News Items

  • news

    Visible to the public "Millions of Hotel Guests Worldwide Caught Up in Mass Data Leak"

    A widely used hotel reservation platform called Cloud Hospitality has exposed 10 million files related to guests at various hotels worldwide, thanks to a misconfigured Amazon Web Services S3 bucket. Cloud Hospitality is used by hotels to integrate their reservation systems with online booking websites. The incident has affected 24.4 GB worth of data in total. The number of people exposed is likely well over 10 million, researchers said. The records included full names, email addresses, national ID numbers of hotel guests, phone numbers of hotel guests, card numbers, cardholder names, CVV, expiration dates, and reservation details. The exposure affects many platforms, with data related to reservations made through Amadeus, Booking.com, Expedia, Hotels.com, Hotelbeds, Omnibees, Sabre, and more.

    Threatpost reports: "Millions of Hotel Guests Worldwide Caught Up in Mass Data Leak"

  • news

    Visible to the public New Compliance Audit Readiness Assment for cybersecurity

    New Cybersecurity Assessment tool

    KnowBe4 provides a free cybersecurity compliance tool called CARA--the Compliance Audit Readiness Assessment tool. The assessment is in line with the Cybersecurity Maturity Model Certification.

    https://www.infosecurity-magazine.com/news/knowbe4-launch-free-compliance-tool/

    #cybersecurity #ScienceofSecurity

  • news

    Visible to the public "New Cyber Technologies Protect Utility Energy Delivery Systems"

    Researchers from the Pacific Northwest National Laboratory (PNNL) worked with utility advisors and companies specializing in vulnerability identification to develop two new web-based tools aimed at mitigating cybersecurity vulnerabilities in operational technologies. The first tool, called Mitigation of Externally Exposed Energy Delivery Systems (MEEDS), helps utilities monitor and quickly identify internet-connected control system devices and their known vulnerabilities. PNNL's second tool, called Safe, Secure Autonomous Scanning Solutions for Energy Delivery Systems (SSASS-E), identifies vulnerabilities contained by energy delivery systems that can emerge within a utility's firewall. This article continues to discuss the capabilities of MEEDS and SSASS-E.

    PNNL reports "New Cyber Technologies Protect Utility Energy Delivery Systems"

  • news

    Visible to the public "Ransomware Attack Toys With Mattel Systems, Data"

    Mattel, one of the largest toy manufacturers in the world, recently fell victim to a ransomware attack in July on its information technology systems. The attack temporarily impacted its business functions. However, no data regarding business operations, retail customers, suppliers, consumers, or employees was stolen by the operators behind the attack. As the holiday season approaches, the number of ransomware campaigns are expected to increase. Adversaries will see retailers' reliance on online business as an opportunity to execute more attacks. If attackers can disrupt shopping-related events such as Black Friday and Cyber Monday, organizations would be more willing to pay demanded ransoms. This article continues to discuss the ransomware attack on Mattel's systems and the expected rise in ransomware attacks against organizations during the holiday shopping season.

    SC Media reports "Ransomware Attack Toys With Mattel Systems, Data"

  • news

    Visible to the public "1 in 4 Cyberattacks Handled by U.K.'s NCSC Were Related to COVID-19"

    The United Kingdom's National Cyber Security Center's (NCSC) annual threat report revealed that U.K. organizations experienced an average of 60 cyberattacks per month from September 2019 to August 2020. The NCSC's defense system stopped more than 15,000 COVID-19 related malicious campaigns. According to the report, one in four security incidents handled by the NCSC involved the exploitation of the pandemic. This article continues to discuss the COVID-19 related cyberattacks handled by the U.K.'s NCSC and the organization's work to help frontline healthcare providers defeat cyber threats.

