News Items

  • news

    Visible to the public "Detecting and Mitigating Network Attacks With a Multi-Prong Approach"

    An international team of researchers developed an approach to detecting malicious attacks such as jamming attacks, replay attacks, and more, on the communication network and the physical system in a networked control system. These types of attacks often share the ability to cause abnormal traffic flow in the communications links, resulting in delays in packet losses. The approach developed by researchers is a hybrid learning approach in that it detects attacks as well as allows the targeted system to react and perform in the best way possible even when it is under attack. This article continues to discuss the researchers' proposed multi-prong approach to detecting and mitigating network attacks in addition to the scope of future work for this approach.

    ScienMag reports "Detecting and Mitigating Network Attacks With a Multi-Prong Approach"

  • news

    Visible to the public "Apps are Sharing More of Your Data With Ad Industry Than you may Think"

    In a new study, researchers analyzed data traffic from ten popular Android apps (which are also all available on iPhones). The ten apps researched include Grindr, OkCupid, Tinder, Clue, MyDays, Perfect365, My Talking Tom 2, Qibla Finder, Happn, and Wave Keyboard. The researchers chose these apps because the apps were likely to have access to highly personal information. The ten analyzed apps transmit user data to at least 135 different third parties involved in advertising and/or behavioral profiling. The researchers also discovered that all but one of the apps share data beyond the device advertising ID, including a user's IP address and GPS position, personal attributes such as gender and age, and app activities such as GUI events.

    Naked Security: "Apps are Sharing More of Your Data With Ad Industry Than you may Think"

  • news

    Visible to the public "'Cable Haunt' Vulnerability Exposes 200 Million Modem Cables to MITM Attacks"

    Researchers from Lyrebirds, along with an independent researcher, discovered a security vulnerability, named Cable Haunt, in Broadcom's cable modem. The flaw left an estimate of 200 million home broadband gateways susceptible to remote hijacking attacks. The exploitation of the flaw tracked as CVE-2019-19494 could allow malicious actors to trick victims into clicking a web page containing a malicious JavaScript code. Once the malicious code is executed on a modem, remote attackers can intercept private messages, redirect traffic, and more. This article continues to discuss the discovery of the Cable Haunt security vulnerability and the malicious activities that could be performed by attackers through the exploitation of the flaw.

    CISOMAG reports "'Cable Haunt' Vulnerability Exposes 200 Million Modem Cables to MITM Attacks"

  • news

    Visible to the public "Lawmakers Ask FCC to Protect Consumers from Phone Hijackers"

    Lawmakers are asking the Federal Communications Commission (FCC) to use the regulatory agency's authority over wireless carriers to enforce better protection for consumers from SIM swap scams. Fraudsters perform these scams by persuading wireless carriers to transfer control over a mobile account to them, allowing the hijacking of credentials. Using these attacks, scammers can hijack login credentials, bypass two-factor authentication (2FA), and commit crimes such as emptying a victim's bank account. Consumers are often unaware of the existing options they have to protect their wireless accounts until they fall victim to these forms of attacks. Additionally, available options are limited. Therefore, consumers have to depend on phone companies to protect them. A letter written by Sen. Ron Wyden, D-Ore., and signed by five House and Senate members calls on the FCC to hold mobile carriers responsible for securing their systems. This article continues to discuss the request to the FCC to protect consumers from phone hijackers and rise in SIM swap attacks.

    NextGov reports "Lawmakers Ask FCC to Protect Consumers from Phone Hijackers"

  • news

    Visible to the public "How to Implement a 'Threat Model' to Beef up Your Organization’s Security"

    Security professionals are encouraged to practice threat modeling to bolster the security of their organizations. Threat modeling refers to the classification of assets associated with a system, identifying the possible attacks against these assets, the potential actors behind attacks, and how the assets could be protected. Threat modeling should apply to the software development lifecycle as well as to firmware and hardware. This article continues to discuss the concept of threat modeling, how to build an effective threat model.

    TNW reports "How to Implement a 'Threat Model' to Beef up Your Organization's Security"

  • news

    Visible to the public "2020 Forecast: Attackers Will Target Non-Traditional Systems"

    Researchers believe that API security is going to be a significant threat surface in 2020. The increase of using container ecosystem and the popularity of mobile apps that connect to backend services have pushed the microservices architecture to the forefront. A variety of information, such as airline ticketing to online ordering, can be exposed through insecure APIs. Researchers also believe that IoT devices will be a primary target of adversaries in 2020. As the number of connected devices that individuals and companies use increases, the attack surface area must be monitored.

