"CodeHoppers Returns With Aim to Inspire Girls to Learn More About Cyber"

"CodeHoppers Returns With Aim to Inspire Girls to Learn More About Cyber"

The student-led program "CodeHoppers," sponsored by Augusta University's (AU) School of Computer and Cyber Sciences, is returning. CodeHoppers, founded in 2017 by AU's chapter of "Girls Who Code," aims to provide a fun, friendly, and inclusive environment for girls in sixth through 12th grades. The program covers basic coding concepts, webpage principles, hacking ethics, cybersecurity, and more. This article continues to discuss the success and goals of the CodeHoppers program.

Submitted by Gregory Rigby on

Pub Crawl - November 2024

Pub Crawl - November 2024

Selections by dgoff

Pub Crawl summarizes sets of publications that have been peer-reviewed and presented at Science of Security (SoS) conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Submitted by Gregory Rigby on

"50% of Financial Orgs Have High-Severity Security Flaws in Their Apps"

"50% of Financial Orgs Have High-Severity Security Flaws in Their Apps"

According to security researchers at Veracode, security debt, flaws that remain unfixed for longer than a year, exists in 76% of organizations in the financial services sector, with 50% of organizations carrying critical security debt.  During the study, researchers found that 40% of all applications in the financial sector have security debt, which is slightly better than the cross-industry average of 42%.  In addition, just 5.5% of financial sector applications are flaw-free, compared to 5.9% across other industries.

Submitted by Adam Ekwall on

"Lottie-Player Supply Chain Attack Targets Cryptocurrency Wallets"

"Lottie-Player Supply Chain Attack Targets Cryptocurrency Wallets"

LottieFiles has recently confirmed that its Lottie-Player software has been compromised in a supply chain attack aimed at stealing cryptocurrency from victims. LottieFiles’ Lottie-Player is widely used for embedding and playing Lottie animations on websites. Recently, users of Lottie-Player complained that their websites had been displaying a pop-up prompting visitors to connect their cryptocurrency wallet.  The goal was apparently to get users to connect their crypto wallets in an attempt to drain them.

Submitted by Adam Ekwall on

"DDoS Site Dstat.cc Seized And Two Suspects Arrested in Germany"

"DDoS Site Dstat.cc Seized And Two Suspects Arrested in Germany"

The Dstat.cc DDoS review platform has recently been seized by law enforcement, and two suspects have been arrested after the service helped fuel distributed denial-of-service attacks for years.  According to authorities, the seizure and arrests were conducted as part of "Operation PowerOFF," an ongoing international law enforcement operation that targets DDoS-for-hire platforms, aka "booters" or "stressors," to seize infrastructure and arrest the operators.

Submitted by Adam Ekwall on

"Canadian Government Data Stolen By Chinese Hackers"

"Canadian Government Data Stolen By Chinese Hackers"

The Canadian Centre for Cyber Security recently announced that at least 20 Canadian government networks have been compromised by Chinese state-sponsored threat actors, who have maintained access over the past four years to steal valuable data.  It was noted that in addition to espionage, the data gathered is likely used to support the People’s Republic of China’s (PRC) malign influence and interference activities against Canada’s democratic processes and institutions.  It is believed the attackers dedicated significant time and resources to learn about the target networks.

Submitted by Adam Ekwall on

"FakeCall Android Trojan Evolves with New Evasion Tactics and Expanded Espionage Capabilities"

"FakeCall Android Trojan Evolves with New Evasion Tactics and Expanded Espionage Capabilities"

New research shows that the "FakeCall" Android banking trojan, also known as "Fakecalls," has grown more sophisticated in evasion and espionage. The attack chain begins with traditional phishing to trick the target into downloading an APK file that serves as a dropper for the FakeCall malware. This article continues to discuss the advanced evasion tactics and expanded surveillance capabilities now employed by the FakeCall Android banking trojan.

Submitted by Gregory Rigby on

"Malware Operators Use Copyright Notices to Lure in Businesses"

"Malware Operators Use Copyright Notices to Lure in Businesses"

Cisco Talos researchers have observed threat actors using copyright infringement claims to trick targets and deploy infostealers. According to the researchers, the ongoing attack in Taiwan is being spread through phishing emails containing malware attachments. The emails pose as legal notices from copyright holders or legal representatives of companies making copyright claims. This article continues to discuss malware operators tricking targets using the threat of a copyright infringement claim.

Submitted by Gregory Rigby on

Securities Enforcement Forum D.C.

"Securities Enforcement Forum D.C. is a unique, one-day conference that brings together current and former senior SEC officials, securities enforcement and white-collar attorneys, in-house counsel and compliance executives, and other top professionals in the field. Held annually in Washington, D.C. since 2012, this year’s conference will be held on Wednesday, November 6 at the historic Mayflower Hotel in Washington, D.C., and will also be available for attendees to view live online.

"Colorado Accidentally Put Voting System Passwords Online, but Officials Say Election Is Secure"

"Colorado Accidentally Put Voting System Passwords Online, but Officials Say Election Is Secure"

Colorado state election officials recently announced that voting system passwords were mistakenly put on the Colorado Secretary of State's website for several months before being spotted and taken down.  The state election officials said the lapse did not pose an immediate threat to the upcoming election.  It was noted that the passwords were only one of two needed to access any component of Colorado's voting systems and are just one part of a layered security system.  The two passwords are "kept in separate places and held by different parties." 

 

Submitted by Adam Ekwall on
Subscribe to