News
-
"Pharma Giant Pfizer Exposes Patient Data on Unsecured Cloud Storage"The pharmaceutical giant Pfizer has experienced a data breach that exposes sensitive patient information. According to researchers at vpnMentor, the exposed data was discovered on a misconfigured Google Cloud storage bucket. The data included transcripts…
-
"Facebook: A Top Launching Pad For Phishing Attacks"Researchers have found that Facebook has been a top cybercriminal favorite in phishing attacks so far this year. There were 4.5 million phishing attempts on the social media platform between April and September 2020. Messenger app WhatsApp is…
-
"Safari, Other Mobile Browsers Affected by Address Bar Spoofing Flaws"A security researcher has recently discovered address bar spoofing vulnerabilities in several mobile browsers. These vulnerabilities could allow adversaries to trick victims into sharing sensitive information through legitimate-looking phishing…
-
"Modern Attacks Include Supply Chain 'Hopping' and Reversing Agile Environments"Cybercriminal groups are getting more creative in the execution of attacks against digitally transformed and agile environments, as indicated by a new report by VMware Carbon Black. According to the report, more than 80% of attacks now include cases…
-
Michael Rausch & William Sanders win Best Paper Award at QEST 2020Congratulations to Michael Rausch & William Sanders for winning the Best Paper Award at QEST 2020! "Sensitivity Analysis and Uncertainty Quantification of State-Based Discrete-Event Simulation Models through a Stacked Ensemble of Metamodels…
-
Himanshu Neema wins Best Paper Award at HoTSoS 2020Congratulations to Himanshu Neema for winning the Best Paper Award at HoTSoS 2020! "Simulation Testbed for Railway Infrastructure Security and Resilience Evaluation" was submitted to HoTSoS 2020 earlier this year and presented by Dr. Neema, on…
-
"NSA Warns Defense Contractors of Recent Chinese Government-Backed Hacking"The National Security Agency (NSA) is warning that defense contractors should be wary of Chinese government-backed hackers who are actively exploiting a multitude of known vulnerabilities. The hackers are specifically going after 25 known vulnerabilities…
-
"$1M Cyber Resiliency Fund Launched to Support Security Operations Impacted by Pandemic"The Cybersecurity Collaborative is a membership organization that facilitates the collaboration between senior cybersecurity leaders to share best practices and address complex enterprise security challenges. Together with its parent CyberRisk Alliance,…
-
"75% U.S. States and Territories Graded 'C' for Poor Cybersecurity"A survey conducted by the cybersecurity firm SecurityScorecard found that more than 75% of U.S. states and territories have a 'C' grade or lower in regard to cyberhealth, making their IT infrastructure three times more likely to be hit with a…
-
"Microsoft is the Most-Imitated Brand for Phishing Emails"Researchers at Check Point have found that hackers are impersonating Microsoft and using Microsoft products and services in nearly a fifth of all global brand phishing attacks in the third quarter of this year. Adversaries are still trying to…
-
"Research to Bring More Secure Software for Autonomous Battlefield Operations"In collaboration with Princeton University, Purdue University will lead research on the protection of Artificial Intelligence (AI) software in drones and other autonomous systems used on the battlefield to save human lives. The project aims to bolster…
-
"SocialBlock: Technology That Could Improve Data Security in Smart Cities"Smart cities refer to urban areas that employ different types of technologies to improve upon the quality of life for those residing in these areas. As these technologies are expected to serve whole urban regions in the future, it is essential to develop…