-
"Cybercriminals Create New Methods to Evade Legacy DDoS Defenses"According to Corero, the number of Distributed Denial-of-Service (DDoS) attacks observed worldwide is rising, and this trend will continue through 2023. Expect increased request-based or packets-per-second attacks from cybercriminals. Historically, DDoS…
-
"Google Home Speakers Allowed Hackers to Snoop on Conversations"A flaw in the Google Home smart speaker allowed the installation of a backdoor account that could be used to remotely control it and transform it into an eavesdropping device by accessing the microphone feed. Matt Kunze, a researcher, uncovered the…
-
"CISA Warns of Active exploitation of JasperReports Vulnerabilities"The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities affecting TIBCO Software's JasperReports to its Known Exploited Vulnerabilities (KEV) catalog, revealing evidence of exploitation…
-
"WashU Expert: New Rules Needed to Govern Consumer Privacy"Without realizing it, consumers often provide businesses with vast amounts of personal information, including their purchase and web browsing history, vacation plans, and even their friends' names. The fact that consumers typically do not read or…
-
"Global Artificial Intelligence in Cybersecurity Market Report to 2028 - Increasing Vulnerability of Wi-Fi Networks to Security Threats Drives Growth"According to the new Global Artificial Intelligence (AI) in Cybersecurity Market Report from Research and Markets, the market size for AI in cybersecurity is projected to reach $60.6 billion by 2028, expanding at a Compound Annual Growth Rate (CAGR) of…
-
"The Federal Government is Moving on Memory Safety for Cybersecurity"The appropriations bill recently passed by Congress addresses the use of memory-safe coding languages to deal with the vast majority of software vulnerabilities exploited by cyberattackers. The National Security Agency (NSA) said in a November…
-
"Security Sleuths: UC San Diego Computer Scientists' Solutions to Security Issues Withstand the Test"The cybersecurity research presented in five papers by computer scientists in the Department of Computer Science and Engineering Security and Cryptography group at UC San Diego has been credited for changing the present and future of their respective…
-
"2023 Forecast: Zero Trust Maturing, Cyber Pros Stretched Thin"The shortage of experienced cyber professionals is anticipated to be an ongoing issue in cybersecurity in the next year. However, development is expected in areas such as zero trust security, cloud adoption, and the continuous implementation of…
-
"OSU Receives $4.8M to Address National Cybersecurity Workforce Shortage"Oregon State University (OSU) has recently received millions of dollars from the National Science Foundation to help close the nation’s gap in cybersecurity employment. The $4.8 million grant, which is part of the NSF’s “CyberCorps: Scholarship for…
-
"Log4Shell Remains a Big Threat and a Common Cause for Security Breaches"A year after receiving patches and extensive attention, the Log4Shell vulnerability that affected millions of company applications remains a prominent cause of security breaches and is projected to be a popular target for some time. Its lasting effect…
-
"Ukrainian Threat Actor Unmasked in Connection With Raccoon Malware"Mark Sokolovsky, a 26-year-old Ukrainian national, was indicted on October 5, 2022, for his alleged participation in a global cyber operation known as Raccoon Infostealer. This malware has infected millions of computers worldwide for years, compromising…
-
"Ransomware, Data Breach Insurance Costing Florida School Districts Hundreds of Thousands of Dollars"A new report from the U.S. Government Accountability Office found the loss of learning following a cyberattack at K-12 schools ranged from three days to three weeks, recovery time could take anywhere from two to nine months, and districts’ losses have…
News