"CISA and FBI Issue Warning About Rhysida Ransomware Double Extortion Attacks"

"CISA and FBI Issue Warning About Rhysida Ransomware Double Extortion Attacks"

The US Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Multi-State Information Sharing and Analysis Center (MS-ISAC) issued an advisory on the threat actors behind the Rhysida ransomware conducting attacks on organizations in various industries. Rhysida actors have compromised organizations in the education, manufacturing, Information Technology (IT), and government sectors, and any ransom paid is divided between the group and affiliates, according to the agencies.

Submitted by grigby1 CPVI on

"Ransomware Group Files SEC Complaint Over Victim’s Failure to Disclose Data Breach"

"Ransomware Group Files SEC Complaint Over Victim’s Failure to Disclose Data Breach"

A notorious ransomware group has recently filed a complaint with the US Securities and Exchange Commission (SEC) over the failure of a victim to disclose an alleged data breach resulting from an attack conducted by the cybercrime gang itself.  The ransomware group known as Alphv/BlackCat has claimed to have breached the systems of MeridianLink, a California-based company that provides digital lending solutions for financial institutions and data verification solutions for consumers.

Submitted by Adam Ekwall on

"UChicago Researchers Honored by Samsung for Finding Vulnerability in Smart TVs"

"UChicago Researchers Honored by Samsung for Finding Vulnerability in Smart TVs"

Researchers from the University of Chicago's Department of Computer Science were recently honored by Samsung for identifying previously unknown vulnerabilities in smart TVs, earning them a place in the Samsung Hall of Fame. The team demonstrated how an attacker could use the audio on Samsung and Apple TVs to guess when a user is typing, the length of the entered information, and the number of cursor movements between selections. Their side-channel attack shows how easily hackers could guess a user's passwords and credit card numbers. One of the researchers, Ph.D.

Submitted by grigby1 CPVI on

"Keep It Secret: Cloud Data Storage Security Approach Taps Quantum Physics"

"Keep It Secret: Cloud Data Storage Security Approach Taps Quantum Physics"

A research team in China is using quantum physics, mature cryptography, and storage techniques to create a cost-effective cloud storage solution. Shamir's Secret Sharing (SSS) is a known key distribution algorithm involving distributing private information to a group so that the secret can only be revealed when a majority pools their knowledge. Combining Quantum Key Distribution (QKD) and the SSS algorithm is common for secure storage at the highest security level. However, the most secure solutions tend to be costly, especially regarding cloud storage space requirements.

Submitted by grigby1 CPVI on

"Google Workspace Weaknesses Allow Plaintext Password Theft"

"Google Workspace Weaknesses Allow Plaintext Password Theft"

Researchers have discovered new vulnerabilities in Google Workspace, with exploits potentially resulting in ransomware attacks, data exfiltration, and password decryption. According to Bitdefender researchers, the methods could be used to access Google Cloud Platform (GCP) with custom permissions and move from machine to machine. This article continues to discuss the potential exploitation and impact of the Google Workspace vulnerabilities as well as Google's response to them.

Submitted by grigby1 CPVI on

"Software Vulnerabilities Are Declining, but Third-Party Risks Still Linger"

"Software Vulnerabilities Are Declining, but Third-Party Risks Still Linger"

Synopsys' security testing service revealed a significant decrease in software vulnerabilities from 2020 to 2022. According to Synopsys, 97 percent of tests on target applications identified severe vulnerabilities in 2020. However, this fell to 95 percent in 2021 and then to 83 percent in 2022. This improvement could be attributed to the increased adoption of practices such as automated testing and code reviews, which have effectively reduced exploitation opportunities for hackers. However, the security company emphasizes that certain areas still pose a higher risk to organizations.

Submitted by grigby1 CPVI on

"FCC Proposes Cybersecurity Pilot Program for Schools, Libraries as Attacks Increase"

"FCC Proposes Cybersecurity Pilot Program for Schools, Libraries as Attacks Increase"

The Federal Communications Commission (FCC) has proposed establishing a "Schools and Libraries Cybersecurity Pilot Program" to allow officials to collect data on the cybersecurity and advanced firewall services that would best help K-12 schools and libraries across the US protect themselves from hackers. Many schools have experienced Internet and phone outages because of cyberattacks such as ransomware attacks since the start of the school year in August, with several having to cancel school days or post notices of stolen data.

Submitted by grigby1 CPVI on

ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) 2023

"The ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) is an internationally renowned forum for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, experiences, and challenges in the field of software engineering. ESEC/FSE brings together experts from academia and industry to exchange the latest research results and trends as well as their practical application in all areas of software engineering."

16th IEEE/ACM International Conference on Utility and Cloud Computing (UCC)

"The IEEE/ACM International Conference on Utility and Cloud Computing (UCC) is a premier annual conference series aiming to provide a platform for researchers from both academia and industry to present new discoveries in the broad area of Cloud and Edge utility computing and applications."

Topics of interest include, but are not limited to security and privacy.

10th IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT)

"The IEEE/ACM International Conference on Big Data Computing, Applications, and Technologies (BDCAT) is a premier annual conference series aiming to provide a platform for researchers from both academia and industry to present new discoveries in the broad area of big data computing and applications."

Topics of interest include, but are not limited to privacy and security over the data life cycle.

Subscribe to