"59% of Public Sector Apps Carry Long-Standing Security Flaws"

"59% of Public Sector Apps Carry Long-Standing Security Flaws"

According to Veracode, public sector apps have more security debt than private sector apps. Security debt is defined as flaws that remain unfixed for more than a year. Fifty-nine percent of apps in the public sector have security debt. Veracode's study delved into public sector organizations in over 25 countries. Cybercriminals are targeting federal government systems with more damaging and disruptive methods. To address this, the federal government is implementing a number of cybersecurity measures, including reducing risk in government apps.

Submitted by Gregory Rigby on

"AI Browser Plug-Ins to Help Consumers Improve Digital Privacy Literacy, Combat Manipulative Design"

"AI Browser Plug-Ins to Help Consumers Improve Digital Privacy Literacy, Combat Manipulative Design"

Researchers at the University of Notre Dame are developing Artificial Intelligence (AI) tools to help consumers understand online exploitation. Increasing end users' digital literacy helps them better control their website interactions. A recent study allowed participants to experiment with online privacy settings without consequences. The researchers created "Privacy Sandbox," a Chrome browser plug-in that replaced participant data with personas generated by the Large Language Model (LLM) GPT-4 from OpenAI.

Submitted by Gregory Rigby on

"How Researchers Are Protecting AI of the Future"

"How Researchers Are Protecting AI of the Future"

Dr. Samson Zhou, assistant professor at Texas A&M University's Department of Computer Science and Engineering, and Dr. David P. Woodruff, professor in the Computer Science Department at Carnegie Mellon University, are looking to bolster algorithms used by big data Artificial Intelligence (AI) models against attacks. Big data AI models are scalable algorithms designed to handle and analyze large amounts of data. Zhou and Woodruff are studying a type of big data model known as a streaming model.

Submitted by Gregory Rigby on

"New Partnership Uses AI to Bolster Efficiency, Cybersecurity for Water Treatment"

"New Partnership Uses AI to Bolster Efficiency, Cybersecurity for Water Treatment"

Feras Batarseh, an associate professor in Virginia Tech's Department of Biological Systems Engineering, and his team of researchers work with the Commonwealth Cyber Initiative in the greater Washington, DC, metro area, as well as in Blacksburg, where they run the "AI & Cyber for Water & Ag lab." The lab is made up of physical pumping and tubing systems, together with soil and biological systems, and is integrated with computer monitoring. It supports the term "cyberbiosecurity," coined at Virginia Tech, which encompasses the fight against threats to the nation's water supply.

Submitted by Gregory Rigby on

"Pirated Microsoft Office Delivers Malware Cocktail on Systems"

"Pirated Microsoft Office Delivers Malware Cocktail on Systems"

Cybercriminals are distributing a malware cocktail via cracked versions of Microsoft Office advertised on torrent websites. Malware delivered to users includes Remote Access Trojans (RATs), cryptocurrency miners, malware downloaders, proxy tools, and anti-virus software. The AhnLab Security Intelligence Center (ASEC) identified the campaign, warning against downloading pirated software. The researchers discovered that the attackers use a variety of lures, including Microsoft Office, Windows, and the Hangul Word Processor.

Submitted by Gregory Rigby on

"NIST Getting Outside Help for National Vulnerability Database"

"NIST Getting Outside Help for National Vulnerability Database"

The National Institute of Standards and Technology (NIST) will receive outside help to get the National Vulnerability Database (NVD) back on track. In February, the organization informed the cybersecurity community to expect delays in the analysis of Common Vulnerabilities and Exposures (CVE) identifiers in the NVD, as it was forming a consortium to improve the program. In an April update, NIST blamed an increase in vulnerabilities and "change in interagency support" for the NVD's growing backlog of vulnerabilities that needed analysis.

Submitted by Gregory Rigby on

"Russian Hackers Target Europe with HeadLace Malware and Credential Harvesting"

"Russian Hackers Target Europe with HeadLace Malware and Credential Harvesting"

"APT28," a Russian GRU-backed threat actor, has been targeting networks across Europe with "HeadLace" malware and credential harvesting websites. The Advanced Persistent Threat (APT) group uses Legitimate Internet Services (LIS) and Living Off-the-Land Binaries (LOLBins) to hide their operations in network traffic. This article continues to discuss APT28's targeting of Europe with HeadLace malware and credential harvesting.

Submitted by Gregory Rigby on

"Data of 560 Million Ticketmaster Customers For Sale After Alleged Breach"

"Data of 560 Million Ticketmaster Customers For Sale After Alleged Breach"

​A threat actor known as ShinyHunters recently announced that it is selling what it claims is the personal and financial information of 560 million Ticketmaster customers on the recently revived BreachForums hacking forum for $500,000.  The allegedly stolen databases, which were first put up for sale on the Russian hacking forum Exploit, supposedly contain 1.3TB of data and the customers' full details (i.e., names, home and email addresses, and phone numbers), as well as ticket sales, order, and event information.

Submitted by Adam Ekwall on
Subscribe to