• CYBERSECURITYNew CPU Vulnerability Makes Virtual Machine Environments Vulnerable

    By Falko Schoklitsch

    Researchers have identified a security vulnerability that could allow data on virtual machines with AMD processors to fall under the control of attackers.

  • ARGUMENT: CYBERWAR SCAREIs the Fear of Cyberwar Worse Than Cyberwar Itself?

    Unrealistic cyberwar expectations could hold the insurance industry back, and that’s the real economic security problem. The “hyperbolic characterization of cyberwar is likely a bigger problem than the threat of cyberwar itself. The problem is one of economic security,” Tom Johansmeyer writes.

  • CYBERSECURITYFrom ********* to EZacces$! Your Browser Extension Could Grab Your Password and Sensitive Info

    By Jason Daley

    When you type a password or credit card number into a website, you expect that your sensitive data will be protected by a system designed to keep it secure. That’s not always the case.

  • WATER SECURITYEPA Cancels Certain Cyber Regulations for Water Utilities

    Following growing concerns about the cybersecurity of the U.S. water infrastructure, the EPA announced this week it will no longer require cybersecurity audits of water utility facilities through sanitary surveys.

  • DEEPFAKESStudy of Wartime Deepfakes Reveals Their Impact on News Media

    Deepfakes are artificially manipulated audio-visual material. A new study, the first empirical analysis of the use of deepfakes in wartime misinformation and propaganda, examined tweets about deepfakes during the Russo-Ukrainian war, demonstrating that deepfakes undermine peoples trust generally in news media.

  • CYBERSECURITYNew Cyber Algorithm Shuts Down Malicious Robotic Attack

    Researchers have designed an algorithm that can intercept a man-in-the-middle (MitM) cyberattack on an unmanned military robot and shut it down in seconds.

  • AICritical Vulnerabilities Found within Major LLMs

    Large Language Models (LLMs) such as ChatGPT and Bard have taken the world by storm this year, with companies investing millions to develop these AI tools, and some leading AI chatbots being valued in the billions. Computer scientists have demonstrated that chunks of these LLMs can be copied in less than a week for as little as $50, and the information gained can be used to launch targeted attacks.

  • AIResponsible AI Initiative Seeks to Solve Societal Problems

    By Amy Choate-Nielsen

    With a $100 million investment, a new research initiative focuses on artificial intelligence (AI) that aims to responsibly use advanced AI technology to tackle societal issues.

  • CYBERCRIMESoutheast Asian Casinos Emerge as Major Enablers of Global Cybercrime

    By Cezary Podkul

    A growing number of casinos in Cambodia, Laos and Myanmar are engaging in large-scale money laundering, facilitating cyberfraud that is costing victims in America and abroad billions of dollars, according to new research by the United Nations.

  • CYBERSECURITYComputer Scientists Awarded $3M to Bolster Cybersecurity

    By Louis DiPietro

    A $3 million grant from the DARPA, the research and development arm of the U.S. Department of Defense, aims to leverage reinforcement learning to make computer networks stronger, dynamic and more secure.

  • CYBERSECURITY$9.5 Million to Enhance Cybersecurity in Health Care

    By Miles Martin

    “Health care systems are highly vulnerable to ransomware attacks, which can cause catastrophic impacts to patient care and pose an existential threat to smaller health systems,” said an expert. Researchers at University of California San Diego School of Medicine have been awarded $9.5 million for research that aims to protect the United States health care system against hostile cyber threats.

  • CYBERSECURITYNSF Backs Processor Design, Chip Security Research

    Rice University computer scientists have won two grants from the National Science Foundation to explore new information processing technologies and applications that combine seamlessly co-designed hardware and software to allow for more effective and efficient data stream analysis using pattern matching.

  • CYBERSECURITYU.S., Latin America to Boost Cybersecurity

    By Jeff Seldin

    Countries up and down the Western Hemisphere are looking to eliminate weaknesses in their cyber infrastructure that could give potential adversaries, including China and Russia, the ability to do extensive damage by exploiting a single vulnerability.

  • ARGUMENT: CYBERTHREATS & NUCLEAR CREDIILITYThe Cyber Threat to Nuclear Non-Proliferation

    Most cyber scholars looking at the nexus of cyber campaigns/operations and the nuclear weapons enterprise—command and control, communications, and delivery systems—focus on the consequences of targeting the enterprise through cyber operations during militarized crises or armed conflicts between nuclear powers. Michael P. Fischerkeller writes that there is, however, a third geopolitical condition—competition short of crisis and armed conflict—where the consequences, although of a different ilk, are no less severe.

  • INFRASTRUCTURE ROTECTIONHarmonization of Cyber Incident Reporting for Critical Infrastructure Entities

    DHS outlined a series of actionable recommendations on how the federal government can streamline and harmonize the reporting of cyber incidents to better protect the nation’s critical infrastructure.