• AI, Machine Learning to Help Defend Against Cyberattacks

    Two new tools are helping cybersecurity professionals fight the vast volume of threats and attacks— artificial intelligence (AI) and machine learning. AI and machine learning can detect novel malicious code, catch fraudulent charges on a credit card or fraudulent network login attempts, block phishing messages on an email service and assist companies with cloud management in spotting anomalies that traditional cyber defense technologies may not pick up.

  • Illinois Tech's CyberHawks Win National Cybersecurity Championship

    A team of students from Illinois Institute of Technology’s cybersecurity student organization CyberHawks won the National Centers of Academic Excellence in Cybersecurity Cyber Games National Championship last week. Sixty-five teams from 55 colleges competed in the competition overall.

  • Cloud Server Leasing Can Leave Sensitive Data Up for Grabs

    Renting space and IP addresses on a public server has become standard business practice, but according to computer scientists, current industry practices can lead to “cloud squatting,” which can create a security risk, endangering sensitive customer and organization data intended to remain private. New research provides solutions for companies, cloud-service providers to help minimize security risks.

  • How Ukraine Has Defended Itself Against Cyberattacks – Lessons for the U.S.

    In 2014, as Russia launched a proxy war in Eastern Ukraine and annexed Crimea, and in the years that followed, Russian hackers hammered Ukraine. The cyberattacks went so far as to knock out the power grid in parts of the country in 2015. Russian hackers stepped up their efforts against Ukraine in the run-up to the 2022 invasion, but with notably different results. Those differences hold lessons for U.S. national cyber defense.

  • Identifying Methods to Predict Future Cyberattacks

    “Malware” is a big threat for modern society. In 201, 2.8 billion consumer data records were breached, costing more than $654 billion to U.S. organizations, posing a massive industry threat. The numbers have only increased since then. Researchers are investigating ways to accurately predict these attacks.

  • Ukraine Offers Lessons for Russia’s 2024 Election Interference

    For all the media attention on the domestic political dimensions, the Kremlin’s interference in the 2016 and 2020 presidential elections (and the 2018 midterms) included a significant focus on shaping U.S. policy toward Ukraine. Exerting influence on U.S. Ukraine policy Ukraine has long been a goal of Russian disinformation efforts, so American policymakers must prepare now for this influence effort to reemerge in 2024.

  • Warning: Objects in Driverless Car Sensors May Be Closer Than They Appear

    Researchers have demonstrated the first attack strategy that can fool industry-standard autonomous vehicle sensors into believing nearby objects are closer (or further) than they appear without being detected.

  • A Systems Approach to Cybersecurity

    The frequency and severity of cyberattacks on critical infrastructure is a subject of concern for many governments, as are the costs associated with cyber security, making the efficient allocation of resources paramount. A new study proposes a framework featuring a more holistic picture of the cyber security landscape, along with a model that explicitly represents multiple dimensions of the potential impacts of successful cyberattacks.

  • A War Within a War: Cyberattacks Signal a New Approach to Combat

    In addition to fighting with troops on the ground, Ukraine is also defending itself on another front, from cyberattack.

  • Cyberspace: The New Battleground in Modern-Day Warfare

    Twenty-first century battles are now being fought digitally, as well as with missiles on land, sea and air. Bolstering cybersecurity is thus becoming ever more important as nation states wage war in new and complex arenas.

  • Computer Security Researchers Aim to Prevent Tech Abuse

    Tech abuse often exists within a larger web of harm. Assailants can abuse their victims through tech including spyware, also known as stalkerware, and through inappropriate use of location-tracking features in phones and other devices. They harass their former partners on social media, hack into email accounts, and more. Researchers have created a new approach to helping survivors of domestic abuse stop assailants from hacking into their devices and social media to surveil, harass and hurt them.

  • Hacker Underground | Belarus to Join the Fight | Western Arms, and more

    Vladimir Putin accused of war crimes, while Belarus’s military is ready to join the war on Russia’s side. Ukraine hackers vow to stop Russia, as fears grow the Russia’s likely cyber attack on Ukraine will spill over into other countries.

  • Why Putin’s War with Ukraine Is a Miscalculation

    Putin’s invasion of Ukraine is a geopolitical earthquake that will cause repercussions far beyond Europe. But the Russian president might be planting the seeds for the demise of his regime by overreaching.

  • Wide Range of Possible Targets for Russian Cyberstrikes, from Infrastructure to Smartphones

    For years prior to Russia’s invasion of Ukraine, Vladimir Putin’s government waged cyberwar aimed at destabilizing the country’s infrastructure, government, and financial systems, including several distributed-denial-of-service (DDoS) attacks in the run-up to this week’s assault. What are Russia’s cyberwarfare capabilities, and what would a cyberattack against the U.S. look like?

  • The U.S. Digital Security Challenges: Q&A with Frederic Lemieux

    The U.S. is facing many digital challenges: Ransomware attacks; critical infrastructure vulnerability; exploitation of flaws in widely used software packages such as SolarWinds; potential Russian cyberattacks resulting from the Ukraine crisis; shortage of cybersecurity talent which leaves many government and private sector positions vacant; and many more. HSNW talked with Georgetown’s Professor Frederic Lemieux, a recognized expert in the fields of global threats and homeland security.