-
Knocking Cloud Security Off Its Game
Public cloud services employ special security technologies. Computer scientists at ETH Zurich have now discovered a gap in the latest security mechanisms used by AMD and Intel chips. This affects major cloud providers.
-
-
U.S. Sanctions on Iranian Hackers Highlight Growing Concern About the Islamic Republic’s Cyberwarriors
A feature of the simmering tensions between the US, Israel and Iran has been not just the tit-for-tat missile and drone strikes and assassinations, but accusations of cyberwarfare waged by Iran.
-
-
Computer Scientists Unveil Novel Attacks on Cybersecurity
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. Intel and AMD issued security alerts based on the findings.
-
-
New Cybersecurity Center to Protect Grids Integrated with Renewables, Microgrids
Bringing renewable energy to the power grid raises all kinds of “internet-of-things” issues because “everything is connected,” says an expert. Solar inverters are connected to the internet. Wind farm controllers are connected to the internet. And with each internet connection, energy resources distributed across the countryside are potentially vulnerable to cyberattacks.
-
-
First Regional Cybersecurity Center to Protect the Nation’s Electricity Grid
U.S. Department of Energy awards $10 million grant to develop innovative solutions to mitigating cyber threats across the U.S. A new center will bring together experts from the private sector, academia and government to share information and generate innovative real-world solutions to protect the nation’s power grid and other key sectors.
-
-
Cybersecurity Researchers Spotlight a New Ransomware Threat – Be Careful Where You Upload Files
Today’s web browsers are much more powerful than earlier generations of browsers. Unfortunately, these capabilities also mean that hackers can find clever ways to abuse the browsers to trick you into letting ransomware lock up your files when you think that you’re simply doing your usual tasks online.
-
-
This Tiny Chip Can Safeguard User Data While Enabling Efficient Computing on a Smartphone
Researchers have developed a security solution for power-hungry AI models that offers protection against two common attacks.
-
-
Chinese Government Poses 'Bold and Unrelenting' Threat to U.S. Critical Infrastructure: FBI
FBI Director Christopher Wray on 18 April warned that risks the government of China poses to U.S. national and economic security are “upon us now”—and that U.S. critical infrastructure is a prime target. He said that partnerships, joint operations, and private sector vigilance can help us fight back.
-
-
Spyware as Service: What the i-Soon Files Reveal About China’s Targeting of the Tibetan Diaspora
Governments are increasingly incorporating cyber operations into the arsenal of statecraft. This sophisticated integration combines open-source intelligence, geospatial intelligence, human intelligence, and cyber espionage with artificial intelligence, allowing for the gathering and analysis of ever-expanding data sets. Increasingly, such operations are being outsourced.
-
-
Israel’s Cybersecurity Market is Maturing, and Just in Time
As tensions around the world rise and cyber threats multiply like digital rabbits, the Israeli cyber scene’s maturation seems like a saving grace.
-
-
Cybertech Startup Aims to Keep Aircraft Safe
As hackers get more daring and sophisticated, and even try to hijack airplanes, it’s increasingly vital to keep our aircraft safe from attack. Cybertech startup Cyviation aims to do just that.
-
-
Cyber Safety Review Board Releases Report on Microsoft Online Exchange Incident from Summer 2023
On Tuesday, the U.S. Department of Homeland Security (DHS) released the Cyber Safety Review Board’s (CSRB) findings and recommendations following its independent review of the Summer 2023 Microsoft Exchange Online intrusion. The review detailed operational and strategic decisions that led to the intrusion and recommended specific practices for industry and government to implement to ensure an intrusion of this magnitude does not happen again.
-
-
Engineers Fortifying Critical Infrastructure
In a bid to protect the nation’s energy sector against cyber attacks, engineers are creating a digital twin to help weed out threats and fix software and firmware vulnerabilities. If left unchecked, these weaknesses could allow ransomware attacks that could cause severe havoc to critical U.S. energy systems.
-
-
What Is Volt Typhoon? A Cybersecurity Expert Explains the Chinese Hackers Targeting U.S. Critical Infrastructure
Volt Typhoon is a Chinese state-sponsored hacker group. The United States government and its primary global intelligence partners, known as the Five Eyes, issued a warning on March 19, 2024, about the group’s activity targeting critical infrastructure. The warning echoes analyses by the cybersecurity community about Chinese state-sponsored hacking in recent years.
-
-
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.