A joint alert issued by the Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI), and the United Kingdom's National Cyber Security Centre (NCSC) warns that Russian state-sponsored cyber actors are actively targeting home and enterprise routers.
CS Digest Section: Network Security
The Internet Engineering Task Force (IETF) - the organization that approves proposed Internet standards and protocols - has formally approved TLS 1.3 as the next major version of the Transport Layer Security (TLS) protocol.
Researchers have discovered malware so stealthy it remained hidden for six years despite infecting at least 100 computers worldwide.
DDoS attacks taking advantage of ill-advised use of memcached have begun to decline, either because sysadmins are securing the process, or because people are using a potentially-troublesome "kill switch."
MOSQUITO is new technique devised by a team of researchers at Israel's Ben Gurion University, led by the expert Mordechai Guri, to exfiltrate data from an air-gapped network.
Over last couple of days we've seen a big increase in an obscure amplification attack vector - using the memcached protocol, coming from UDP port 11211.
The first documented native IPv6 DDoS attack has been spotted in the wild over the weekend. The DNS dictionary attack originated from around 1,900 different native IPv6 hosts, on more than 650 different networks and targeted authoritative DNS service Neustar's network.
Cisco rolled out Encrypted Traffic Analytics (ETA), a breakthrough technology that identifies malware in encrypted traffic without the need of intercepting and decrypting data streams.
Republican Gov. Paul LePage, the Maine Office of Information Technology and the Maine Department of Education are backing a new program to get high school girls interested in cybersecurity.
The security community scrambled to unpack Krack, a fundamental vulnerability in the ubiquitous, secure Wi-Fi network standard known a WPA2. Though some of the most popular devices are mercifully already protected (like most of those that run Windows and iOS), a staggering population remains exposed to data theft and manipulation every time they connect to