Please turn on your JavaScript for this page to function normally.
search
Cyber investigations, threat hunting and research: More art than science

While it’s true that threat hunting, incident response, and threat research all have their foundations in science (operating system theory and architecture, computer language …

Bitcoin
Bitcoin Security Rectifier app aims to make Bitcoin more secure

A computer science engineer at Michigan State University has a word of advice for the millions of bitcoin owners who use smartphone apps to manage their cryptocurrency: …

biometrics
DefakeHop: A deepfake detection method that tackles adversarial threat detection and recognition

Army researchers developed a deepfake detection method that will allow for the creation of state-of-the-art soldier technology to support mission-essential tasks such as …

vault
Researchers develop program that helps assess encryption systems’ vulnerabilities

Anastasia Malashina, a doctoral student at HSE University, has proposed a new method to assess vulnerabilities in encryption systems, which is based on a brute-force search of …

shield
Research directions in cybersecurity to support a digital strategic autonomy

Resilience, technological sovereignty and leadership are essential for the EU and as such, they are addressed by the EU Cybersecurity Strategy. In an effort to support this …

quantum
Scientists develop quantum machine learning methods for reasoning

Scientists at Cambridge Quantum Computing (CQC) have developed methods and demonstrated that quantum machines can learn to infer hidden information from very general …

industrial
Vulnerabilities in ICS-specific backup solution open industrial facilities to attack

Claroty researchers have found and privately disclosed nine vulnerabilities affecting Rockwell Automation’s FactoryTalk AssetCentre, an ICS-specific backup solution. All of …

mind map
MindAPI makes API security research and testing easier

Security researcher David Sopas has published a new open-source project: MindAPI, a mind map with resources for making API security research easier. “I love mind maps. …

NIST cryptographic system
Encrypted method that measures encounters could slow down or prevent future pandemics

When you bump into someone in the workplace or at your local coffee shop, you might call that an “encounter.” That’s the scientific term for it, too. As part …

5G
5G network slicing vulnerability leaves enterprises exposed to cyberattacks

AdaptiveMobile Security today publicly disclosed details of a major security flaw in the architecture of 5G network slicing and virtualized network functions. The fundamental …

face
Can private data be recovered from “sanitized” images?

Machine learning systems are becoming pervasive not only in technologies affecting our day-to-day lives, but also in those observing them, including face expression …

lock
How to tackle modern agriculture security challenges

According to recent estimates, there will be roughly 10 billion people to feed in 2050. Agricultural production will need to increase by almost 56% to guarantee food security …

Don't miss

Cybersecurity news