUVESY Product Used by Major Industrial Firms"
    Researchers at the industrial cybersecurity firm Claroty discovered 17 types of vulnerabilities in the Versiondog data management product made by Germany-based AUVESY. The flaws, which have now been patched by the vendor, affected Versiondog, a product…
  • "REvil Hacking Gang Forced Offline In Multi-Country Operation"
    The Russia-based hacking gang REvil has been hacked and forced offline by law enforcement and intelligence agencies in the U.S. and partner countries. REvil was behind the ransomware attack against Colonial Pipeline in May, which led to a rise in gas…
  • "The Russian Hacker Group Behind The SolarWinds Attack Is At It Again, Microsoft Says"
    According to Microsoft, the group behind the SolarWinds attack, Nobelium, is now targeting technology companies that resell and provide cloud services for customers.  The researchers stated that Nobelium has been attempting to replicate the approach…
  • "BlackMatter Bug Saved Victims Millions in Ransom Payments"
    Security researchers at Emisoft claim to have saved BlackMatter ransomware victims millions over the past few months after exploiting a bug they found in the malware to recover files for free.  The researchers stated that they have been building…