A new backdoor is targeting Linux servers in East Asia and Latin America, including Amazon Web Services (AWS) hosted machines, Check Point security researchers say.
CS Digest Section: FEEDBACK FROM PREVIOUS DIGEST
Digital-asset exchange Quadriga CX has a $200 million problem with no obvious solution -- just the latest cautionary tale in the unregulated world of cryptocurrencies.
A lack of tough cyber operators to play the role of adversary is leaving U.S. cyber defenders unprepared for today's real-world threats, according to the Pentagon's Office of the Director of Operational Test & Evaluation.
There are breaches, and there are megabreaches, and there's Equifax. But a newly revealed trove of leaked data tops them all for sheer volume: 772,904,991 unique email addresses, over 21 million unique passwords, all recently posted to a hacking forum.
The Air Force is pushing forward with several key IT changes for the coming fiscal year.
Great-power competition in the twenty-first century increasingly involves the use of cyber operations between rival states. But do cyber operations achieve their stated objectives? What are the escalation risks? Under what conditions could increasingly frequent and sophisticated cyber operations result in inadvertent escalation and the use of military force?
Steganography is the practice of hiding messages or information in plain sight, especially inside other data or images. And a new toolset, which debuted earlier this month at the Black Hat Europe conference in London, suggests steganography is going to get much more difficult to spot
SpiNNaker's spiking neural network mimics the human brain, and could fuel breakthroughs in robotics and health.
The military supply chain is vast, multifaceted, and riddled with potential cyber vulnerabilities.
You and 800 million other people now can use hardware authentication keys -- and no password at all -- to log on to Microsoft accounts used for Outlook, Office 365, OneDrive, Skype and Xbox Live.