Neural Networks Help Users Pick More-Secure Passwords

Neural networks trained to learn approaches to brute-force password guessing can be used to enforce minimal password security without resorting to large blocklists and cumbersome combinations.

Researchers open the door to new distribution methods for secret cryptographic keys

The latest research opens the door to new methods of distributing secret cryptographic keys – used to encrypt and decrypt data, ensure secure communication, and protect private information.

Next-gen Airborne Collision Avoidance System just as vulnerable to spoofing as its predecessor

Researchers at the UK's University of Oxford and Switzerland's Federal Office for Defence Procurement found that the critical aviation system can be manipulated to produce fake collision alerts.

Researchers Fingerprint Exploit Developers Who Help Several Malware Authors

Cybersecurity researchers on Friday detailed a new methodology to identify exploit authors that use their unique characteristics as a fingerprint to track down other exploits developed by them.

Phishing awareness training wears off after a few months

Security and phishing awareness programs wear off in time, and employees need to be re-trained after around six months, as per a paper presented at the USENIX SOUPS security conference last month.

New Snort, ClamAV coverage strikes back against Cobalt Strike

Cobalt Strike is a “paid software platform for adversary simulations and red team operations.” It is often misused by malicious actors to gain access and control infected hosts on a victim network.

Multiparty Encryption Allows Companies to Solve Security-Data Conundrum

An interdisciplinary research team constructs a way for companies to share breach data without revealing specific details that could exposes businesses to legal risk.

Raccoon attack allows hackers to break TLS encryption 'under certain conditions'

A team of academics has disclosed a theoretical attack on the TLS cryptographic protocol that can be used to decrypt the HTTPS connection between users and servers and read sensitive communications.

MIT scientists unveil cybersecurity aggregation platform to gauge effective measures

The platform allows researchers to analyze cyberattacks without sensitive information being released.

Researchers develop AI technique to protect medical devices from anomalous instructions

A group of academic researchers has developed a new AI technique that will protect medical devices from malicious operating instructions in a cyberattack as well as other human and system errors.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags