top of page

Search


HACK THE BUILDING'S Control Systems Cyber Conference NOVEMBER 17, 2020
At the November 17 conference businesses will present their solutions for addressing critical infrastructure cyber challenges.

Daryl Haegley: (CS)²AI Fellow
2 min read


Cybersecurity Companies Expose Sensitive Data Online
Nearly all cybersecurity companies have exposed sensitive data including PII and passwords online, according to a new study from ImmuniWeb.

Daryl Haegley: (CS)²AI Fellow
1 min read


CISA Director Lists Nation-State Actors, Cybercriminals, Disinformation as Top COVID Attack Vectors
Assessing the current threat landscape six months into the COVID-19 pandemic,

Daryl Haegley: (CS)²AI Fellow
1 min read


Cyber-Risks Explode With Move to Telehealth Services
The hasty shift to online delivery of primary care services since the COVID-19 outbreak has attracted significant attacker interest.

Daryl Haegley: (CS)²AI Fellow
3 min read


White House Issues New Cybersecurity Policy for Space Systems
The National Space Council issued new cybersecurity principles to help defend America’s space systems Sept. 4.

Daryl Haegley: (CS)²AI Fellow
1 min read


Six Critical Vulnerabilities To Enable OT Supply Chain Attack
“Security researchers have discovered six critical vulnerabilities in third-party code which could expose countless operational tech . . .

Daryl Haegley: (CS)²AI Fellow
1 min read


Spyware Labeled ‘TikTok Pro” Exploits Fears of US Ban
Researchers have discovered a new Android spyware campaign pushing a “Pro” version of the TikTok app that is exploiting fears among. . .

Daryl Haegley: (CS)²AI Fellow
1 min read


City of Baltimore Ransomware Attack: Lessons Learned
“Nowadays, cybercriminals are becoming increasingly hooked on big game hunting. Public institutions ranging from educational facilities . .

Daryl Haegley: (CS)²AI Fellow
1 min read


How to Hack into Vulnerable ICS Project Files
Gaining the ability to execute remote code on an ICS network via phishing attacks

Trisha Harp
4 min read


DEF CON takes CTF into Space
Hack-a-Sat participants took over the ground station and gained control of actual satellites.

Trisha Harp
3 min read


DHS CISA Completes “Cyber Storm” Exercise
Three-day exercise Cyber Storm simulates attacks on critical infrastructure systems

Trisha Harp
2 min read


Cyberattacks on US companies skyrocketed by 93% in the last 12 months
Great majority of respondents attribute rise to employees working from home during COVID-19 crisis.

Trisha Harp
3 min read


U.S. Army Report Describes North Korea's Cyber Warfare Capabilities
300+page report detailing the 6,000 strong Cyber Warfare Guidance Unit, its activities, methods and capabilities.

Trisha Harp
2 min read


Tor Exit Nodes Hacked to Perform SSL-Stripping Attacks
At peak, attackers controlled 25% of all Tor exit relays; used to perform MitM attacks on users.

Trisha Harp
3 min read


NSA and CISA Alert Highlights Urgency for OT Security
Recent alert distinct in including broad warnings of an imminent and serious threat across all 16 critical infrastructure sectors . . .

Trisha Harp
4 min read


Department of Defense Cyber Crime Center (DC3) vul discl program
DC3’s mission is to deliver superior digital and multimedia (D/MM) forensic services, cyber technical training, vulnerability sharing ...

Trisha Harp
1 min read


FYSA - Visionaries must step forward to advance water infrastructure | Smart Cities Dive
Visionaries must step forward to advance water infrastructure

Trisha Harp
4 min read


ICSJWG 2020 Virtual Spring Meeting 910 June === registration NLT 5 June
ICSJWG 2020 VIRTUAL SPRING MEETING
June 9 - 10, 2020
We are very pleased to announce the 2020 Virtual Spring Meeting!

Trisha Harp
2 min read


CISA & DOE Guidance regarding control systems best practices
From POLITICO today:
KEEPING THE LIGHTS ON —CISA and the Energy Department joined with the U.K. National Cyber Security Centre on Friday.

Trisha Harp
2 min read


Army to release white paper request seeking vendors
Army to release white paper request seeking vendors through 4th iteration of "cyber innovation challenge" to rapidly integrate innovative...

Trisha Harp
2 min read
bottom of page