    CISOMAG reports "1 in 4 Cyberattacks Handled by U.K.'s NCSC Were Related to COVID-19"

  • news

    Visible to the public "In Q2 2020, There Was an Average of 419 New Threats Per Minute"

    In a new report released by McAfee researchers examining cybercriminal activity related to malware and the evolution of cyber threats in Q2 2020. The researchers found there was an average of 419 new threats per minute as overall new malware samples grew by 11.5%. The researchers also found that in Q2, there was a 605 percent increase in COVID-19 related attack detections compared to Q1. The researchers also found that Donoff played a critical role in driving the 689 percent surge in PowerShell malware in Q1 2020.

    Help Net Security reports: "In Q2 2020, There Was an Average of 419 New Threats Per Minute"

  • news

    Visible to the public "A Hacker Is Threatening to Leak Patients' Therapy Notes"

    There has been a rise in ransomware attacks against large companies and critical organizations such as those that provide medical care. A hacker is currently threatening to publicly release data stolen from Finland's health care and mental health services provider Vastaamo. The data contains sensitive information, including therapy notes. The investigation of this situation revealed that Vastaamo had at least one unsecured database containing patient information, which was breached in November 2018 and possibly in mid-March 2019. Although the number of affected patients remains unknown, the National Bureau of Investigation said that tens of thousands might be impacted. The hacker behind the extortion campaign has demanded around $530,000 worth of Bitcoin from Vastaamo. This article continues to discuss the extortion campaign targeting Finland's Vastaamo mental health services provider, the response to this incident, the different forms of data extortion attacks, and other examples of patient data being used in extortion schemes.

    Wired reports "A Hacker Is Threatening to Leak Patients' Therapy Notes"

  • news

    Visible to the public "World's Fastest Open-Source Intrusion Detection Is Here"

    Researchers in Carnegie Mellon University's CyLab have developed the fastest open-source intrusion detection system. The system achieves speeds of 100 gigabits per second using a single server with five processor cores. The success behind the performance of the CMU team's intrusion detection system is attributed to a Field-Programmable Gate Array (FPGA), which is a flexibly programmable integrated circuit. CMU researchers programmed the FPGA specifically for intrusion detection and wrote significantly fast algorithms that cannot run on traditional processors. The FPGA processes an average of 95 percent of data packets by itself when placed in the network, while the central processing units take on the other five percent when the FPGA becomes overwhelmed. As a result, the intrusion detection system saves more energy as it uses 38 times less power by using an FPGA than 100-700 processor cores would to perform the same tasks. This article continues to discuss the development, efficiency, and availability of the CMU team's intrusion detection system.

    CyLab reports "World's Fastest Open-Source Intrusion Detection Is Here"

  • news

    Visible to the public "Google Forms Abused to Phish AT&T Credentials"

    Security researchers have discovered that adversaries are using phishing attacks that leverage Google Forms as a landing page to collect victims' credentials. The forms masquerade as login pages from more than 25 different companies, brands, and government agencies. So far, the researchers have discovered 265 different Google Forms used in these attacks, which are likely sent to victims via email (using social engineering tactics). More than 70 percent of these forms purported to be from AT&T. However, there are other big brands, including Citibank, Capital One, Microsoft OneDrive, Outlook, and Internal Revenue Service (IRS). The forms were not detected as phishing using most common industry techniques since it used a high-reputation domain established several years ago and used a valid SSL certificate. Google forms state automatically at the base of each form to "never submit passwords via Google forms." However, the researchers stated that many victims evidentially ignore the warning.

    Threatpost reports: "Google Forms Abused to Phish AT&T Credentials"

  • news

    Visible to the public "Paying a Ransom to Prevent Leaking of Stolen Data is a Risky Gamble"

    Researchers at Coveware found that recently ransomware groups are targeting larger enterprises more frequently. The average payment for ransomware attacks has increased by 31 percent in Q3 2020 (reaching $233,817). The researchers suggest that organizations never pay the ransom. The researchers also found that improperly secured Remote Desktop Protocol (RDP) connections and compromised RDP credentials are the most prevalent way for ransomware gangs to get into an organization's system, followed by email phishing and software vulnerabilities.

