News
-
"A Security Technique to Fool Would-Be Cyber Attackers"Researchers at the Massachusetts Institute of Technology (MIT) have demonstrated a new technique that protects a computer program's secret information from attackers while enabling faster computation. Multiple programs running on the same computer may…
-
"Log4j Vulnerabilities Put Strain on Overburdened Cybersecurity Workforce"Since the discovery of Apache Log4j vulnerabilities in 2021, the cybersecurity workforce has been trying to patch systems, reduce the intensity of network intrusions, and manage other critical activities at the same time. The significance of these…
-
Cybersecurity Snapshots #27 - Organizations Are Urged to Be On the Lookout for Potential Russian CyberattacksCybersecurity Snapshots #27 - Organizations Are Urged to Be On the Lookout for Potential Russian Cyberattacks
-
Cyber Scene #65 - Cyber Front Strategic Update: Not Quiet on Western, or Any FrontsCyber Scene #65 - Cyber Front Strategic Update: Not Quiet on Western, or Any Fronts
-
"Ukrainian Cops Bust Prolific Phishing Group"Ukrainian police have arrested a phishing gang that allegedly tricked tens of thousands of victims into handing over their credit card details on spoofed sites. The five individuals reportedly made over five million hryvnias ($172,600) from their…
-
"Hyper-Growth Linked to Higher Hacking Risk"Security researchers at Beyond Identity have found that companies with a compound annual growth rate (CAGR) of 40% or higher are more likely than companies growing at a standard rate to have suffered ten or more cybersecurity breaches. The…
-
Spotlight on Lablet Research #27 - Formal Approaches to the Ontology and Epistemology of ResilienceSpotlight on Lablet Research #27 - Formal Approaches to the Ontology and Epistemology of Resilience
-
"Toward a Stronger Defense of Personal Data"Researchers at the Massachusetts Institute of Technology (MIT) developed an Application-Specific Integrated Circuit (ASIC) chip to defend Internet of Things (IoT) devices against power-based side-channel attacks. A side-channel attack is a security…
-
"CISA Launches New Catalog of Free Public and Private Sector Cybersecurity Services"The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) published a new catalog of free public and private sector cybersecurity services and tools that organizations of all sizes can use in order to reduce their…
-
"Global Consensus Emerges to Secure Internet-Connected Home and Wearable Devices"The global market size of the consumer Internet of Things (IoT) is expected to grow from $45 billion in 2022 to $154 billion by 2028. In conjunction with the increasing use of connected devices is the growth in cyber threats as new products introduce…
-
"FlexBooker Data Leak Impacts Millions of End Customers"An online booking software provider unwittingly leaked the details of millions of customers online after misconfiguring a cloud storage solution, according to researchers at vpnMentor. The researchers found the leak on January 23 and traced it back…
-
Pub Crawl #59Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.