News
-
"Android Security Vulnerabilities Differ by Country, Say Researchers"According to researchers at F-Secure, Android devices manufactured by Huawei, Samsung, Xiaomi, and others are being shipped and sold with significantly different levels of on-board security in different regions. The differences in Android security…
-
"Malware Opens RDP Backdoor Into Windows Systems"Researchers at SentinelOne have discovered a new version of the Sarwent malware. Sarwent is a malware that started as a loader for other malware but has recently been updated with more functionalities. The new variant of Sarwent can open…
-
SoS Musings #37 - The Double-Edged Sword of AI and MLSoS Musings #37 - The Double-Edged Sword of AI and ML
-
Cyber Scene #44 - Tracing Tracks: So Near Yet So Far AwayCyber Scene #44 - Tracing Tracks: So Near Yet So Far Away
-
Cybersecurity Snapshots #6 - Will Biometric Authentication Soon Replace Password Authentication?Cybersecurity Snapshots #6 - Will Biometric Authentication Soon Replace Password Authentication?
-
Spotlight on Lablet Research #6 - Contextual Integrity for Computer SystemsSpotlight on Lablet Research #6 - Project: Contextual Integrity for Computer Systems
-
"Hackers Can Target Rockwell Industrial Software With Malicious EDS Files"Rockwell Automation and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) published advisories about vulnerabilities associated with the Electronic Data Sheet (EDS) subsystem discovered by researchers at the industrial cybersecurity firm…
-
The Queens of CodeThe Queens of Code will be presenting four talks about NSA’s Computing Women from the 60s, 70s, and 80s as part of the Cyber Center for Education & Innovation (CCEI) series on the NEPRIS platform. These computing pioneers contributed to early…
-
"70 Percent of Mobile, Desktop Apps Contain Open-Source Bugs"Researchers at Veracode analyzed 351,000 external libraries in 85,000 applications and found that open-source libraries are widespread. Many application developers use open-source libraries to help create their applications because it allows them…
-
Pub Crawl #38Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
-
"DOE Says Supercomputers Handling COVID-19 Data Are Hacker Targets"The Department of Energy (DOE) has observed a surge in cyberattacks against national laboratories and interest in U.S. coronavirus research from foreign nations. The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) are currently…
-
"The Dark Web is Flooded With Offers to Purchase Corporate Network Access"Researchers from Positive Technologies have found an increase in interest in accessing corporate networks on the dark web. In Q1 2020, the number of postings advertising access to these networks increased by 69 percent compared to the previous…