    Help Net Security reports: "Paying a Ransom to Prevent Leaking of Stolen Data is a Risky Gamble"

  • news

    Visible to the public "Ransom Payment No Guarantee Against Doxxing"

    According to Coveware's analysis of ransomware attack data during the third quarter of the year, organizations that paid threat actors' demanded ransom were often doxxed and ordered to pay more. Doxxing refers to the public broadcasting of private or identifying information belonging to an individual or organization. For example, victims of the Sodinokobi ransomware group were hit with additional demands for more money, weeks after paying to prevent the release of the same dataset. The operators behind Netwalker and Mespinoza ransomware posted data from companies that had paid a ransom so that the data would not be released to the public. This article continues to discuss incidents in which organizations are doxxed by attackers despite paying the demanded ransom, the expected growth in cyber extortion, and the increase in attacks targeting big organizations.

    Dark Reading reports "Ransom Payment No Guarantee Against Doxxing"

  • news

    Visible to the public "Researchers Recover 75,000 'Deleted' Files From Pre-Owned USB Drives"

    During a study on the risks posed by selling Universal Serial Bus (USB) drives on the internet, cybersecurity researchers from Abertay University were able to retrieve 75,000 deleted files from pre-owned USB drives purchased on a popular online auction site. Many of the files recovered from the drives are highly sensitive in that they include passwords, contracts, bank statements, tax returns, images with embedded location data, and more. A malicious buyer could easily retrieve files from used USB drives with publicly available forensic tools. They can perform harmful activities using recovered information, such as stealing money from bank accounts or extortion. This article continues to discuss the researchers' recovery of deleted files from used USB drives, how malicious actors could use the information retrieved from these drives, and the importance of permanently wiping USB devices before selling or discarding them.

    Abertay University reports "Researchers Recover 75,000 'Deleted' Files From Pre-Owned USB Drives"

  • news

    Visible to the public "34M Records From 17 Companies Up For Sale In Cybercrime Forum"

    Researchers have recently discovered 34 million user records on an underground sales forum, which the cybercriminals claim are from 17 different corporate data breaches. The records came up for sale last week, and the theft appears to be the work of a single person or group. The affected companies are a widely diverse set of targets and are from around the world. The affected companies include Apps-builder.com, Athletico, Cermati, Clip, Coupontools.com, Eatigo, Everything5pounds.com, Fantasy Crunche, Game24h, Geekie, Invideo, Katapult, RedMart, Toddycafe, W3layouts, Wedmegood, and Wongnai.

    Threatpost reports: "34M Records From 17 Companies Up For Sale In Cybercrime Forum"

  • news

    Visible to the public "Creating a National Network of Cybersecurity Institutes"

    The Critical Infrastructure Resilience Institute (CIRI) has been awarded $2 million by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) and the Cybersecurity and Infrastructure Security Agency (CISA). CIRI is one of the DHS S&T Centers of Excellence (COEs) led by the University of Illinois at Urbana-Champaign (UIUC). Through this funding, CIRI will develop a plan for CISA to build a national network of cybersecurity institutes. These institutes will educate and train cybersecurity professionals to help reduce the cybersecurity workforce gap. CIRI will collaborate with Auburn University, Purdue University, and the University of Tulsa to develop the plan, based on an academic hub-and-spoke model, for building this network of cybersecurity institutes. This article continues to discuss the growing cybersecurity workforce shortage and the award given to CIRI to develop a plan to create a national network of institutes to cultivate the skills of cybersecurity professionals.

    Homeland Security News Wire reports "Creating a National Network of Cybersecurity Institutes"

  • news

    Visible to the public "Election Day Was Hack Free, but Cybersecurity Officials Are Still Bracing for Attacks"

    Officials from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) revealed that no cyberattacks were detected on Election Day. According to officials from CISA and the NSA, cyberattack attempts were significantly quieter on the 2020 Election Day than that of 2016 and 2018. However, concerns remain as hackers could still attempt to undermine the credibility of the voting process over the next several days as votes continue to be counted. Cybersecurity officials are still bracing for disinformation campaigns or attacks on social media platforms aimed at undermining the process. Although CISA can monitor cybersecurity via sensors and reports from local election officials, controlling disinformation is a different challenge. This article continues to discuss the lack of an apparent cyberattack on Election Day, the shift in the attack surface from the voting process, how CISA is addressing disinformation, and major incidents that have ignited the importance of election security.

