News
-
"Columbia Engineering Team Builds First Hacker-Resistant Cloud Software System"Columbia Engineering researchers have developed SeKVM, the first formally verified system that guarantees the security of virtual machines in the cloud. Formal verification is a process that proves the mathematical correctness of software, correct…
-
"New AI Technology Protects Privacy in Healthcare Settings"An interdisciplinary team of researchers from the Researchers from Imperial and Imperial College London (ICL), Technical University Munich (TUM)), and the non-profit organization OpenMined developed new technology to protect personal patient data while…
-
"Malware Used Zero-Day Exploit to Take Screenshots of Victims' Macs"Apple has patched a vulnerability, discovered by Jamf researchers, that malware actors have been exploiting to circumvent the Transparency Consent and Control (TCC) framework. The evasion of this framework allows the actors to take screenshots of an…
-
SoS Musings #49 - 911: We Have a Cybersecurity EmergencySoS Musings #49 - 911: We Have a Cybersecurity Emergency
-
Cyber Scene #56 - Part Deux: Cyber Climate Change with Chinese CharacteristicsCyber Scene #56 - Part Deux: Cyber Climate Change with Chinese Characteristics
-
"Bose Reveals Ransomware Attack Impacting Staff"Bose has told regulators that a sophisticated ransomware attack back in March led to unauthorized access of personal information on current and former employees. The company first detected the ransomware back on March 7, 2021. However, nearly two…
-
"UK Police Suffered Thousands of Data Breaches in 2020"Researchers at VPNoverview discovered that there were over 2300 data breach incidents reported by just 22 of the UK’s police forces in 2020. The researchers requested information from the UK’s 45 police forces and received responses from 31. …
-
"Not as Complex as We Thought: Cyberattacks on Operational Technology Are on the Rise"FireEye's Mandiant cyber forensics team has released a new report focusing on the attack rates on control processes supported by Operational Technology (OT). Attacks on the control processes were previously considered complex because of access…
-
"Cyber Insurance Industry Grapples With Evolving Security Risks"The growing frequency and severity of cyberattacks are increasing the demand for cyber insurance. However, a recent report from the US Government Accountability Office (GAO) reveals that insurers are struggling to adjust their policies to keep up with…
-
"New Bluetooth Vulnerabilities Could Expose Many Devices to Impersonation Attacks"Researchers with France's national cybersecurity agency ANSSI have identified seven new flaws that affect devices supporting Bluetooth Core and Mesh specifications. These specifications define technical and policy requirements for devices that operate…
-
"Three-Quarters of CISOs Predict Another SolarWinds-Style Attack"According to a new Splunk report, some 84% of global organizations have suffered a severe security incident over the past two years, and a majority are expecting another SolarWinds-style supply chain attack. Researchers interviewed 535 security…
-
"US to Regulate Pipeline Cybersecurity"The United States Department of Homeland Security (DHS) is to issue its first-ever set of cybersecurity regulations for pipelines. The news comes in the wake of a recent ransomware attack on the Colonial Pipeline that knocked operational systems…