    Help Net Security reports: "2020 Forecast: Attackers Will Target Non-Traditional Systems"

  • news

    Visible to the public "Texas School District Loses $2.3M to Phishing Attack"

    A new phishing attack has affected The Manor Independent School District (MISD), located roughly 15 miles outside Austin, Texas. MISD made three payments amounting to 2.3 million dollars. The school did not realize the bank account information got altered before making the payments, which means the three payments did not go to where they attended but to an adversary. Authorities believe that this is a case of business email compromise (BEC). BEC is when an adversary manipulates a victim into wiring money or changing bank account details. BEC attacks grew 295 percent in 2019. The investigation is still ongoing.

    DARKReading reports: "Texas School District Loses $2.3M to Phishing Attack"

  • news

    Visible to the public "Exploit Fully Breaks SHA-1, Lowers the Attack Bar"

    Researchers from INRIA in France and the Nanyan Technological University in Singapore developed a proof-of-concept attack that is capable of breaking the Secure Hash Algorithm-1 (SHA-1) code-signing encryption. The exploit developed by Gaetan Leurent and Thomas Peyrin is said to be less complicated and expensive than previous PoC attacks on SHA-1, lowering the level of complexity for attackers. The attack leaves users of GnuPG, OpenSSL, and GIT in danger as they still support SHA-1 in some way. This article continues to discuss the continued use of SHA-1 despite efforts to phase the cryptographic function out and the latest PoC attack on SHA-1.

    Threatpost reports "Exploit Fully Breaks SHA-1, Lowers the Attack Bar"

  • news

    Visible to the public "A Case for Establishing a Common Weakness Enumeration for Hardware Security"

    Attacks on modern computers are growing more frequent, pervasive, and sophisticated because they are not only impacting the software layer but also the hardware layer. The industry is bolstering efforts to deliver microarchitectural improvements that address hardware-based security. However, the industry needs a better understanding of the common hardware security vulnerabilities taxonomy. There must be information on how vulnerabilities in products emerge, their possible exploitation, and related risks, in addition to how architects and developers can prevent and identify security flaws in the design and development of products. MITRE's Common Weakness Enumeration (CWE) system and Common Vulnerability and Exposures (CVE) system do not categorize hardware-centric weaknesses. The absence of reference materials for hardware vulnerabilities in the CWE makes it difficult for researchers to share information about such vulnerabilities and for hardware vendors to develop more secure solutions. Therefore, a standardized hardware CWE is needed. This article continues to discuss the importance of hardware-based security, the difference between the CWE and CVE systems, as well as how the industry would benefit from a standardized hardware CWE.

    Help Net Security reports "A Case for Establishing a Common Weakness Enumeration for Hardware Security"

  • news

    Visible to the public "A Billion Medical Images Are Exposed Online, As Doctors Ignore Warnings"

    Security researchers from the Germany-based security firm Greenbone Networks discovered the exposure of a billion medical images online. The exposure of these images is the result of hospitals, medical offices, and imaging centers using unprotected servers. The insecure servers expose patients' personal health information in addition to medical images, with almost half belonging to patients in the United States. Medical practitioners use the DICOM (Digital Imaging and Communications in Medicine) standard to store, retrieve, and transmit medical images to other medical practices. DICOM images can be viewed using any free-to-use apps and are usually stored in a PACS server, which is a picture archiving and communications system. However, medical offices often overlook security, connecting the PACS server to the internet without a password. This article continues to discuss the exposure of over 1 billion medical images, the research behind this discovery, and how medical organizations have responded.

    TechCrunch reports "A Billion Medical Images Are Exposed Online, As Doctors Ignore Warnings"

  • news

    Visible to the public "What Students Think About University Data Security"

    During a new study, researchers surveyed 1000 undergraduate students. The researchers discovered that 69 percent of students are concerned about how the education system protects their personal data. 65% of the respondents said that if a college had a poor security reputation about protecting personal data, they would have been less likely to apply to that school. Out of the 1000 students surveyed, 45 percent of them felt confident that their college would keep their personal data secure and private.

    Help Net Security reports: "What Students Think About University Data Security"

  • news

    Visible to the public "Connected Cars Moving Targets for Hackers"

    The growth in connected vehicles creates opportunities for cyberattacks that pose a significant threat to the safety of drivers. The cybersecurity firm, GuardKnox, highlighted the danger in a demonstration at the recent Consumer Electronics Show in Las Vegas. Researchers demonstrated the potential impact of cyberattacks on connected vehicles in a Formula 1 driving simulation, which showed the compromise of a steering wheel by a hacker to remove its control over a speeding car. The scenario could become a real incident soon as new cars increase in connection to computer chips, sensors, and mobile technology. These elements will increasingly be abused by hackers to disrupt the operations of a vehicle. This article continues to discuss the hacked driving simulation demonstrated by GaurdKnox and the expected rise in attacks on connected cars.

