News
-
"Blind Spots and How to See Them: Observability in a Serverless Environment"Serverless computing, also known as functions-as-a-service (FaaS), is becoming popular among companies that are adopting a DevOps culture and the cloud. The use of serverless technology enables resource-intensive operational tasks to be performed by…
-
"Financial Firms Not Getting Basics Right on Cyber: UK Watchdog"UK financial firms will face punishment by Britain's Financial Conduct Authority (FCA) for having inadequate cyber practices. Many firms still have vulnerabilities in relation to the identification of key assets, detection, and more. This article…
-
"Agencies Will Soon Have a Cyber Hygiene Score—And Will Know Where They Rank"The data from cybersecurity tools provided to federal agencies by the Homeland Security Department’s Continuous Diagnostics and Mitigation program will be used to compile cyber scores. Cyber scores will indicate the cybersecurity postures of federal…
-
"Consistent Deception vs. a Malicious Hacker"Computer scientists at Binghamton University are working to increase the effectiveness of cyber deception tools against malicious hackers. Cyber deception is a security defense method that can be used to detect, deceive, and lure attackers away from…
-
"More Than 6,500 Dark Web Sites Erased By Hackers"The hacking of one of the most popular Dark Web hosting services, called Daniel's Hosting, has resulted in the take down of over 6,500 websites hidden within the dark web. A PHP zero-day vulnerability could have been abused in this attack. This…
-
"WordPress Exploit in GDPR Plugin Puts 100,000 Websites at Risk"A WordPress plugin intended to help site owners adhere to the General Data Protection Regulation (GDPR) was found to be containing a vulnerability that could allow attackers to take control of websites. The vulnerability affected over 100,000 websites.…
-
"Two U.S. Hospitals Hit with Ransomware"Two hospitals, which are owned by Ohio Valley Health Services and Education Corporation, were recently hit by ransomware attacks. The attacks significantly affected the operations of both hospitals, limiting emergency room acceptance to walk-in patients…
-
"Researchers Aim to Prevent Medical Imaging Cyberattacks"Researchers from Ben-Gurion University of the Negev have conducted studies centered on improving the security of medical imaging devices such as CT and mammography machines against cyberattacks. The increased connectivity of such devices makes them more…
-
"Rowhammer Data Hacks Are More Dangerous Than Anyone Feared"Rowhammer is a hacking technique that attackers can use to cause electromagnetic leakage in a computer's memory chip and trigger bit flips in the data stored in memory. The data changes resulting from a Rowhammer attack can be used by attackers to obtain…
-
SoS Musings #20 - Time to Get Rural America up to Cyber SpeedSoS Musings #20 Time to Get Rural America up to Cyber Speed
-
Cyber Scene #28 - Regulation: Variations on a ThemeCyber Scene #28 - Regulation: Variations on a Theme