News
-
Solicitation: NSF Secure and Trustworthy CyberSpace (SaTC) [Solicitation 22-517]<h2><strong>Secure and Trustworthy Cyberspace (SaTC)</strong></h2> <p><strong>PROGRAM SOLICITATION<br> NSF 22-517</strong></p> <p><strong>REPLACES DOCUMENT(S):<br> NSF 21-…
-
GoDaddy managed WordPress customers part of big hackOver 1.2 million GoDaddy customers were impacted by a recent hack. GoDaddy is the world’s largest domain registrar and it’s managed WordPress hosting include a number of associated companies like 123Reg, Domain Factory, Host Europe, and others. An…
-
New Adobe open source project is using machine learning to detect software attacks.The project called LotL, (Living off the Land), extracts features of specific commands and then classifies them as either good or bad commands and sets up a set of tags for follow-on detection by a decision tree. Lotl uses supervised learning and an…
-
U.S. Offers $10 Million Reward for Information on DarkSide Ransomware GroupIn an effort to put pressure on the DarkSide Ransomeware Group, the government announced on Thursday a $10 million reward for information about the key leadership individuals in the DarkSide ransomware group—or any of it’s rebranded groups. The State…
-
Microsoft to provide cybersecurity training and scholarships to community collegesMicrosoft is working with community colleges to provide free training and resources to help ease the cybersecurity professional shortage. This includes training for faculty at 150 community colleges and scholarships to 25,000 students. By targeting…
-
CISA awards 2M in new cybersecurity training programs to underserved communitiesCISA, the US Cybersecurity and Infrastructure Security Agency has awarded NPower and CyberWarrior contracts worth $2m to bring cybersecurity training to underserved communities such as the unemployed and underemployed. One of the goals of these programs…
-
CISA warning for water and wastewater facilitiesCISA warning for water and wastewater facilities On October 14, 2021, the U.S. Cybersecurity Infrastructure and Security Agency (CISA) issues a warning for possible ransomware attacks trying to compromise water and wastewater facilities. When…
-
ACM HSCC 2022 -- Last Call for Papers (deadline 29 October)<p>ACM HSCC 2022 Call for Papers</p> <p>25th ACM International Conference on Hybrid Systems: </p> <p>Computation and Control (HSCC 2022)</p> <p> </p> <p>Part of CPS-IoT…
-
Facebook outage caused by own engineersThis week’s massive Facebook outage that was felt across all it’s platforms including Instagram and WhatsApp and lasted over six hours was likely caused by a faulty configuration change on the backbone routers that coordinate network traffic between data…
-
Google identifies Threat Actors using new tricks with Code SigningGoogle’s Threat Analysis Group found that threat actors have recently used a new trick of code signing to avoid detection on Windows systems and have notified Microsoft of their findings. OpenSUpdater operations had used legitimate code-signing…
-
Microsoft offers passwordless sign-onsIn an effort to strengthen security for Microsoft users, the company is now rolling out a way to access Microsoft accounts such as Microsoft 365, Teams, Outlook, OneDrive, and Family Safety without passwords. The feature is available after linking users…
-
Easy-to-use GENESIS marketplace for cyber criminals on the riseCyber criminals are flocking to the GENESIS marketplace, a one-stop shop for login credentials, cookies, device fingerprints, website vulnerabilities and other sensitive data on Hackers’ wish list. The invite-only market has become an important tool for…
-
Online scam targets gift cards and loyalty cardsOnline scam targets gift cards and loyalty cards Over 100,000 inboxes are the target of an under the radar approach to extracting small amounts of funds from giftcards, credits, and other valuables that show up in people’s inboxes. This cybercrime…
-
Major companies meet with President Biden and promise billions in spending on cybersecurityAt a productive White House meeting on August 25th, Microsoft, Google, Amazon, Apple, IBM and others committed to significant efforts in the cybersecurity area. Google plans to invest more than 10 billion to strengthen cybersecurity and train 100,000…
-
Tuya's IOT products may be a high security riskCyber experts warn that Chinese tech giant Tuya’s IOT products may be a high security risk. Tuya makes products that have been incorporated into many of today's, smart devices including smart TVs, smart home security camera, home thermostats and…
-
White Hacker rewarded with $500K bug bounty for returning millions in hacked cryptocurrencyWhite Hacker returns millions in cryptocurrency hacked from Poly Network last week. The company has decided to offer the hacker a $500K bug bounty. The white hat hacker had stated that he/she had initiated the hack for fun—and was motivated to…