News
  • Defeating malicious cyber actors requires partnerships
    ANNAPOLIS, Md.  –  Participating on a panel alongside other high-level officials from the federal, state and private sector, National Security Agency Deputy Director George Barnes discussed NSA’s role within the nation’s shared…
  • "New Project Uses Empathy to Teach Students about Cybersecurity and AI Ethics"
    Empathy is essential in almost every aspect of daily life, but it is often overlooked in the development of technology, especially technology in which Artificial Intelligence (AI) is used. Researchers at the School of Information Sciences at the…
  • "IoT: Security Researchers Warn of Vulnerabilities in Hospital Pneumatic Tube Systems"
    Cybersecurity researchers at Armis have detailed a set of nine security vulnerabilities, dubbed PwnedPiper, that were discovered in the system controlling the pneumatic tube networks used in thousands of hospitals worldwide. The exploitation of these…
  • "CISA Launches US Federal Vulnerability Disclosure Platform"
    Bug hunters who want to help the US federal government secure their online assets can now source all the relevant information from a vulnerability disclosure policy (VDP) platform offered by the Cybersecurity and Infrastructure Security Agency (CISA). In…
  • "Russians Tied To The SolarWinds Cyberattack Hacked Federal Prosecutors, DOJ Says"
    The Justice Department recently discovered that the Russian hackers behind the massive SolarWinds cyberespionage campaign broke into the email accounts of some of the most prominent federal prosecutors' offices around the country last year. The…
  • "Android Banking Trojan 'Vultur' Abusing Accessibility Services"
    An Android banking Trojan dubbed Vultur, first identified in March 2021, relies on screen recording and keylogging instead of HTML overlays to capture login credentials. According to security researchers at ThreatFabric, Vultur uses the Virtual Network…
  • "FAU Invention for Privacy of Sharing Files Online Gets U.S. Patent"
    Advancement has been made in secure online file-sharing by a scientist from Florida Atlantic University's (FAU) College of Engineering and Computer Science. Hari Kalva, Ph.D., inventor, associate chair, and professor in the Department of Electrical…
  • "Dozens of Active Cozy Bear C2 Servers for Data-Stealing Malware Identified"
    Researchers from RiskIQ's Team Atlas reported having identified more than 30 active command-and-control (C2) servers being used by APT29, a Russia-backed advanced persistent group, in a campaign to deliver WellMess and WellMail malware. These malware…
  • "Curious to See How Healthcare Cybersecurity Fared This Year?"
    In a new report, CynergisTek reviewed just under 100 assessments of healthcare providers across hospitals, physician practices, Accountable Care Organizations (ACOs), and Business Associates. These assessments measure organizations’ security posture…
  • "Researchers Publish Details on Recent Critical Hyper-V Vulnerability"
    Security researchers at Guardicore Labs have shared details of a critical vulnerability in Hyper-V, tracked as CVE-2021-28476, with a CVSS score of 9.9. The vulnerability impacts Hyper-V's virtual network switch driver (vmswitch.sys). If exploited by…
  • "Criminals Are Using Call Centers to Spread Ransomware in a Crafty Scheme"
    Palo Alto Networks originally discovered the ransomware campaign “BazaCall” in February.  Adversaries lure in targets with an email during the campaign, suggesting that a subscription for a service, such as a gym membership, is expiring. Recent…
  • "Honeypot Security Technique Can Also Stop Attacks in Natural Language Processing"
    The growing sophistication of online fake news detectors and spam filters is accompanied by the increasing advancement of attacker's methods for tricking them. These methods include attacks through the "universal trigger." This learning-based method…