-
"New Acoustic Attack Determines Keystrokes From Typing Patterns"Researchers Alireza Taheritajar and Reza Rahaeimehr at Augusta University have published a technical paper detailing their acoustic side-channel attack method.
-
"Hackers Can Read Private AI-Assistant Chats Even Though They're Encrypted"Researchers at Ben-Gurion University's Offensive AI Research Lab have presented an attack that can decipher AI assistant responses. The technique involves a side-channel found in all major Artificial Intelligence (AI) assistants except Google Gemini.
-
"Satellites for Quantum Communications"Continued advancements in quantum computer development and performance will make it possible to crack current encryption processes.
-
"Ande Loader Malware Targets Manufacturing Sector in North America"A threat actor called "Blind Eagle," also known as APT-C-36, has been observed using a loader malware named "Ande Loader" to deliver Remote Access Trojans (RATs) such as Remcos RAT and NjRAT.
-
"MITRE-Harris Poll Finds US Public Is Worried about the Security of Our Critical Infrastructure"According to a new public opinion poll conducted by MITRE and The Harris Poll, the US public believes cyberattacks to be of the greatest risk to critical infrastructure.
-
"As Attackers Refine Tactics, 'Speed Matters,' Experts Warn"According to security researchers at Palo Alto's Unit 42 threat intelligence group, advanced attackers are increasingly seeking speed.
-
"Moldovan National Sentenced in E-Root Cybercrime Marketplace Case"According to the US Department of Justice (DOJ), a Moldovan national has been sentenced to 42 months in US federal prison for running a set of websites selling access to compromised computers worldwide.
-
"Key MITRE ATT&CK Techniques Used by Cyber Attackers"A Red Canary report tracked the MITRE ATT&CK techniques adversaries used the most throughout 2023, finding that two new and notable entries jumped to the top ten: email forwarding rules and cloud accounts.
-
"FCC Approves Cyber Labeling Program for IoT Devices"The Federal Communications Commission (FCC) voted to establish a voluntary cybersecurity labeling program for Internet of Things (IoT) devices and other consumer-facing products that require an Internet connection.
-
"Discontinued Security Plugins Expose Many WordPress Sites to Takeover"Security researchers at Defiant are warning that thousands of WordPress websites are potentially at risk of takeover due to a critical severity vulnerability in two MiniOrange plugins that were discontinued recently.
-
NSF Funded Undergraduate Computer Research in Cybersecurity and AI (UnCoRe-CyberAI)NSF Funded Undergraduate Computer Research in Cybersecurity and AI (UnCoRe-CyberAI)
-
"StopCrypt: Most Widely Distributed Ransomware Evolves to Evade Detection"StopCrypt ransomware, also known as STOP Djvu, has evolved with a new multi-stage execution process that better evades detection by security tools.
News