-
Study of Wartime Deepfakes Reveals Their Impact on News Media
Deepfakes are artificially manipulated audio-visual material. A new study, the first empirical analysis of the use of deepfakes in wartime misinformation and propaganda, examined tweets about deepfakes during the Russo-Ukrainian war, demonstrating that deepfakes undermine peoples trust generally in news media.
-
-
New Cyber Algorithm Shuts Down Malicious Robotic Attack
Researchers have designed an algorithm that can intercept a man-in-the-middle (MitM) cyberattack on an unmanned military robot and shut it down in seconds.
-
-
Critical Vulnerabilities Found within Major LLMs
Large Language Models (LLMs) such as ChatGPT and Bard have taken the world by storm this year, with companies investing millions to develop these AI tools, and some leading AI chatbots being valued in the billions. Computer scientists have demonstrated that chunks of these LLMs can be copied in less than a week for as little as $50, and the information gained can be used to launch targeted attacks.
-
-
Responsible AI Initiative Seeks to Solve Societal Problems
With a $100 million investment, a new research initiative focuses on artificial intelligence (AI) that aims to responsibly use advanced AI technology to tackle societal issues.
-
-
Southeast Asian Casinos Emerge as Major Enablers of Global Cybercrime
A growing number of casinos in Cambodia, Laos and Myanmar are engaging in large-scale money laundering, facilitating cyberfraud that is costing victims in America and abroad billions of dollars, according to new research by the United Nations.
-
-
Computer Scientists Awarded $3M to Bolster Cybersecurity
A $3 million grant from the DARPA, the research and development arm of the U.S. Department of Defense, aims to leverage reinforcement learning to make computer networks stronger, dynamic and more secure.
-
-
$9.5 Million to Enhance Cybersecurity in Health Care
“Health care systems are highly vulnerable to ransomware attacks, which can cause catastrophic impacts to patient care and pose an existential threat to smaller health systems,” said an expert. Researchers at University of California San Diego School of Medicine have been awarded $9.5 million for research that aims to protect the United States health care system against hostile cyber threats.
-
-
NSF Backs Processor Design, Chip Security Research
Rice University computer scientists have won two grants from the National Science Foundation to explore new information processing technologies and applications that combine seamlessly co-designed hardware and software to allow for more effective and efficient data stream analysis using pattern matching.
-
-
U.S., Latin America to Boost Cybersecurity
Countries up and down the Western Hemisphere are looking to eliminate weaknesses in their cyber infrastructure that could give potential adversaries, including China and Russia, the ability to do extensive damage by exploiting a single vulnerability.
-
-
The Cyber Threat to Nuclear Non-Proliferation
Most cyber scholars looking at the nexus of cyber campaigns/operations and the nuclear weapons enterprise—command and control, communications, and delivery systems—focus on the consequences of targeting the enterprise through cyber operations during militarized crises or armed conflicts between nuclear powers. Michael P. Fischerkeller writes that there is, however, a third geopolitical condition—competition short of crisis and armed conflict—where the consequences, although of a different ilk, are no less severe.
-
-
Harmonization of Cyber Incident Reporting for Critical Infrastructure Entities
DHS outlined a series of actionable recommendations on how the federal government can streamline and harmonize the reporting of cyber incidents to better protect the nation’s critical infrastructure.
-
-
Walking the Artificial Intelligence and National Security Tightrope
Artificial intelligence (AI) presents nations’ security as many challenges as it does opportunities. While it could create mass-produced malware, lethal autonomous weapons systems, or engineered pathogens, AI solutions could also prove the counter to these threats. Regulating AI to maximize national security capabilities and minimize the risks presented to them will require focus, caution and intent.
-
-
A Review of NIST’s Draft Cybersecurity Framework 2.0
Cybersecurity professionals, and anyone interested in cybersecurity, have noted that the gold standard of cybersecurity is getting a needed polish. “But all that glitters is not gold,” Melanie Teplinsky writes. NIST’s voluntary cybersecurity framework leaves organizations vulnerable to the nation’s most capable cyber adversaries. NIST’s proposed overhaul won’t change that.
-
-
The Scourge of Commercial Spyware—and How to Stop It
Years of public revelations have spotlighted a shadowy set of spyware companies selling and servicing deeply intrusive surveillance technologies that are used against journalists, activists, lawyers, politicians, diplomats, and others. Democratic nations (thus far) lag behind the United States in executing spyware-related policy commitments.
-
-
International Ransomware Gangs Are Evolving Their Techniques. The Next Generation of Hackers Will Target Weaknesses in Cryptocurrencies
In reality, not a week goes by without attacks affecting governments, schools, hospitals, businesses and charities, all over the world. These attacks have significant financial and societal costs. Ransomware is now widely acknowledged as a major threat and challenge to modern society, and there is every expectation that criminals will continue to adapt their strategies and cause widespread damage for many years to come.
-
More headlines
The long view
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.