    CNET reports "Election Day Was Hack Free, but Cybersecurity Officials Are Still Bracing for Attacks"

  • news

    Visible to the public "Ransomware Alert as Emotet Detections Surge 1200%"

    Researchers at HP Inc. have discovered attacks using the Emotet Trojan soared by over 1200 percent from Q2 to Q3 of this year. Emotet is often used as a loader, providing access to third-party threat groups to deploy secondary TrickBot and QakBot infections as well as human-operated ransomware. According to current patterns, a senior malware analyst is warning that Emotet will likely appear in weekly spam runs until early 2021.

    Info Security reports: "Ransomware Alert as Emotet Detections Surge 1200%"

  • news

    Visible to the public HotSoS 2020 Summary Report

    Hot Topics in the Science of Security (HotSoS) 2020


  • news

    Visible to the public "Cyber-Criminals Target Zoom Users"

    The Bitdefender Antispam Antispam Lab has detected a new cyber-extortion campaign targeting those using the video-conferencing Zoom while undressed. A quarter of a million people have received an email claiming to have footage of them in compromising positions while using Zoom. The email threatened victims to pay a $2,000 ransom in Bitcoin within three days to prevent the exposure of their footage to the public. The extortionist claims to have exploited a zero-day security vulnerability in the Zoom app to access the victim's camera and private data. This article continues to discuss the new sextortion scam launched by cybercriminals against Zoom users for Bitcoin payments.

    Infosecurity Magazine reports "Cyber-Criminals Target Zoom Users"

  • news

    Visible to the public "60% of Organizations Have Accelerated Their Zero Trust Projects"

    Researchers at Pulse Secure surveyed more than 250 technology professionals and found that the coronavirus pandemic did not impact the adoption of zero trust technology globally. They found that 60 percent of organizations accelerated zero trust implementation during the pandemic. The organizations that had dedicated budgets and formal initiatives (69%) were far more likely to continue accelerating those projects throughout the pandemic.

    Help Net Security reports: "60% of Organizations Have Accelerated Their Zero Trust Projects"

  • news

    Visible to the public "U.S. Says Iranian Hackers Accessed Voter Information"

    According to an alert issued by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), an Iranian threat actor has accessed voter registration data. This alert follows another warning released by the United States one week ago about Democratic voters in multiple states being targeted by the same adversary with malicious emails aimed at getting them to vote for President Donald Trump. The new alert says an Iran-based adversary used open-source queries to access PDF documents from state voter sites and conducted research to find specific information that could be leveraged in exploitation attempts. Organizations are encouraged to update their applications and systems, identify and fix known vulnerabilities, implement firewalls, and apply two-factor authentication (2FA). This article continues to discuss the recent warning about the compromise of voter information by an Iranian threat actor, previous alerts about the targeting of voters by the same adversary, and what organizations should do to stay protected.

    Security Week reports "U.S. Says Iranian Hackers Accessed Voter Information"

  • news

    Visible to the public "CERT/CC Launches Twitter Bot to Give Security Bugs Random Names"

    The Computer Emergency Response Team Coordination Center (CERT/CC) at the Carnegie Mellon University launched a Twitter bot named Vulnonym to assign random names to security bugs that receive a CVE identifier. The idea is to give neural names to security vulnerabilities as names assigned to bugs by companies and researchers increasingly enter the area of fearmongering and attention-seeking. Names given to vulnerabilities have resulted in severe flaws being played down or unexploitable bugs being overhyped. The Vulnonym bot will provide each newly-assigned CVE ID a two-word codename in an adjective-noun format. This article continues to discuss the problem with vulnerability names and how the Vulnonym bot addresses this problem.

