"Royal Family Website Downed by DDoS Attack"

"Royal Family Website Downed by DDoS Attack"

The official website of the UK’s royal family on Sunday was taken offline by a distributed denial of service (DDoS) attack.  According to reports, the Royal.uk site was unavailable for around 90 minutes, starting at 10 am local time.  It was fully functional again soon after.  Notorious Russian hacktivist group Killnet has reportedly boasted on its Telegram channel of being responsible for the attack, although that has yet to be confirmed.

Submitted by Adam Ekwall on

"Using Psychology to Bolster Cybersecurity"

"Using Psychology to Bolster Cybersecurity"

Reimagining Security with Cyberpsychology-Informed Network Defenses (ReSCIND) is a new cyberpsychology research program from the US Defense Department's Intelligence Advanced Research Projects Activity (IARPA) that focuses on how cybercriminals act and think. According to IARPA program manager Kimberly Ferguson-Walter, the ReSCIND program aims to research the cyberpsychology of cybercriminals to identify their cognitive flaws and improve cybersecurity.

Submitted by grigby1 CPVI on

"Harvard Designs AI Sandbox That Enables Exploration, Interaction Without Compromising Security"

"Harvard Designs AI Sandbox That Enables Exploration, Interaction Without Compromising Security"

Generative Artificial Intelligence (AI) tools, such as OpenAI's ChatGPT, Microsoft's Bing Chat, and Google's Bard, have quickly become the most discussed topic in technology, sparking talks about their role in higher education and more. Harvard announced its initial guidelines for using generative AI tools in July, and strong community demand presented University administrators with the challenge of meeting this need while addressing the security and privacy flaws of many consumer tools.

Submitted by grigby1 CPVI on

"Understanding Cyber Threats in IoT Networks"

"Understanding Cyber Threats in IoT Networks"

New research delves into how Internet of Things (IoT) devices, which are not as well protected as traditional computers regarding firewalls, antivirus, and malware protection, can represent a significant system vulnerability. In addition to potential financial loss, such threats can disrupt infrastructure and government, as well as endanger human lives, especially in healthcare facilities. A team of researchers from Tallinn University of Technology and the University at Albany developed a comparative framework for modeling the cyber threat to IoT devices and networks.

Submitted by grigby1 CPVI on

"Signal Jamming Defense Not up to the Task? These Researchers Have a Solution"

"Signal Jamming Defense Not up to the Task? These Researchers Have a Solution"

As growing and maturing data services demand faster Internet speeds and operating systems call for better security, hackers and adversaries continue to interfere. For some, this involves infiltrating home and office wireless networks to steal personal or business information. These attackers often use high-powered signal jamming devices, which are wireless portable devices that impede devices' communication with each other. These jammers also serve as a defense for users trying to avoid these attacks.

Submitted by grigby1 CPVI on

"What's Wrong With This Picture? NIST Face Analysis Program Helps to Find Answers"

"What's Wrong With This Picture? NIST Face Analysis Program Helps to Find Answers"

Face recognition software is often implemented to gatekeep access to secure websites and electronic devices. Researchers are looking into the possibility of defeating it simply by wearing a mask resembling another person's face. The National Institute of Standards and Technology (NIST) recently published research on software designed to detect this type of spoof attack. The new study is published alongside another that evaluates the ability of software to identify potential issues with a photograph or digital facial image, such as one captured for a passport.

Submitted by grigby1 CPVI on

"Professor to Continue Work Developing Automated Security Policies"

"Professor to Continue Work Developing Automated Security Policies"

Vijay Atluri, a Rutgers University professor, received a grant supporting her research on information security, particularly on how protection can be enabled automatically based on user credentials and the types of resources that require protection. Her project titled "Generating Machine-Enforceable Security Policies from Natural Language Text" aims to identify certain policy sentences, convert them into attribute-based access control rules, and then generate code that can be used to automatically enforce the rules.

Submitted by grigby1 CPVI on

"Russian State Hackers Attempted to Block Ukrainians From Opening US Bank Accounts"

"Russian State Hackers Attempted to Block Ukrainians From Opening US Bank Accounts"

During two weeks in March 2022, 95 percent of the accounts opened at major US banks were fraudulently created. According to Rachel Wilson, managing director and head of cybersecurity for Morgan Stanley's Wealth Management division, many were created by Russian state hackers who conducted a Denial-of-Service (DoS) attack to block Ukrainian war refugees from transferring their money to American financial institutions.

Submitted by grigby1 CPVI on

"National Security Agency is Starting an Artificial Intelligence Security Center"

"National Security Agency is Starting an Artificial Intelligence Security Center"

The National Security Agency has announced that it is starting an artificial intelligence security center.  Army Gen. Paul Nakasone said the center would be incorporated into the NSA’s Cybersecurity Collaboration Center, where it works with private industry and international partners to harden the U.S. defense-industrial base against threats from adversaries led by China and Russia.

Submitted by Adam Ekwall on

"MOVEit Maker Warns of New Critical Bug Affecting Thousands"

"MOVEit Maker Warns of New Critical Bug Affecting Thousands"

Progress Software, the maker of the MOVEit Transfer tool that hackers exploited to compromise thousands of businesses, has announced that its WS_FTP Server software requires a patch for a critical flaw. The company recently disclosed vulnerabilities impacting the interface and Ad Hoc Transfer module of the WS_FTP Server secure file transfer software. Progress Software's advisory notes that attackers could exploit a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.

Submitted by grigby1 CPVI on
Subscribe to