-
Detecting, Blocking Grid Cyberattacks
Researchers have designed and demonstrated a technology that can block cyberattacks from impacting the nation’s electric power grid.
-
-
Macron’s Secure Mobile Phone Compromised by Pegasus Spyware
The secure smartphone of French president Emmanuel Macron was compromised by the Pegasus surveillance malware. It was surreptitiously installed by Moroccan intelligence operatives, who introduced the virus into the phones of former Prime Minister Edouard Philippe and fourteen other current and former French cabinet ministers.
-
-
CyberForce Program Now offering Year-Round Cyber Defense Events
The cybersecurity field is facing a shortfall of 1.8 million professionals by 2022. To fill that skills gap, Argonne, in partnership with DOE, launched CyberForce in 2016 as an annual competition that has challenged college teams to build and defend a simulated energy infrastructure from cyber attacks. DOE is now expanding its CyberForce program and offers more ways for students to test their cybersecurity skills.
-
-
Journalists, Activists among 50,000 Targets of Israeli Spyware: Reports
Israeli cyber firm NSO Group claims that its Pegasus surveillance malware is sold to governments so they can better track terrorists and criminals, but many of the 45 governments deploying the surveillance software use it to track journalists, opposition politicians, and civil society activists. Some of these governments are authoritarian (for example, Azerbaijan, Bahrain, Kazakhstan, UAE, Saudi Arabia). Other are democracies (for example, India, Mexico, South Africa). The only EU member country to deploy the surveillance malware is Hungary, which places it in violation of the EU’s strict privacy and surveillance regulations.
-
-
China Spy Agency Using Contract Hackers to Extort, Destabilize Western Companies
The United States and its allies in Europe and Asia have charged that China’s Ministry of State Security is employing criminal contract hackers to conduct cyber operations globally, from which the hackers personally profit. The activities include ransomware operations against private companies which are forced to pay millions in ransom demands to regain access to their data.
-
-
The Storywrangler: Exploring Social Media Messages for Signs of Coming Turmoil
Scientists have invented an instrument to peer deeply into the billions and billions of posts made on Twitter since 2008, and have begun to uncover the vast galaxy of stories that they contain looking for patterns which would help predict political and financial turmoil.
-
-
Will China Retaliate Against U.S. Chip Sanctions?
In response to a series of Chinese trade infractions (intellectual property theft, forced technology transfers, cyber espionage, and WTO violations), the U.S. government implemented a sanctions regime which has inflicted increasing pain on China’s semiconductor industry. The Biden administration has doubled down on the Trump’s sanction strategy against China’s high-tech sector. Terry Daly and Jordan Schneider write that China has so far abstained from taking major retaliatory measures against the United States, but this is not likely to last. “The prudent course in a period of uncertainty is risk mitigation. This applies to countries and companies alike,” Daly and Schneider write.
-
-
Cryptographic Vulnerabilities on Popular Messaging Platform, Telegram
Researchers have completed a substantial security analysis of the encryption protocol used by the popular messaging platform, Telegram, with over half a billion monthly active users. The researchers found several cryptographic weaknesses in the protocol that ranged from technically trivial and easy to exploit, to more advanced.
-
-
Surgeon General Urges ‘Whole-of-Society’ Effort to Fight Health Misinformation
“Misinformation is worse than an epidemic: It spreads at the speed of light throughout the globe, and can prove deadly when it reinforces misplaced personal bias against all trustworthy evidence,” said National Academy of Sciences President Marcia McNutt. “Research is helping us combat this ‘misinfodemic’ through understanding its origins and the aspects of human nature that make it so transmittable.”
-
-
Did the Cybersecurity Workforce Gap Distract Us from the Leak?
There are 500,000 unfilled cybersecurity positions in the United States, and the number is growing. The government and private companies have been investing a lot of money and effort in training and recruiting young cybertalent through college programs, school partnerships, and by adjusting pay and benefit packages, but many have missed a significant leak in cyber workforce funnel: the rapid burnout and churn. In fact, the cyber workforce gap is in experienced roles, not junior levels. To fill the cyber workforce gap, we need to find ways to retain experienced cybersecurity talent.
-
-
Understanding the U.K. Cybersecurity Labor Market
The U.K. government is carrying out research to help understand and measure the U.K. cybersecurity labor market. This will help inform future policy and strategy.
-
-
Germany Fights Cyberattacks and Fraud Claims to Ensure Fair Election
Germany is in the middle of an election year that will see unprecedented use of mail-in ballots as well as hacker attacks against politicians. Election authorities reject claims of potential voter fraud.
-
-
Encrypting Photos on the Cloud to Keep Them Private
The limited amount of data that smartphones hold, and the way in which they are vulnerable to accidental loss and damage, lead many users to store their images online via cloud photo services. However, these online photo collections are not just valuable to their owners, but to attackers seeking to unearth a gold mine of personal data.
-
-
Empty Threats and Warnings on Cyber
It is not easy or simple to fashion a retaliation for cyberattacks, and the United States has been offering proof of that. For at least five years, the United States has been subject to a series of intensifying Russian cyberattacks, and public warnings by the Obama, Trump, and Biden administrations about the “consequences” for Russia have so far done little, if anything, to deter Russia. “Even if Biden responds to the latest ransomware operations, and he surely will, it is hard to see how he can impose pain enough to slow the operations while at the same time avoiding a serious risk of on-balance harmful escalation,” Jack Goldsmith writes.
-
-
Closing the Skills Gap in the Cyber Workforce
There are currently more than three million unfilled cybersecurity jobs globally, and, as high-profile incidents like the Solar Winds attack demonstrate, it is vital to address that shortage. But it is difficult for organizations to find and recruit the cyber talent they need.
-
More headlines
The long view
Researchers Develop AI Agent That Solves Cybersecurity Challenges Autonomously
New framework called EnIGMA demonstrates improved performance in automated vulnerability detection using interactive tools.