    ZDNet reports "CERT/CC Launches Twitter Bot to Give Security Bugs Random Names"

  • news

    Visible to the public "An Attacker Can Steal Sensitive User Data Over the Phone Using Smart Speakers"

    The use of Siri, Amazon Alexa, Google Assistant, and other voice assistants continues to grow in popularity worldwide. These Artificial Intelligence (AI) agents have been adopted by many to help perform tasks in their everyday lives, such as searching for information, sending emails, playing songs, and more. Though there are benefits to using voice assistants, there are many concerns surrounding the privacy and security of these agents as they can be used to collect data for targeted advertising and information from users. Researchers at the Georgia Institute of Technology further highlighted the potential abuse of voice assistants to access users' personal information by demonstrating an attack that exploits the vulnerabilities in these conversational agents. This article continues to discuss the growing use of voice assistants and the attack devised to unveil the vulnerabilities of these agents.

    The Tech and Science Post reports "An Attacker Can Steal Sensitive User Data Over the Phone Using Smart Speakers"

  • news

    Visible to the public "Breaches Down 51%, Exposed Records Set New Record With 36 billion So Far"

    Researchers at Risk Based Security have found that there were 2,935 publicly reported breaches in the first three quarters of 2020, meaning breaches are down 51 percent from the year before. However, the number of records exposed since last year has increased to a staggering 36 billion. The researchers believe that the sharp increase in records exposed this year is because adversaries are using ransomware attacks much more frequently.

    Help Net Security reports: "Breaches Down 51%, Exposed Records Set New Record With 36 billion So Far"

  • news

    Visible to the public "New Tool Simplifies Data Sharing, Preserves Privacy"

    A new study by researchers at Carnegie Mellon and IBM introduces a new tool to help maintain the privacy of data shared among companies, organizations, and government. The team of researchers developed a new tool called DoppelGANger that synthesizes new data, mimicking the original dataset while omitting sensitive information. DoppelGANger uses Generalized Adversarial Networks (GANs), which apply machine learning methods to perform this synthesis while keeping the same statistics of the original training data. This article continues to discuss how DoppleGANger simplifies data sharing and maintains the privacy of sensitive data shared between different companies.

    Carnegie Mellon University reports "New Tool Simplifies Data Sharing, Preserves Privacy"

  • news

    Visible to the public "Survey Uncovers High Level of Concern Over Firewalls"

    Ponemon Institute conducted a survey to which 603 US cybersecurity professionals responded. The survey asked them to share their thoughts on the effectiveness of firewalls in protecting against ransomware attacks and other security threats. More than half of the cybersecurity leaders who participated in the survey do not think most firewall technologies are effective in protecting their applications and systems from attacks. According to most of the security leaders, firewall technologies do little to help enable a zero-trust environment, require too much time for configuration, lack the necessary capabilities to block attacks, kill flexibility, and more. This article continues to discuss cybersecurity leaders' concerns and complaints surrounding firewall technologies.

    Dark Reading reports "Survey Uncovers High Level of Concern Over Firewalls"

  • news

    Visible to the public "Half of All Virtual Appliances Have Outdated Software and Serious Vulnerabilities"

    A new study by Orca Security, a cloud security company, found cases of poor security flaw patching and software component updating for virtual appliances among many software vendors. Orca Security's scan of more than 2,200 virtual appliance images from 540 vendors detected over 400,000 vulnerabilities. These images were being distributed via the public marketplaces of VMware, Amazon Web Services (AWS), Google Cloud Platform, and other common cloud platforms. The number of vulnerabilities discovered per virtual appliance stem from infrequent updates to the appliance. Orca Security's recommended steps for reducing security risks associated with virtual appliances involve asset management, the use of vulnerability management tools, the identification of the most severe vulnerabilities to prioritize actions, and more. This article continues to discuss key findings from Orca Security's study on the state of virtual appliance security, the mixed response from vendors to these findings, and how the security of virtual appliances can be improved.