    TechXplore reports "Connected Cars Moving Targets for Hackers"

  • news

    Visible to the public "U.S. Monitoring Cyberspace for Signs of Iranian Aggression"

    U.S. government officials are on the lookout for indicators of cyberattacks executed by Iran following the recent drone strike that killed Quds Force commander Qassem Soleimani. The Department of Homeland Security's latest advisory expressed that specific, credible threats to the U.S. remain unseen. U.S. government officials noted that the capabilities of Iranian cyber actors match those of cyber actors in Russia, China, and North Korea regarding the launch of cyberattacks on industrial control systems or physical infrastructure. DHS is working to improve coordination and situational awareness if specific threats appear. This article continues to discuss Iran's cyber activity and what the U.S. government is doing to prepare for potential attacks by Iranian cyber actors.

    Homeland Security News Wire reports "U.S. Monitoring Cyberspace for Signs of Iranian Aggression"

  • news

    Visible to the public "Browser Zero Day: Update Your Firefox Right Now!"

    Researchers have found a flaw in Firefox 72 just two days after it was released. The issue researchers identified is called CVE-2019-17026. CVE-2019-17026 is a type confusion bug affecting Firefox's IonMonkey JavaScript Just-in-Time (JIT) compiler. The JIT compiler takes JavaScript source code and converts it to executable computer code for the JavaScript to run directly inside Firefox as if it were a built-in part of the app. The problem is fixed, and Firefox urges users to download the newest update to fix the issue.

    Naked Security reports: "Browser Zero Day: Update Your Firefox Right Now!"

  • news

    Visible to the public "These Hacking Groups Are Eyeing Power Grids, Says Security Company"

    In a report, titled The North American Electric Cyber Threat Perspective, released by the cybersecurity company, Dragos, security researchers discuss the rise in threats to electric utilities in North America stemming from political and military tensions. The energy infrastructure is at risk, as indicated by the observation of multiple intrusions into industrial control system (ICS) networks. According to the report, security researchers are tracking seven hacking groups, three of which have demonstrated the capability to invade and disrupt the operation of power grids. The three hacking groups are known as Xenotime, Dymalloy, and Electrum. Security experts suggest following security practices such as segmenting networks, installing security patches, and using strong passwords to improve the security of ICS networks. This article continues to discuss the increase in cyber threats against electricity grids, three hacking groups capable of disrupting power grids across the US, and how ICS networks can be protected against cyberattacks.

    ZDNet reports "These Hacking Groups Are Eyeing Power Grids, Says Security Company"

  • news

    Visible to the public "Attackers Invent New Evasion Techniques to Conceal Web Skimmer Activity"

    A security researcher at Malwarebytes recently reported the discovery of the first payment card skimmer to use steganography to evade detection. There has been an increase in the use of steganography to hide and deliver malicious data. Digital steganography refers to the covert communication of data via unsuspected formats such as image files, video clips, and audio files. Steganography differs from cryptography because the method hides the communication of data in addition to the data itself. The skimmer found by the researcher used an image of a free shipping ribbon commonly seen on shopping sites to conceal malicious JavaScript code. According to the same security researcher, some digital attackers are now using the WebSockets communications protocol instead of HTML to exchange data with skimmers, using a single TCP connection. This article continues to discuss the discovery of a payment card skimmer and its use of steganography, as well as the increased use of new techniques for web skimmers and how security professionals can defend against evasive attacks.

    Security Intelligence reports "Attackers Invent New Evasion Techniques to Conceal Web Skimmer Activity"

  • news

    Visible to the public "Facebook Moves to Detect and Remove Deepfake Videos"

    The social media giant, Facebook, recently announced its plan to ban deepfake videos. Deepfakes are fake videos, photos, and audio recordings that cannot easily be distinguished by humans from authentic ones. Generative adversarial networks are used to develop deepfakes. Monica Bickert, Facebook's vice-president for global policy management, expressed the threat posed by deep fakes to the social media industry and society as a whole. Bickert stated that any video that has been created through the use of AI or machine learning to make it appear authentic would be removed. However, this policy does not apply to content created for the purpose of parody or satire, and videos edited to remove or change the order of words. This article continues to discuss the new policy that will be enforced by Facebook to detect and remove deepfake videos.

    Infosecurity Magazine reports "Facebook Moves to Detect and Remove Deepfake Videos"

  • news

    Visible to the public "TikTok Riddled With Security Flaws"

    Security researchers at Check Point recently discovered several security vulnerabilities in the popular Chinese-owned platform used for short-form mobile videos, TikTok. According to researchers, one of the vulnerabilities found in the platform could be exploited by hackers to allow them to hijack parts of a user's TikTok account remotely. Hackers could perform activities such as upload or delete videos, as well as alter video settings to change videos from being hidden to being exposed to the public. The exploitation could also allow hackers to send an SMS invite message to a victim, making it possible to send links that redirect users to malicious websites. Another vulnerability could allow hackers to collect personal information belonging to users, such as their email addresses. This article continues to discuss the popularity of the video-sharing app, the vulnerabilities found in the app by researchers, and the response to these findings by TikTok.

