-
Preparing Future Cybersecurity Leaders for Protecting Critical Infrastructure
A network of Virginia universities, in partnership with the Virginia Department of Elections, joined to create an innovative educational program to train future cybersecurity professionals to protect election infrastructure.
-
-
Belarusian Government Linked to Hacking, Disinformation Campaign
U.S. cybersecurity researchers say they have uncovered evidence that the Belarusian government is linked to a hacking and disinformation campaign against Eastern European NATO members.
-
-
Managing the Cybersecurity Vulnerabilities of Artificial Intelligence
The National Security Commission on Artificial Intelligence found that, “While we are on the front edge of this phenomenon, commercial firms and researchers have documented attacks that involve evasion, data poisoning, model replication, and exploiting traditional software flaws to deceive, manipulate, compromise, and render AI systems ineffective.” Jim Dempsey writes that “In assembling a toolkit to deal with AI vulnerabilities, insights and approaches may be derived from the field of cybersecurity. Indeed, vulnerabilities in AI-enabled information systems are, in key ways, a subset of cyber vulnerabilities.”
-
-
Serious Security Vulnerabilities in DRAM Memory Devices
Researchers have discovered major vulnerabilities in DRAM memory devices, which are widely used in computers, tablets and smartphones. The vulnerabilities have now been published together with the National Cyber Security Centre, which for the first time has assigned an identification number for it.
-
-
A Secure Environment for Developing the Future of Cybersecurity Solutions
To stay ahead of hackers and cybercriminals, we need a rapid, streamlined way to develop, test, and utilize cutting-edge cybersecurity solutions. DHS ST and CISA are partnering to develop CISA’s Cybersecurity Laboratory.
-
-
CyberForce Competition: Collegiate Students Try to Outwit Cyberattackers
The cybersecurity field faces a shortfall of qualified professionals to fill nearly half a million open jobs. The CyberForce Competition, to be held on 13 November at the Argonne National Laboratory, will see college and university students from across the United States attempt to thwart a simulated cyberattacks. The competition seeks to inspire and help develop the next generation of energy sector cyber defenders.
-
-
Interpol Unveils Emerging Cyberthreats
The exceptional COVID-19 crisis has fueled the increase of cybercrime in all its forms, while grey infrastructure serves to facilitate the proliferation of crime.
-
-
Important Breakthrough to Help Secure Electrical Grid
As the electrical grid is modernized, it requires new safeguards to keep it safe from cyberattackers. Researchers have developed a novel security approach to find and stop cyberthreats that penetrate the IT layer, preserving grid stability.
-
-
Protecting Infrastructure from Hackers
Two Midwestern universities lead an effort to form a coalition of regional research centers to work together to develop the region’s cyber defense talent with an eye to bolstering the defense of the region’s infrastructure against hackers.
-
-
U.S. Offers Reward for Information on Russian DarkSide Cybercrime Group
The United States has announced a reward of up to $10 million for information leading to the identification or location of any individual holding a “key leadership” position in DarkSide, a cybercrime group believed to be tied to Russia.The DarkSide syndicate was behind the attack on Colonial Pipeline – the largest publicly disclosed cyberattack against critical infrastructure in the United States.
-
-
Government Action Needed to Ensure Insurance Against Major Hacking of Driverless Vehicles: Experts
Government action is needed so driverless vehicles can be insured against malicious hacks which could have potentially catastrophic consequences, experts say. Traditional vehicle insurance wouldn’t cover the mass hacking of driverless cars, and an incident like this could cost the industry tens of billions of pounds.
-
-
Securing Data Transfers with Relativity
The volume of data transferred is constantly increasing, but the absolute security of these exchanges cannot be guaranteed, as shown by cases of hacking frequently reported in the news. Scientists have implemented a new way to secure data transfers based on the physical principle of relativity.
-
-
U.S. Sanctions NSO Group, Israeli Maker of Pegasus Spyware
The U.S. authorities said the NSO Group’s spyware helped authoritarian governments “silence dissent.” The new measures will limit NSO Group’s access to U.S. components and technology.
-
-
Protecting U.S. Critical Infrastructure from Cyberattacks
Over the past year, there has been a sharp increase in cyberattacks using malware to target the systems of critical infrastructure such as utility companies, government agencies and organizations that provide services and products that we rely on daily.
-
-
Hackers-for-Hire Drive Evolution of Threat Landscape
Cybersecurity threats are on the rise. The new edition of the ENISA Threat Landscape (ETL) highlights the surge in cybercriminality motivated by monetization using ransomware or cryptojacking. Supply-chains attacks also rank highly among prime threats because of the significant potential they have in inducing catastrophic cascading effects.
-
More headlines
The long view
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.