    CSO Online reports "Half of All Virtual Appliances Have Outdated Software and Serious Vulnerabilities"

  • news

    Visible to the public "Researchers at TU/e Find Huge and Sophisticated Black Market for Trade in Online 'Fingerprints'"

    Researchers at TU/e have discovered a sophisticated Russian-based online black marketplace in which hundreds of thousands of detailed user profiles are traded among cybercriminals. These profiles are personal fingerprints, which could be used to evade state-of-the-art authentication systems and gain access to sensitive information. User fingerprints can include technical information and behavioral features. The marketplace shares over 260,000 continually updated, detailed user profiles in conjunction with passwords and other user credentials. Researchers emphasized the systematic nature of the marketplace by stating that it offers Impersonation-as-a-Service (IMPaaS). The database can be searched for specific internet users, allowing the performance of highly dangerous spear phishing attacks. In addition, customers can download software that can automatically apply selected user profiles to targeted websites. This article continues to discuss the dependence on user credentials in the online economy, the drawbacks of Multi-Factor Authentication (MFA), the concept behind Risk-Based Authentication (RBA), and the online criminal marketplace that offers IMPaaS.

    TU/e reports "Researchers at TU/e Find Huge and Sophisticated Black Market for Trade in Online 'Fingerprints'"

  • news

    Visible to the public "Wisconsin GOP Says Hackers Stole $2.3 Million From Trump Re-Election Effort"

    The Wisconsin Republican Party discovered that hackers had stolen $2.3 million from Trump re-election effort. The hackers manipulated invoices from four vendors. The invoices and other documents were altered, so when the party paid them, the money went to the hackers instead of the vendors. The hack was discovered after someone noticed that an invoice was generated that should not have been on October 22nd. The attack seems to have begun as a phishing attempt. It does not appear that any data was stolen.

    The Associated Press reports: "Wisconsin GOP Says Hackers Stole $2.3 Million From Trump Re-Election Effort"

  • news

    Visible to the public "FBI warning: Trickbot And Ransomware Attackers Plan Big Hit on US Hospitals"

    The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services warn US healthcare providers to be on high alert over Trickot malware and ransomware targeting the sector. CISA flagged Anchor_DNS, a backdoor created by the eastern European hackers behind the multifunctional Trickbot malware. The Anchor_DNS backdoor forces infected PCs to communicate with command-and-control servers over DNS to bypass network defense products and hide malicious communications with legitimate DNS traffic. The FBI is currently investigating recent attacks against healthcare providers in Oregon, California, and New York. The US government has warned hospitals to back up systems, to disconnect systems from the internet where possible, and avoid using personal email accounts.

    ZDNet reports: "FBI warning: Trickbot And Ransomware Attackers Plan Big Hit on US Hospitals"

  • news

    Visible to the public "Pentagon Expects to Deploy New Telework Tool in June 2021"

    The United States Department of Defense (DOD) developed the Commercial Virtual Remote (CVR) Environment to support mass telework during the COVID-19 pandemic. However, the department is working on another solution that will support long-term telework as well as handle more sensitive data. The department is set to deploy the new telework tool in June 2021. This article continues to discuss how the CVR Environment has helped during the pandemic and what is expected of the new long-term telework solution.

    NextGov reports "Pentagon Expects to Deploy New Telework Tool in June 2021"

  • news

    Visible to the public "Ryuk Ransomware Delivered Using Malware-as-a-Service Tool"

    According to the security firm Sophos, the operators behind Ryuk ransomware are using a malware-as-a-service tool called Buer to deliver the malware. Researchers have found that the Ryuk operators have been relying on this tool to deliver their ransomware for the past several months. The Buer loader allows them to compromise a target's Windows devices and set up a digital foothold into a network. This loader has been used in Trojan attacks and the deployment of other malware. This article continues to discuss the delivery of Ryuk ransomware using the Buer loader, the return of Ryuk, and the advertisement of Buer malware on underground forums.