    Threatpost reports "TikTok Riddled With Security Flaws"

  • news

    Visible to the public "New Standards Set to Reshape Future of Email Security"

    Email remains one of the most popular attack vectors used by hackers. Phishing and email-based malware still pose significant threats to the communications media. According to recent studies, more than 90% of all cyberattacks have involved email. Therefore, the email industry is developing standards to address the most notable weakness of email, which is the ability to send email as someone else. The weak sender identity model has increased the performance of spoofing. A research report from Valimail reveals that an estimate of 6.4 billion spoofed emails is distributed every day, calling for the implementation of stronger sender identity protections. There are four new standards aimed at strengthening sender identity and email security. These standards include Domain-based Message Authentication, Reporting & Conformance (DMARC) 2.0, Brand Indicators for Message Identification (BIMI), AMP, Schema.org, STARTTLS, and MTA Strict Transport Security (MTA-STS). This article continues to discuss the significant role of email in the execution of cyberattacks and new standards set to improve email security.

    Dark Reading reports "New Standards Set to Reshape Future of Email Security"

  • news

    Visible to the public "Smartphone Analysis & Stats: Personal Use Leaves Work Smartphones Hackable"

    Researchers conducted new research on what mobile phone brands and smartphone applications got targeted the most, through the year of 2019 in the United Kingdom. The data got collected trough analyzing monthly Google search data in 2019 on how many British users were searching for methods to hack different apps and phone brands. The researchers found that iPhone was the most targeted phone brand (10,040 searches), and Samsung came a distant second (700 searches). At the same time, Instagram was the most targeted application (12,410 searches), followed by Snapchat (7,380 searches) and Whatsapp (7,100 searches). The researchers also discovered that owners with iPhones are 167 times more at risk of people trying to hack them than other phone brands. Instagram app is also 16 times more at risk of getting hacked than a Netflix application.

    SC Media reports: "Smartphone Analysis & Sats: Personal Use Leaves Work Smartphones Hackable"

  • news

    Visible to the public "DHS Tells U.S. Organizations to Clamp Down on Cybersecurity in Wake of Soleimani Killing"

    The Department of Homeland Security (DHS) on Monday issued a statement meant for U.S. companies and government agencies about securing their computer networks following the killing last week of a top Iranian general. Iran has considerable capabilities when it comes to cyberattacks. Iran and its proxies have a history of conducting disruptive and destructive cyber operations against strategic targets, including finance, energy, and telecommunications organizations. This year they have had an increased interest in industrial control systems and operational technology.

    CyberScoop reports: "DHS Tells U.S. Organizations to Clamp Down on Cybersecurity in Wake of Soleimani Killing"

  • news

    Visible to the public "The Psychology of Ransomware"

    According to recent studies, ransomware attacks are growing in sophistication and cost. Organizations must go beyond the exploration of technicalities of ransomware to bolster their security posture against such attacks. Security experts encourage organizations to delve deeper into the psychological nature of ransomware attacks. Organizations should be examining the factors that lead users to opening emails, links, or attachments sent from unknown entities despite their awareness of attacks that can be performed via these mediums. There are psychological factors that hackers abuse in the execution of ransomware attacks, which include compassion, helplessness, humiliation, and responsibility. This article continues to discuss the rise in ransomware attacks and the psychological factors that have led to the success of these attacks.

    SC Magazine reports "The Psychology of Ransomware"

  • news

    Visible to the public "DHS, GSA Propose Centralized Vulnerability Disclosure Platform"

    The Department of Homeland Security (DHS) and the General Services Administration (GSA) recently issued a request for information, asking for feedback on how to set up a cloud-based centralized vulnerability disclosure platform for the federal government. The platform will facilitate the submission of vulnerabilities found in government agencies' internet-accessible systems by security researchers. The central platform will also track and validate incoming reports as well as allow web-based communication between reporters and agencies in efforts to remediate vulnerabilities. The system is essential as most federal agencies do not have formal mechanisms in place to receive reports from security researchers on potential security vulnerabilities contained by their systems. This article continues to discuss the proposed centralized vulnerability disclosure platform, the lack of defined strategies for managing vulnerability disclosure reports in most federal agencies, and concerns about the legal protection of security researchers.

    FCW reports "DHS, GSA Propose Centralized Vulnerability Disclosure Platform"

  • news

    Visible to the public "Is the Inability to Baseline Systems Crippling Cybersecurity Progress and Oversight?"

    Due to a lack of visibility into an organization's security posture, it is difficult for government leaders to make decisions as to how defenses are prioritized. Government leaders rely on audit results to prioritize defenses. However, a more proactive approach to measuring and prioritizing risk is needed to help defenders figure out which areas to focus on securing. Baselining is a method that establishes what is known about a network or system, allowing defenders to detect abnormalities possibly caused by an attempted attack quickly. Although most agencies recognize the importance of baselining as a security control, the attention commanded by other more basic controls such as vulnerability scanning, asset discovery, and more, hinders the practice of baselining. Also, security leaders often get distracted by emerging technologies. This article continues to discuss the concept of baselining, the importance of this practice, why most agencies fail to practice baselining, and how agencies can start to baseline effectively.

