"Researchers Used Wi-Fi Signals to See Through Walls. Game-Changing Breakthrough? Or Privacy Nightmare Waiting to Happen?"

"Researchers Used Wi-Fi Signals to See Through Walls. Game-Changing Breakthrough? Or Privacy Nightmare Waiting to Happen?"

Using Wi-Fi signals, scientists have developed a technology that enables people to see objects and read letters through walls. The system, developed by UC Santa Barbara researchers, traces the edges of objects on the opposite side of solid barriers. In one experiment, the team used the technology to decipher the word "BELIEVE" from the other side of a wall by imaging each letter individually. Three off-the-shelf Wi-Fi transmitters were used to send wireless waves in an area. The receivers were on an unmanned vehicle emulating a Wi-Fi receiver grid as it moved.

Submitted by grigby1 CPVI on

"NSA, US Federal Agencies Advise on Deepfake Threats"

"NSA, US Federal Agencies Advise on Deepfake Threats"

The National Security Agency (NSA) and US federal agency partners have issued new guidance regarding deepfakes. This emerging threat may pose a cybersecurity challenge for National Security Systems (NSS), the Department of Defense (DoD), and Defense Industrial Base (DIB) organizations. They issued the Cybersecurity Information Sheet (CSI) "Contextualizing Deepfake Threats to Organizations" to help organizations identify, defend against, and respond to deepfake threats.

Submitted by grigby1 CPVI on

"Playing Hide and Seek with a New Breed of Malware Threatening Millions of Users"

"Playing Hide and Seek with a New Breed of Malware Threatening Millions of Users"

Georgia Tech's Cyber Forensics Innovation (CyFI) Lab discovered that Web App Engaged (WAE) malware has increased by 226 percent since 2020. Therefore, the team created a tool that enables cybersecurity incident responders to purge almost 80 percent of discovered WAE malware by teaming up with service providers. Ph.D. student at Georgia Tech Mingxuan Yao noted that web applications have become integral to our online lives, providing services such as content delivery, data storage, and social networking, but these utilities have made web applications attractive for malware creators.

Submitted by grigby1 CPVI on

Cyber Scene Archive

Cyber Scene Archive

Cyber Scene articles are intended to provide an informative, timely backdrop of events, thinking, and developments that feed into technological advancement of Science of Security (SoS) collaboration and extend its outreach. They are indexed below.

Submitted by grigby1 CPVI on

"Air Canada Says Employee Information Accessed in Cyberattack"

"Air Canada Says Employee Information Accessed in Cyberattack"

Air Canada recently announced that the personal information of some employees was accessed in a recent cyberattack.  Canada’s national airline announced that a threat actor obtained limited access to one of its internal systems that contained “limited personal information of some employees and certain records  .”Air Canada noted that the incident did not impact its flight operations systems.  Furthermore, the company says, customer facing systems were not accessed, and no customer information was compromised in the attack.

Submitted by Adam Ekwall on

"High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server"

"High-Severity Flaws Uncovered in Atlassian Products and ISC BIND Server"

Atlassian and the Internet Systems Consortium (ISC) have disclosed multiple security vulnerabilities in their products that could be exploited for Denial-of-Service (DoS) and Remote Code Execution (RCE). The four high-severity flaws were addressed in new versions shipped last month. The vulnerabilities include a deserialization flaw in the Google Gson package that affects Patch Management in Jira Service Management Data Center and Server, a DoS flaw in Confluence Data Center, and more.

Submitted by grigby1 CPVI on

"Hotel Hackers Redirect Guests to Fake Booking Website to Steal Cards"

"Hotel Hackers Redirect Guests to Fake Booking Website to Steal Cards"

Researchers have found a multi-step information-stealing campaign in which hackers infiltrate the systems of hotels, booking sites, and travel agencies, and then use their access to take customers' financial data. By using this indirect method and a fake Booking[.]com payment page, cybercriminals have discovered a way to collect credit card information with a significantly higher success rate. This article continues to discuss the hackers' campaign involving the use of a fake Booking[.]com payment page.

Submitted by grigby1 CPVI on

"Ransomware Cyber Insurance Claims up by 27%"

"Ransomware Cyber Insurance Claims up by 27%"

According to Coalition, the frequency of cyber insurance claims rose by 12 percent in the first half of 2023. Early in 2023, Coalition discovered that the frequency and severity of business claims increased across all revenue bands. Companies with revenues greater than $100 million experienced the most significant increase (20 percent) in the number of claims, as well as greater losses from attacks. According to Coalition's report, ransomware claims in the first half of 2023 increased by 27 percent from the second half of 2022.

Submitted by grigby1 CPVI on
Subscribe to