    BankInfoSecurity reports "Ryuk Ransomware Delivered Using Malware-as-a-Service Tool"

  • news

    Visible to the public "HPE Patches Two Critical, Remotely Exploitable Vulnerabilities"

    Hewlett Packard Enterprise (HPE) released patches for two critical vulnerabilities. These vulnerabilities were discovered in the StoreServ Management Console (SMMC), BlueData EPIC Software Platform, and Ezmeral Container Platform. One of the vulnerabilities is considered the most severe in that it could be exploited by attackers to remotely circumvent protections implemented for authentication and gain access to the SSMC web application. The other vulnerability enables unauthorized interception or retrieval of sensitive Kerberos passwords. This article continues to discuss the potential exploitation of the two critical vulnerabilities.

    Security Week reports "HPE Patches Two Critical, Remotely Exploitable Vulnerabilities"

  • news

    Visible to the public "Google Boots 21 Bogus Gaming Apps from Play Marketplace"

    Researchers from Avast have found 21 gaming apps loaded with adware from the HiddenAds family on Google Play. The malicious gaming apps have been downloaded about 8 million times so far. The adware loaded on the malicious apps was used to serve up intrusive ads outside the applications. The adware also allowed the applications to hide so that they could not be easily deleted.

    Threatpost reports: "Google Boots 21 Bogus Gaming Apps from Play Marketplace"

  • news

    Visible to the public "76% of Applications Have at Least One Security Flaw"

    Researchers from Veracode analyzed 130,000 applications and found that most of the applications contained at least one security flaw (76 percent). Only 24 percent of the security flaws found were high-severity flaws. Most of the applications analyzed inherited at least one security flaw from their open source libraries. The researchers also found that it takes about six months for teams to close half the security flaws they find on average.

    Help Net Security reports: "76% of Applications Have at Least One Security Flaw"

  • news

    Visible to the public "Researchers: LinkedIn, Instagram Vulnerable to Preview-Link RCE Security Woes"

    Independent researchers have discovered that link previews in popular chat apps on iOS and Android are a firehose of security and privacy issues. Facebook Messenger, LINE, Slack, Twitter Direct Messages, Zoom, and many others are at risk. In the case of Instagram and LinkedIn, it is even possible to execute remote code on the companies' servers through the feature. According to the researchers, link previews can leak IP addresses, expose links sent in end-to-end encrypted chats, and have been caught "unnecessarily downloading gigabytes of data quietly in the background."

    Threatpost reports: "Researchers: LinkedIn, Instagram Vulnerable to Preview-Link RCE Security Woes"

  • news

    Visible to the public "New Control Architecture Defends Complex Interconnected Systems Against Cyber Attacks"

    Details about a novel control architecture that defends complex, interconnected systems from cyberattacks have been published in the IEEE/CAA Journal of Automatica Sinica. Researchers from Italy and Canada developed a method to mitigate damaging cyberattacks facing Cyber-Physical Systems (CPS) such as power plants, autonomous vehicles, and more. Their Leader-Follower approach uses a part of the network to manage communications with the rest of the network. The researchers were able to design an algorithm to detect Denial-of-Service (DoS) attacks on a network by assigning different roles to separate parts of a CPS. Once a DoS attack is detected, the algorithm cuts off the infected portion of the network to avoid large-scale degradation while adapting to the altered network structure. This article continues to discuss the novel control paradigm developed by researchers to defend CPS against damaging cyberattacks.

    Continuity Central reports "New Control Architecture Defends Complex Interconnected Systems Against Cyber Attacks"

  • news

    Visible to the public Cyber Scene #49 - Major League Strikes: Election Replays

    Cyber Scene #49 -

    Major League Strikes: Election Replays

  • news

    Visible to the public "IoT Device Takeovers Surge 100 Percent in 2020"

    Internet-of-things (IoT) devices have become a favorite target for cybercriminals this year. New research has shown that there has been a sharp increase (100 percent) in IoT infections observed on wireless networks. IoT devices are now responsible for 32.72 percent of all infections observed in mobile and Wi-Fi networks, up from 16.17 percent in 2019. Researchers with Nokia's Threat Intelligence Lab believe that the number of IoT infections will continue to grow "dramatically" as connected devices continue to populate in homes and enterprise settings alike.

