-
DATA SECURITYThis Tiny Chip Can Safeguard User Data While Enabling Efficient Computing on a Smartphone
Researchers have developed a security solution for power-hungry AI models that offers protection against two common attacks.
-
-
CHINA WATCHChinese Government Poses 'Bold and Unrelenting' Threat to U.S. Critical Infrastructure: FBI
FBI Director Christopher Wray on 18 April warned that risks the government of China poses to U.S. national and economic security are “upon us now”—and that U.S. critical infrastructure is a prime target. He said that partnerships, joint operations, and private sector vigilance can help us fight back.
-
-
CHINA WATCHSpyware as Service: What the i-Soon Files Reveal About China’s Targeting of the Tibetan Diaspora
Governments are increasingly incorporating cyber operations into the arsenal of statecraft. This sophisticated integration combines open-source intelligence, geospatial intelligence, human intelligence, and cyber espionage with artificial intelligence, allowing for the gathering and analysis of ever-expanding data sets. Increasingly, such operations are being outsourced.
-
-
CYBERSECURITYIsrael’s Cybersecurity Market is Maturing, and Just in Time
As tensions around the world rise and cyber threats multiply like digital rabbits, the Israeli cyber scene’s maturation seems like a saving grace.
-
-
TRUTH DECAYExploring New Ideas for Countering Disinformation
The rise of social media has connected people to one another and to information more rapidly and directly than ever before, but this fast-moving digital information landscape has also turbocharged the spread of misinformation and disinformation. From COVID-19 to climate change, coordinated social media efforts to disseminate intentionally false or misleading information are sowing distrust in science and in public institutions, and causing real harms to individuals and society more broadly.
-
-
AVAIATION SECURITYCybertech Startup Aims to Keep Aircraft Safe
As hackers get more daring and sophisticated, and even try to hijack airplanes, it’s increasingly vital to keep our aircraft safe from attack. Cybertech startup Cyviation aims to do just that.
-
-
CYBERSECURITYCyber Safety Review Board Releases Report on Microsoft Online Exchange Incident from Summer 2023
On Tuesday, the U.S. Department of Homeland Security (DHS) released the Cyber Safety Review Board’s (CSRB) findings and recommendations following its independent review of the Summer 2023 Microsoft Exchange Online intrusion. The review detailed operational and strategic decisions that led to the intrusion and recommended specific practices for industry and government to implement to ensure an intrusion of this magnitude does not happen again.
-
-
CRITICAL INFRASTRUCTUREEngineers Fortifying Critical Infrastructure
In a bid to protect the nation’s energy sector against cyber attacks, engineers are creating a digital twin to help weed out threats and fix software and firmware vulnerabilities. If left unchecked, these weaknesses could allow ransomware attacks that could cause severe havoc to critical U.S. energy systems.
-
-
CHINA WATCHWhat Is Volt Typhoon? A Cybersecurity Expert Explains the Chinese Hackers Targeting U.S. Critical Infrastructure
Volt Typhoon is a Chinese state-sponsored hacker group. The United States government and its primary global intelligence partners, known as the Five Eyes, issued a warning on March 19, 2024, about the group’s activity targeting critical infrastructure. The warning echoes analyses by the cybersecurity community about Chinese state-sponsored hacking in recent years.
-
-
CYBERSECURITYU.S. Needs a New Independent Armed Service — a U.S. Cyber Force: Report
In the U.S. military, an officer who had never fired a rifle would never command an infantry unit. Yet officers with no experience behind a keyboard are commanding cyber warfare units. This should change, as the need to create a new independent armed service — a U.S. Cyber Force – become more urgent by the day.
-
-
ELECTION SECURITYStates Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
-
-
CHINA WATCHChinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
-
-
CRITICAL INFRASTRUCTUREChinese, Iranian Cyberattacks Target U.S. Water Systems
Nation-states are increasingly targeting the U.S. water systems with cyberattacks, according to the Environmental Protection Agency (EPA) and National Security Council (NSC). The EPA and the NSC are urging states to significantly bolster their IT security measures to guard against attacks on critical infrastructure.
-
-
EXTREMISMTikTok Ban Feared, Antisemitic Conspiracy Theories Follow
Soon after the news broke about the House, on 13 March 2024, passing a bill that could potentially lead to a nationwide ban of the popular social media platform TikTok, influencers and extremists from across the political spectrum began framing the bill as an outright ban and speculating that the bill is a product of Jewish or Zionist influence, calling it an effort to infringe on free speech by limiting the reach of pro-Palestinian content.
-
-
CYBERSECURITYNew Cybersecurity Response Studio Wins $1.25M in Federal Funding
A new Cybersecurity Incident Response Studio (CREST) at the University of Albany will bring cyber and crisis management researchers from across campus together to support training and simulation exercises for public, private and non-profit sector partners.
-
More headlines
The long view
ELECTION SECURITYStates Rush to Combat AI Threat to Elections
By Zachary Roth
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
RANSOMWARERansomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
By Dino Jahic
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
CHINA WATCHChinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
AUTONOMOUS VEHICLESAutonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
CYBERDETERRENCETantalizing Method to Study Cyberdeterrence
By Trina West
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.