News
-
Spotlight on Lablet Research #16 - Securing Safety-Critical Machine Learning AlgorithmsSpotlight on Lablet Research #16 - Project: Securing Safety-Critical Machine Learning Algorithms
-
Cybersecurity Snapshots #16 - REvil/Shodinokibi Was the Most Widespread Ransomware in 2020Cybersecurity Snapshots #16 - REvil/Shodinokibi Was the Most Widespread Ransomware in 2020
-
"CISA Warns of Security Flaws in GE Power Management Devices"The U.S. Cybersecurity & Infrastructure Security Agency (CISA) is warning of critical-severity security flaws in GE’s Universal Relay (UR) family of power management devices. GE’s UR devices are computing devices that allow users to control the…
-
"Shell Latest to Fall to Accellion FTA Exploits"The oil giant Shell is a customer of Accellion's File Transfer Appliance (FTA) product and is the latest company to announce that they were affected by a data breach due to adversaries targeting vulnerabilities in the legacy file transfer software.…
-
"COVID-19 Related Cyber-Attacks Leveraged Government Announcements"Researchers from the University of Oxford, WMG, University of Warwick, Abertay University, University of Kent, and the University of Strathclyde worked together in a study titled, "Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-…
-
"CopperStealer Malware Infected up to 5,000 Hosts per Day Over First Three Months of 2021"CopperStealer is a newly documented China-based malware that has stolen user credentials on major platforms, including Facebook, Instagram, Apple, Amazon, Bing, PayPal, Tumblr, Twitter, and Google. Proofpoint researchers were first alerted about the…
-
"Critical Security Bugs Fixed in Virtual Learning Software"Researchers at McAfee Labs Advanced Threat Research discovered critical vulnerabilities in the Netop Vision Pro system that could allow attackers to hijack school networks, deliver malware, determine students' IP addresses, eavesdrop, and more. …
-
"Tool Created to Aid Cleanup From Microsoft Hack in Broad Use"Microsoft released a new one-click tool called the Microsoft Exchange On-Premises Mitigation Tool to help businesses protect themselves from threats associated with the recent Microsoft email server software hack. According to the White House's…
-
Pub Crawl #48Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
-
"Twitter Images Can Be Abused to Hide ZIP, MP3 Files"Security researcher and programmer David Buchanan has discovered a new steganography method that involves hiding up to three MB of data inside a Portable Networks Graphics (PNG) image file posted on Twitter. Cybercriminals can use steganography to hide…
-
"DHS CISA Shares Incident Response Tool for On-Prem Threat Activity"The CISA Hunt and Incident Response Program (CHIRP) is a new forensics collection tool developed by the U.S. Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) to help network defenders detect signs of advanced…