    GCN reports "Is the Inability to Baseline Systems Crippling Cybersecurity Progress and Oversight?"

  • news

    Visible to the public Cybersecurity Snapshots #1 - Phishing Attacks Are Becoming More of a Problem For Organizations

    Cybersecurity Snapshots #1 -

    Phishing Attacks Are Becoming More of a Problem for Organizations

  • news

    Visible to the public "Automotive Cybersecurity Incidents Doubled in 2019, up 605% Since 2016"

    The number of automotive cybersecurity incidents has increased dramatically. Since 2016, the number of annual incidents against automobiles has increased by 605%, with incidents more than doubling in the last year alone. The top three attack vectors over the past 10 years include keyless entry systems (30%), backend servers (27%), and mobile apps (13%). The top three impacts of automotive cybersecurity incidents over the past ten years were car thefts/break-ins (31%), control over car systems (27%), and data/privacy breaches (23%). Most of the automotive cybersecurity incidents that occurred in 2019 were caused by remote attacks (82%).

    Help Net Security reports: "Automotive Cybersecurity Incidents Doubled in 2019, up 605% Since 2016"

  • news

    Visible to the public SoS Musings #32 - Neurodiversity in Cybersecurity

    SoS Musings #32 -
    Neurodiversity in Cybersecurity

  • news

    Visible to the public "Planning for 2020? Here Are 3 Cybersecurity Trends to Look Out For"

    Cyber professionals should be prepared to address three major cybersecurity trends in 2020. These trends include the consideration of cyber risks by financial investors, the increase in blunt-force attacks, and the adoption of cyber insurance policies by more companies. Investors will pay closer attention to the security of companies before investing in them. More hackers will use less complicated strategies to perform attacks, such as infiltrating a network via a third-party instead of exploiting zero-day vulnerabilities. Cyber insurance plans will be a more significant part of their cyber plans as cyberattacks grow in frequency and impact. This article continues to discuss the critical security trends cyber professionals should be on the lookout for in order to alter their cybersecurity plans and operations accordingly.

    Help Net Security reports "Planning for 2020? Here Are 3 Cybersecurity Trends to Look Out For"

  • news

    Visible to the public Cyber Scene #39 - The Future is Looking Up

    Cyber Scene #39 -
    The Future is Looking Up

  • news

    Visible to the public "FBI Warns U.S. Companies About Maze Ransomware, Appeals for Victim Data"

    The FBI is warning U.S. companies about a new series of ransomware attacks using Maze ransomware. The adversaries conducting the ransomware attacks, sometimes pose as government agencies. The adversaries steal data of companies and then encrypt the data and demand a ransom. The new ransomware Maze uses multiple methods for intrusion. Sometimes adversaries create malicious look-a-like cryptocurrency sites, and other times the adversaries conduct malspam campaigns, impersonating government agencies and well-known security vendors.

    CyberScoop reports: "FBI Warns U.S. Companies About Maze Ransomware, Appeals for Victim Data"

  • news

    Visible to the public Spotlight on Lablet Research #1 - Analytics for Cyber-Physical Systems Cybersecurity (archived)

    Spotlight on Lablet Research #1 -

    Project: Analytics for Cyber-Physical Systems Cybersecurity

  • news

    Visible to the public "Google Chrome Impacted by New Magellan 2.0 Vulnerabilities"

    Researchers have discovered a new set of SQLite vulnerabilities that can allow attackers to run malicious code inside Google Chrome remotely. There were 5 vulnerabilities found in total and were named Magellan 2.0. All apps that use an SQLite database are vulnerable to Magellan 2.0; however, the danger of "remote exploitation" is smaller than the one in Chrome, where a feature called the WebSQL API exposes Chrome users to remote attacks. The vulnerabilities could allow a malicious website to run malicious code against its Chrome visitors. The researchers who discovered the vulnerabilities notified Google and the SQLite team of these issues. Google Chrome fixed the vulnerabilities with the new Google Chrome update, and the SQLite project fixed the vulnerabilities in a series of patches they completed.

    ZDNet reports: "Google Chrome Impacted by New Magellan 2.0 Vulnerabilities"

  • news

    Visible to the public "Interest in Cybersecurity Needs to Start at Top, New Research Argues"

    Despite the increase in cyberattacks against US towns, cities, and counties, local governments are still not prepared to address cyber threats. A new paper, titled Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity, developed by professors at the University of Maryland, Baltimore County discusses the results of a survey to which local governments responded, sharing their insight and experiences regarding the frequency of attacks against their networks, employee cybersecurity training, and institutional support. Although almost 50% of government organizations that participated in the survey face an attack on their network at least once a day, only a few manage cybersecurity risks effectively. The researchers suggest the need for more support from elected officials and other top managers in efforts to strengthen local government cybersecurity. This article continues to discuss key findings from the survey regarding the frequency of cyberattacks on local governments, the adoption of cybersecurity tools, security awareness training for employees, and the need for executive interest in cybersecurity.

