News
-
"Silkworm Security? Researchers Create New Authentication Method Using Silk Fibers"Researchers at the South Korean Gwangju Institute of Science and Technology (GIST) have developed a new way to improve digital security, which involves using silk as a security key. In a paper titled, "Revisiting silk: a lens-free optical physical…
-
"Most Ransomware Infections are Self-installed"New research from managed detection and response (MDR) provider Expel found that most ransomware attacks in 2021 were self-installed. The finding was included in the company’s inaugural annual report called Great eXpeltations. …
-
"FBI Warns of Hacker Attacks Conducted by Iranian Cyber Firm"The FBI this week issued a private industry notification to warn organizations about the malicious activities conducted by an Iranian cyber company named Emennet Pasargad. FBI noted that in addition to its election-focused operation, Emennet…
-
"Millions of Routers, IoT Devices at Risk as Malware Source Code Surfaces on GitHub"The authors of BotenaGo have uploaded the malware's source code to GitHub for other criminals to use as is or develop new variants. In November 2021, cybersecurity researchers at AT&T Alien Labs first discovered BotenaGo, which leverages more than 30…
-
“DazzleSpy Mac Malware Enabled Key-Logging, Screen Captures, File Extraction, and More”Security researchers have released details of Mac malware called DazzleSpy, which is capable of performing malicious activities such as key-logging, accessing the microphone, and taking screenshots. The malware was used in a watering hole attack against…
-
"LockBit Ransomware's Linux Version Attacks VMware ESXi Servers"The Linux version of the LockBit ransomware has been discovered targeting VMware ESXi virtual machines. Virtual machines are increasingly being used to conserve computer resources, consolidate servers, and facilitate backups, resulting in ransomware…
-
"White House Publishes Federal Zero Trust Strategy"On Wednesday, the White House released its federal zero trust strategy, requiring agencies to meet certain cybersecurity standards and objectives by the end of fiscal year 2024. The strategy builds upon the executive order signed by President Joe…
-
"#DataPrivacyWeek: Online Trackers Can Detect 80% of Users' Browsing History"Security researchers at NortonLifeLock have found that online trackers can capture up to 80% of users' browsing histories, with the practice far more pervasive than previously realized. The researchers analyzed online advertising trackers from October to…
-
Pub Crawl #58Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
-
"Linux Bug in All Major Distros: 'An Attacker's Dream Come True'"Qualys researchers warn of a 12-year-old memory-corruption bug in Polkit's pkexec tool, which impacts every major Linux distribution. According to the researchers, the exploitation of the vulnerability, tracked as CVE-2021-4034, allows any unprivileged…
-
"The Threat of Hardware Trojan Horses Is Bigger Than We Have Thought"Security researchers at the Tallinn University of Technology (TalTech) have demonstrated that Hardware Trojan Horses can be inserted into computer chips during the fabrication process. After finalizing their insertion methodology, the entire layout…
-
SoS Musings #57 - Securing Building Automation SystemsSoS Musings #57 - Securing Building Automation Systems