Call for Papers: ARC 2025

Call for Papers: ARC 2025

The 21st International Symposium on Applied Reconfigurable Computing (ARC 2025)

April 9 - 10, 2025, Sevilla, Spain

Submitted by Regan Williams on

Disruption of Baltic Sea Undersea Cables Raises Concerns of Hybrid Warfare

Disruption of Baltic Sea Undersea Cables Raises Concerns of Hybrid Warfare

Two undersea internet cables in the Baltic Sea were disrupted, with officials citing possible physical damage and raising concerns about hybrid warfare. A cable between Lithuania and Sweden was confirmed cut on Sunday, while a Finnish-German cable experienced a sudden outage. Finnish and German foreign ministers expressed deep concern, linking the incidents to potential malicious activity. These disruptions follow recent U.S. warnings of increased Russian military activity around critical undersea infrastructure. Investigations are ongoing.

Submitted by Katie Dey on

New Study Examines the Effectiveness of Phishing Training Programs

New Study Examines the Effectiveness of Phishing Training Programs

A recent publication in the 2025 IEEE Symposium on Security and Privacy evaluates the impact of common enterprise security training methods, including annual cybersecurity awareness training and embedded anti-phishing exercises. Conducted by Stefan Savage (UC San Diego) and collaborators, the eight-month study involving over 19,500 employees at a large healthcare organization found minimal differences in phishing simulation failure rates between trained and untrained users.

Submitted by Katie Dey on

Anne Neuberger Addresses UN Security Council on Ransomware Threats to Healthcare

Anne Neuberger Addresses UN Security Council on Ransomware Threats to Healthcare

In remarks at the United Nations Security Council on November 8, 2024, Anne Neuberger, Deputy National Security Advisor of the United States, highlighted the grave impact of ransomware attacks on healthcare systems worldwide. Stressing the critical need for global cooperation, Neuberger called for adherence to international frameworks, stronger law enforcement actions, and collective efforts to disrupt ransomware operations. The remarks emphasized that ransomware targeting healthcare infrastructure endangers lives, destabilizes societies, and violates international norms.

Submitted by Katie Dey on

9th School of Theoretical Computer Science and Formal Methods (ETMF 2024)

The 9th edition of the School of Theoretical Computer Science and Formal Methods (ETMF 2024) is a premier event dedicated to advancing knowledge in the field of theoretical computer science and the application of formal methods to software and system development. ETMF provides an educational forum where researchers, students, and professionals from academia and industry can exchange ideas, learn about the latest developments, and explore practical applications of formal methods in various domains.

CISA Requests Comments on Product Security Bad Practices Guidance

CISA Requests Comments on Product Security Bad Practices Guidance

The Cybersecurity and Infrastructure Security Agency (CISA) invites feedback on its new guidance addressing “Product Security Bad Practices.” This guidance identifies security practices in product design and deployment that increase vulnerability to cyber threats. By highlighting and mitigating these bad practices, CISA aims to strengthen security standards across products and systems. Researchers, industry experts, and government stakeholders are encouraged to review the document and contribute comments to shape effective, secure product development practices.

Submitted by Regan Williams on

HCSS 2025

The twenty-fifth annual High Confidence Software and Systems (HCSS) Conference will be held May 12-14, 2025, at the Historic Inns of Annapolis in Annapolis, Maryland. We solicit proposals to present talks at the conference.

2025 RSA ID IQ Research Report Now Available

2025 RSA ID IQ Research Report Now Available

The newly released 2025 RSA ID IQ Research Report provides in-depth insights into identity security trends, challenges, and innovations shaping the cybersecurity landscape. This comprehensive report explores how organizations can strengthen their identity and access management strategies to counter evolving threats. For researchers and cybersecurity professionals, the findings offer valuable data on the latest best practices, risk mitigation techniques, and technology advancements in identity security. Access the full report to stay informed on key developments impacting the field.

Submitted by Regan Williams on
Subscribe to