    StateScoop reports "Interest in Cybersecurity Needs to Start at Top, New Research Argues"

  • news

    Visible to the public "Deepfakes Pose New Security Challenges"

    Security experts expect deepfakes to pose a greater threat to cybersecurity in 2020. This expectation derives from the increasing implementation of biometrics to identify and authenticate a person. Deepfakes are fake, realistic-looking images, text, and video generated using a technique called a generative adversarial network (GAN). Researchers at McAfee stress that true facial recognition will be difficult to accomplish due to the continued advancement of deepfakes. According to researchers, improvements made to the execution of deepfakes will allow cybercriminals to more effectively perform activities such as impersonating a person to steal money, igniting information warfare, and more. This article continues to discuss the concept of deepfakes, the threat posed by deepfake attacks, the vulnerability of facial recognition systems, and the current limitations of deepfake technology.

    Security Boulevard reports "Deepfakes Pose New Security Challenges"

  • news

    Visible to the public "How AI and Cybersecurity Will Intersect in 2020"

    Artificial intelligence and machine learning technologies (AI/ML) are expected to grow in sophistication and application in the cybersecurity field as well as in the realm of business. However, the growth of these advanced technologies will be accompanied by new risks and threats as adversaries also apply AI/ML in the performance of attacks or exploit the vulnerabilities in AI/ML technologies. CISOs and security professionals must continue exploring AI/ML technologies regarding the new risks and threat models that will emerge when these technologies are applied. It is also important to discover new areas of expertise and security solutions that will be needed with the increased implementation of AI/ML technologies. The security industry needs to be aware of the different attacks that can be executed against AI/ML models such as data poisoning as well as the malicious activities that can be powered by AI/ML such as the creation of deepfakes. This article continues to discuss the growth in AI/ML and the threats posed by these technologies that the security industry should look out for.

    Dark Reading reports "How AI and Cybersecurity Will Intersect in 2020"

  • news

    Visible to the public "267 Million Facebook Users Exposed in Accessible Database"

    Comparitech and security researcher, Bob Diachenko, discovered an unsecured Elasticsearch database online, which exposed sensitive information belonging to more than 267 million Facebook users, most of which reside in the US. The personal data exposed by the easily accessible database includes user IDs, phone numbers, and names. The internet service provider (ISP) managing the IP address of the server in which the database was stored, removed access to the data. However, researchers found that the data was already available to cybercriminals on a hacker forum as the database was exposed for two weeks prior to its removal. Evidence suggests that the data was collected as a part of an illegal scraping operation or through the abuse of the Facebook application programming interface (API). This article continues to discuss the discovery of an unprotected database that exposed information on over 267 million Facebook users, the type of information contained by the database, how cybercriminals may have stolen the data, and how this data can be used.

    Security Week reports "267 Million Facebook Users Exposed in Accessible Database"

  • news

    Visible to the public "Microsoft Seizes Network of 50 Domains From Hacker Group With Ties to North Korea"

    50 websites have been seized by Microsoft that were being used by North Korean hacker group Thallium to target government employees, universities, human rights organizations, and nuclear proliferation groups in the U.S., Japan, and South Korea. The hacking group was using the network of websites, domains, and connected computers to send out spear-phishing emails. When a target clicked on a link in the email, the hackers then, in some cases, compromised the user's online accounts, infect their computers, compromised the security of their networks, and stole sensitive information.

    GeekWire reports: "Microsoft Seizes Network of 50 Domains From Hacker Group With Ties to North Korea"

  • news

    Visible to the public "2019: The Year Ransomware Targeted State & Local Governments"

    In 2019, ransomware wreaked havoc on governments, hospitals, schools, and more, causing significant disruptions to operations and impacting finances. The most notable ansomware incidents of 2019 include those faced by Baltimore, Louisiana state government agencies, 22 Texas cities, and the DCH Health System in Alabama. Some governments and hospitals decided to pay ransomware attackers due to the criticality of their services. However, federal authorities have suggested that victims of such attacks do not give in to hackers' demands for ransom payments, as it would encourage the execution of more ransomware attacks. This article continues to discuss the ransomware attack trends observed in 2019 and what security industry experts expect to see in 2020 in regard to ransomware, as well as other 2019 cybersecurity highlights.

