News
  • "What Can Hackers Do with Your Mobile Number?"

    Hackers and cybercriminals can do a lot of damage using mobile phone numbers. Using mobile phone numbers, malicious actors could execute SIM swapping attacks, conduct surveillance, and gain access to an individual's online profiles such as Facebook,…

  • "Deepfake Attacks Are About to Surge, Experts Warn"

    Security researchers from Recorded Future have found that new deepfake products and services are cropping up across the Dark Web.  Cybercriminals are increasingly sharing, developing, and deploying deepfake technologies to bypass biometric security…

  • "Paleo Lifestyle Site Found Leaking PII on 70,000 Users"

    Security researchers at vpnMentor have discovered a misconfigured AWS S3 bucket leaking personal information on 70,000 customers of a popular paleolithic lifestyle site.  The researchers found the 290MB trove on February 4 and traced it back to…

  • "Programs within Military Intel Agencies in the US and UK Show Growing Commitment to Neurodiversity"

    Embracing neurodiversity could serve as an advantage to the cybersecurity field and help fill the cybersecurity workforce gap. The term "neurodiversity" covers conditions, including autistic spectrum disorders, ADHD, dyslexia, OCD, and other conditions…

  • "Experian API Leaks Most Americans’ Credit Scores"

    A security researcher claims that the credit scores of almost every American were exposed through an API tool used by the Experian credit bureau, which he said was left open on a lender site without even basic security protections.  Experian, for…

  • "Data Breach Impacts 1 in 4 Wyomingites"

    Wyoming's Department of Health (WDH) has recently announced the accidental exposure of personal health information belonging to more than a quarter of people living in Wyoming on GitHub.com.  The data breach occurred when fifty-three files…

  • "Watch A Tesla Have Its Doors Hacked Open By A Drone"

    Ralf-Philipp Weinmann, CEO of Kunnamon, and Benedikt Schmotzle of Comsecuris demonstrated the use of a drone carrying a Wi-Fi dongle to hack and open a Tesla's doors remotely. The remote hack requires no interaction from anyone inside the car. According…

  • "BIND Vulnerabilities Expose DNS Servers to Remote Attacks"

    The Internet Systems Consortium (ISC) released updates for the BIND DNS software, patching vulnerabilities that could allow threat actors to perform denial-of-service (DoS) attacks and remote code execution. One of the flaws earned a CVSS score of 8.1.…

  • "Emotet Group Harvested Over 4.3 Million Victim Emails"

    Researchers have discovered that the threat actors behind the notorious Emotet botnet managed to collect over four million victim email addresses over the past few years.  In all, 4,324,770 email addresses were found from a wide range of countries…

  • Pub Crawl #49

    ​Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • "Penetration Testing Leaving Organizations With Too Many Blind Spots"

    Researchers at Informa Tech surveyed enterprises with 3,000 or more employees. They found that 70 percent of organizations perform penetration tests as a way to measure their security posture and 69 percent to prevent breaches, yet only 38 percent test…

  • "How to Keep Automated Electric Vehicles Safe"

    Researchers at the University of Georgia (UGA) have identified weaknesses that pose a threat to the safety and efficiency of automated electric vehicles. In a new paper published in the IEEE Journal of Emerging and Selected Topics in Power Electronics,…