"Mason Professors Are Researching Hacker Psychology to Defend Against Cyberattacks"

"Mason Professors Are Researching Hacker Psychology to Defend Against Cyberattacks"

As part of the Intelligence Advanced Research Project Activity (IARPA) program called "Reimagining Security with Cyberpsychology-Informed Network Defense" (ReSCIND), researchers at George Mason University (GMU) will build defensive tools that first identify hackers' human flaws and then use them to defend against an attack. IARPA has turned its attention to exploiting the human factor, the weakest link in cyberattacks. Under the new IARPA program, researchers hope to gain further insight into hackers' cognitive vulnerabilities and decision-making biases to stop future attacks.

Submitted by grigby1 CPVI on

"TMU Professors' Cutting-Edge Research Will Prepare Energy Sector for Quantum Threats"

"TMU Professors' Cutting-Edge Research Will Prepare Energy Sector for Quantum Threats"

Toronto Metropolitan University (TMU) is leading a research project to identify quantum threats to smart grid cybersecurity and develop mitigation solutions to protect critical energy infrastructure. Quantum computers put utility infrastructure protected by current cybersecurity standards at risk for severe attacks that could result in total disruption. The project will identify vulnerabilities in generic power system models and show how an attack can disrupt the smart grid.

Submitted by grigby1 CPVI on

"Mind-Bending Maths Could Stop Quantum Hackers, but Few Understand It"

"Mind-Bending Maths Could Stop Quantum Hackers, but Few Understand It"

Nalini Joshi, a mathematics professor at the University of Sydney, highlights the development of new mathematical schemes to protect data against potential attacks from quantum computers. Powerful quantum computers will use the properties of the quantum world to decipher secrets exponentially faster than ordinary computers. While it remains unknown when quantum computers will be powerful enough to break today's encryption systems, many people and organizations are already concerned about "Harvest Now, Decrypt Later" (HNDL) attacks.

Submitted by grigby1 CPVI on

"University of Twente Leads Cyber Resilience Initiative in Supply Chains"

"University of Twente Leads Cyber Resilience Initiative in Supply Chains"

The University of Twente, together with the Jheronimus Academy of Data Science (JADS), is leading a project aimed at strengthening supply chains against cyberattacks. The project titled "Digital Resilience in Supply Chains" (DReSC) uses data-driven methods to identify vulnerabilities, develop solutions, and better understand how to cultivate a culture of security in supply chains. With careful risk assessment and real-life experiments, DReSC will delve into how suggested interventions can reduce cyber risks.

Submitted by grigby1 CPVI on

Ignite on Tour

"2023 was a breakthrough year for AI, and enterprises around the world now find themselves on the crest of a new wave of disruption. Organizations are ramping up investments in AI, particularly in generative AI, to increase automation, improve content creation, and enhance customer and employee experiences. But AI is a double-edged sword, benefiting businesses and cybercriminals alike. As AI-powered attacks become a part of everyday life, businesses, governments, and individuals must turn to emerging technologies, such as AI and ML, to generate their own automated responses.

"Under the Digital Radar: Defending Against People's Republic of China's Nation-State Cyber Threats to America's Small Businesses"

"Under the Digital Radar: Defending Against People's Republic of China's Nation-State Cyber Threats to America's Small Businesses"

The latest annual report by the Office of the Director of National Intelligence (ODNI) emphasizes that China is the biggest cyber threat to the US government, private sector, and critical infrastructure networks. The US Cybersecurity and Infrastructure Security Agency (CISA) and US government partners have noticed a worrying trend of the People's Republic of China (PRC) nation-state cyber actors targeting US critical infrastructure for disruption. Many critical infrastructure owners and operators are small businesses or rely on small business service providers and vendors.

Submitted by grigby1 CPVI on

"'DuneQuixote' Shows Stealth Cyberattack Methods Are Evolving"

"'DuneQuixote' Shows Stealth Cyberattack Methods Are Evolving"

Classic and novel stealth techniques helped "DuneQuixote" remain hidden for at least a year. The threat actor behind the campaign spied on a Middle Eastern government organization. Before researchers reached the attack, at least 30 infections had been recorded against other organizations, mostly around the Middle East. Experts say cyberattackers have improved their stealth across the board. The DuneQuixote campaign has two malware droppers and two payloads. One of the droppers mimics the Total Commander, combining legitimate and malicious components.

Submitted by grigby1 CPVI on

NolaCon

"NolaCon is an Information Security/Hacker conference for professionals and enthusiasts alike located in New Orleans, offering interesting and inventive talks and workshops.  The talks will cover a variety of topics focused on today’s infosec needs including: malware, exploits, vulnerabilities, social engineering, forensics and usually at least one new 0-Day."



 

Subscribe to