    GovTech reports "2019: The Year Ransomware Targeted State & Local Governments"

  • news

    Visible to the public "The State of Continuous Diagnostics and Mitigation"

    It is important that federal organizations successfully implement continuous diagnostics and mitigation (CDM) capabilities as hackers continue to execute increasingly sophisticated cyberattacks involving advanced technologies such as automation and artificial intelligence. Cyberattacks on federal agencies pose a significant threat to national security. The Department of Homeland Security's (DHS) Continuous Diagnostics and Mitigation (CDM) was established in 2013 to help federal agencies improve their security posture by providing cybersecurity tools. However, many agencies are still struggling to implement CDM capabilities because they lack visibility of their cyber terrain. In order for agencies to protect their data, they need to understand their assets, network terrain, threats targeting their environments, the location of their sensitive data, and more. This article continues to discuss the CDM program, the Homeland Security's .gov Cybersecurity Architecture Review program, the challenges faced by agencies in the implementation of CDM capabilities, and what agencies must understand to protect their data.

    NextGov reports "The State of Continuous Diagnostics and Mitigation"

  • news

    Visible to the public "Wyze: Data Leak Exposes 2.4 Million Customers"

    The company Wyze discovered that two databases between December 4th and December 27th were not appropriately secured. Information of 2.4 million customers with home security systems was exposed. User data relating to Wi-Fi service set identifiers, device information, body metrics, Alexa integration tokens, and email addresses were exposed. Passwords, government-issued identification, and financial information did not get exposed. Since discovering the databases, Wyze has secured those databases and is conducting an investigation.

    PCMag reports: "Wyze: Data Leak Exposes 2.4 Million Customers"

  • news

    Visible to the public "Maastricht University Ransomware Attack: All Systems Blacked-Out"

    Maastricht University in the Netherlands was recently hit by a major ransomware attack that took down almost all of its Windows systems and impacted the email services used by the University, inconveniencing both students and staff. The University responded to the incident by disabling all its systems, reporting it to the police and getting help from specialists on the staff and external specialists in the cybersecurity field. As of yet, the type of ransomware executed in this attack has not been disclosed. The Australian National University faced a similar incident in which students' sensitive information such as their names, addresses, personal email addresses, bank account details, tax file numbers, and more were exposed. This article continues to discuss the ransomware attack faced by Maastricht University, the response to this incident, and the major data breach experienced by the Australian National University.

    CISOMAG reports "Maastricht University Ransomware Attack: All Systems Blacked-Out"

  • news

    Visible to the public "Uninstall This Alleged Emirati Spy App From Your Phone Now"

    US intelligence officials urge those that downloaded the social messaging app, ToTok, to uninstall the app immediately as it is supposedly a surveillance tool used by the government of the United Arab Emirates to collect data. In response to this discovery, Google and Apple have removed the app from its stores. However, if the app is already on a user's phone, it will continue functioning and possibly performing espionage for the UAE government. ToTok was ranked as the most popular app in many regions with 7.5 million downloads on Google Play and 2.3 million downloads on Apple's App Store. Patrick Wardle, a security researcher at Jamf, conducted a technical analysis of Totok, revealing that the app continuously runs in the background. With permission, the app also accesses users' microphones, location data, photos, contacts, and more. This article continues to discuss the ToTok messaging app's alleged use as an espionage tool, in addition to its features and supposed links.

    Wired reports "Uninstall This Alleged Emirati Spy App From Your Phone Now"

  • news

    Visible to the public "Closing a Critical Gap in Cybersecurity"

    The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) was established as the nation's risk adviser to work with different entities within the realms of government and industry to strengthen the country's cybersecurity. One of the principal responsibilities of the agency is to protect U.S. critical infrastructure from cyberattacks by sharing cyber threat information with public and private entities. According to the CISA's first director, Christopher Krebs, the agency discovered the exposure of industrial control systems (ICS), including those used for water pumps, emergency management equipment, and a natural gas facility, to the public Internet. However, the identity of the owner or operator of these vulnerable systems is often unable to be determined by the CISA due to current laws that limit information-sharing by internet service providers (ISPs). The inability to identify the owner or operator of a vulnerable system makes it difficult to address vulnerabilities as those behind the operation of these systems would need to be contacted and advised on how to mitigate the vulnerabilities. This article continues to discuss the CISA's role and responsibilities, as well as the challenges the agency faces in protecting the nation's critical infrastructure.

    Homeland Security News Wire reports "Closing a Critical Gap in Cybersecurity"

  • news

    Visible to the public "Thai Officials Say Prison Cameras Were Hacked, Broadcast"

    An incident in which prison cameras were hacked is being investigated by authorities in Thailand. According to the Thai officials, a hacker was able to compromise the security camera system at Lang Suan Prison in the southern province of Chumphon and broadcast live surveillance video from the cameras, showing the prisoners performing different activities. The incident brings further attention to the importance of addressing the security vulnerabilities contained by Internet of Things (IoT) devices. This article continues to discuss the incident and how Thai officials have responded.

