News
  • "Modern Attacks Include Supply Chain 'Hopping' and Reversing Agile Environments"
    Cybercriminal groups are getting more creative in the execution of attacks against digitally transformed and agile environments, as indicated by a new report by VMware Carbon Black. According to the report, more than 80% of attacks now include cases…
  • Michael Rausch & William Sanders win Best Paper Award at QEST 2020
    Congratulations to Michael Rausch & William Sanders for winning the Best Paper Award at QEST 2020!  "Sensitivity Analysis and Uncertainty Quantification of State-Based Discrete-Event Simulation Models through a Stacked Ensemble of Metamodels…
  • Himanshu Neema wins Best Paper Award at HoTSoS 2020
    Congratulations to Himanshu Neema for winning the Best Paper Award at HoTSoS 2020!  "Simulation Testbed for Railway Infrastructure Security and Resilience Evaluation" was submitted to HoTSoS 2020 earlier this year and presented by Dr. Neema, on…
  • "NSA Warns Defense Contractors of Recent Chinese Government-Backed Hacking"
    The National Security Agency (NSA) is warning that defense contractors should be wary of Chinese government-backed hackers who are actively exploiting a multitude of known vulnerabilities. The hackers are specifically going after 25 known vulnerabilities…
  • "$1M Cyber Resiliency Fund Launched to Support Security Operations Impacted by Pandemic"
    The Cybersecurity Collaborative is a membership organization that facilitates the collaboration between senior cybersecurity leaders to share best practices and address complex enterprise security challenges. Together with its parent CyberRisk Alliance,…
  • "75% U.S. States and Territories Graded 'C' for Poor Cybersecurity"
    A survey conducted by the cybersecurity firm SecurityScorecard found that more than 75% of U.S. states and territories have a 'C' grade or lower in regard to cyberhealth, making their IT infrastructure three times more likely to be hit with a…
  • "Microsoft is the Most-Imitated Brand for Phishing Emails"
    Researchers at Check Point have found that hackers are impersonating Microsoft and using Microsoft products and services in nearly a fifth of all global brand phishing attacks in the third quarter of this year.  Adversaries are still trying to…
  • "Research to Bring More Secure Software for Autonomous Battlefield Operations"
    In collaboration with Princeton University, Purdue University will lead research on the protection of Artificial Intelligence (AI) software in drones and other autonomous systems used on the battlefield to save human lives. The project aims to bolster…
  • "SocialBlock: Technology That Could Improve Data Security in Smart Cities"
    Smart cities refer to urban areas that employ different types of technologies to improve upon the quality of life for those residing in these areas. As these technologies are expected to serve whole urban regions in the future, it is essential to develop…
  • "Critical Vulnerability Allows Hackers to Disrupt SonicWall Firewalls"
    Researchers at Tripwire and Positive Technologies discovered a critical vulnerability that impacts several versions of SonicOS, the operating system run by SonicWall firewalls. The researchers have described the flaw as a stack-based buffer overflow.…
  • "Cybercrime Losses Up 50%, Exceeding $1.8B"
    Fewer organizations are reporting cyber incidents. However, for those that are experiencing these incidents, the attacks have increased in severity. According to the 2020 Cyber Readiness Report released by Hiscox, a Bermuda-based insurance provider, the…
  • "VoIP Firm Broadvoice Leaks 350 Million Customer Records"
    Researchers discovered 10 unprotected Elasticsearch database clusters belonging to Broadvoice on October 1st that contained over 350 million customer records.  One of the databases included more than 275 million records. The records included full…