    Theatpost reports: "IoT Device Takeovers Surge 100 Percent in 2020"

  • news

    Visible to the public SoS Musings #42 - Medical Device Vulnerabilities: Healthcare is at Risk

    SoS Musings #42 -

    Medical Device Vulnerabilities: Healthcare is at Risk

  • news

    Visible to the public Cybersecurity Snapshots #11 - Are Security Cameras Vulnerable to Cyberattacks?

    Cybersecurity Snapshots #11 -

    Are Security Cameras Vulnerable to Cyberattacks?

  • news

    Visible to the public Spotlight on Lablet Research #11 - Cloud-Assisted IoT Systems Privacy

    Spotlight on Lablet Research #11 -

    Cloud-Assisted IoT Systems Privacy

    Lablet: University of Kansas

  • news

    Visible to the public Science of Security and Privacy 2019 Annual Report

    The Science of Security and Privacy 2019 Annual Report is now available.

    This report highlights the progress and accomplishments of the Science of Security and Privacy initiative.

  • news

    Visible to the public SCRM: The Need for More Research

    SCRM: The Need for More Research

  • news

    Visible to the public Pub Crawl #43


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public Ransomware attacks Georgia Election Data

    Georgia Election Data is a victim of a recent ransomware attack. Hall County north of Atlanta reports that parts of its election data including the county's precinct and voter-signature database were down. This ransomware attack involved critical systems across the county including government networks and phone services. So far, the voting process itself was not impacted. This is a warning to local governments to harden them systems, make sure all

  • news

    Visible to the public Queens of Code Career Day Talk - Nov 12, 2020 11:00-12:00 PM EST

    Queens of Code Career Day: Nov 12, 2020 11:00-12:00 PM EST

  • news

    Visible to the public "KashmirBlack Botnet Infects Hundreds of Thousands of Websites"

    KashmirBlack is a botnet focused on cryptocurrency mining, spamming, and defacement targeting popular content management systems (CMSes) such as WordPress, Joomla, and Drupal. According to researchers from the online security company Imperva, the botnet has already infected hundreds of thousands of websites running these CMSes. KashmirBlack operates using a modular infrastructure. Its features include load balancing communications with Command-and-Control (C2) servers and storing files on Dropbox and Github. This article continues to discuss KashmirBlack's high-performance architecture and victims.

    Dark Reading reports "KashmirBlack Botnet Infects Hundreds of Thousands of Websites"

  • news

    Visible to the public "Russian Hackers Break Into 2 County Systems, Stoking Election Security Fears"

    Federal authorities are warning that Russian cyberattacks are targeting a wide array of American government networks. The attacks are being made by the notable Russian hacking group, sometimes known as Energetic Bear of FireFly. In two local government jurisdictions, systems had been accessed by the hacking group, granting the adversaries admission to some limited data about voters. The federal authorities are adamant that the attackers were not in a position actually to affect voting results.

    NPR reports: "Russian Hackers Break Into 2 County Systems, Stoking Election Security Fears"

  • news

    Visible to the public "Intel Creating Cryptographic Codes That Quantum Computers Can't Crack"

    The expectation that quantum computing will one day be powerful enough to break current encryption algorithms has prompted the race to develop new approaches to cryptography that can withstand quantum attacks. A team of Intel researchers has improved upon a quantum-resistant cryptographic algorithm that shows feasibility for smart home devices and industrial devices. The team's improved version of Bit-flipping Key Encapsulation (BIKE) uses a new decoder that requires less computing power. This article continues to discuss the improved version of BIKE, its potential use as a quantum-resistant algorithm, and the U.S. National Institute of Standards and Technology's Post-Quantum Cryptography Standardization Process.

    IEEE Spectrum reports "Intel Creating Cryptographic Codes That Quantum Computers Can't Crack"