    The New York Times report "Thai Officials Say Prison Cameras Were Hacked, Broadcast"

  • news

    Visible to the public "Mobile Devices Blur Work and Personal Privacy Raising Cyber Risks"

    The Bring Your Own Device (BYOD) culture is increasingly being adopted by enterprises to allow employees to use their laptops, smartphones, tablets, and other personal devices for work. Although this culture boosts productivity, it introduces privacy and security challenges. Dr. Kenan Degirmenci from the Queensland University of Technology's Science and Engineering Faculty's School of Information Systems conducted research in which he further highlights how far behind organizations are in addressing the cybersecurity threats posed by the BYOD culture. Organizations are recommended to implement policies to protect employees' data and usage, as well as increase efforts to bolster BYOD security management. This article continues to discuss Dr. Degirmenci's research on BYOD cultures in different countries and the cyber risks associated with this growing trend.

    Science Daily reports "Mobile Devices Blur Work and Personal Privacy Raising Cyber Risks"

  • news

    Visible to the public "Only 54% of Security Pros Have a Written Policy on Length and Randomness for Keys for Machine Identities"

    In a new survey of 1500 IT security professionals, researchers discovered that about half (54%) of organizations have a written policy on length and randomness for keys for machine identities, but 85% have a policy that governs password length for human identities. The researchers also found out that less than half (49%) of organizations audit the length and randomness of their keys, while 70% do so for passwords. Only 55% of organizations have a written policy stating how often certificates and private keys should be changed, while 79% have the equivalent policy for passwords. Out of the 1500 participants, only 42% of organizations they worked for automatically enforce the rotation of TLS certificates, compared with 79% that automatically enforce the rotation of passwords.

    Help Net Security reports: "Only 54% of Security Pros Have a Written Policy on Length and Randomness for Keys for Machine Identities"

  • news

    Visible to the public "Looking Ahead to 2020 Cybersecurity Trends and a New Decade"

    New cybersecurity threats, risks, and incidents will emerge in the coming year. Security professionals are encouraged to further examine the cybersecurity trends observed this year to prepare for what's to come in 2020. According to security experts, deepfakes are considered one of the top cybersecurity threats to look out for in 2020. Deepfakes are fake photos, videos, and audio recordings generated through the use of artificial intelligence (AI). Researchers pointed out deepfakes pose a significant threat as they can be used in disinformation campaigns, social media manipulation, and business fraud. In a report released by Forrester Research, titled Predictions 2020: Cybersecurity, it is predicted that deep fakes will cost businesses over a quarter of a billion dollars. Ransomware is also expected to increase in the new year, continuing to be targeted at enterprises, hospitals, utilities, and governments. This article continues to discuss the predicted rise in deepfakes, ransomware, and phishing attacks in 2020, as well as consumers' cybersecurity expectations and how enterprises can prepare for 2020 cybersecurity trends.

    Security Intelligence reports "Looking Ahead to 2020 Cybersecurity Trends and a New Decade"

  • news

    Visible to the public Pub Crawl #33


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public  "Ransomware Situation Goes From Bad to Worse"

    Ransomware was a big issue for organizations in 2019. Researchers are predicting that the number of ransomware attacks increases in 2020. The reason why ransomware attackers were frequently successful in 2019 is that criminal groups started to collaborate. Once criminal groups with different specialties started to collaborate, it made the distribution of ransomware much easier.

    DARKReading reports: "Ransomware Situation Goes From Bad to Worse"

  • news

    Visible to the public "Peters, Scott Introduce Bipartisan Legislation to Protect K-12 School Systems from Cyber-Attacks"

    U.S. Senators, Gary Peters (D-MI) and Rick Scott (R-FL), introduced bipartisan legislation aimed at helping K-12 educational institutions strengthen their cybersecurity systems. The two Senators stressed the importance of the K-12 Cybersecurity Act of 2019 as schools across the nation are struggling to protect the large amounts of personal data belonging to students and faculty due to lack of resources and awareness for preventing cyberattacks on school systems. The K-12 Cybersecurity Act of 2019 directs the Department of Homeland Security (DHS) to take part in the assessment of risks and challenges faced by schools when securing their systems. The proposed legislation also directs DHS's Cybersecurity and Infrastructure Security Agency (CISA) to develop cybersecurity recommendations and other resources that can be used by schools to improve their cybersecurity systems. The enforcement of the bill would help bolster schools' cybersecurity defenses against cyberattacks such as ransomware attacks, which have been increasingly targeted at educational institutions. This article continues to discuss the goal, requirements, and support of the bill, as well as the importance of government collaboration to address the rise in cyberattacks on schools.

    The U.S. Senate Committee on Homeland Security & Governmental Affairs report "Peters, Scott Introduce Bipartisan Legislation to Protect K-12 School Systems from Cyber-Attacks"