The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
This webinar discusses the National Renewable Energy Laboratory's ongoing work to ensure energy security and resilience in today's interconnected and interdependent world. Software applications and internet-enabled devices have been integrated into most industrial control systems, delivering many benefits, but also increasing vulnerability. NREL's Virtual Cyber Research Platform allows evaluation of interconnected components in an emulated grid environment to improve security and resilience of critical infrastructure.
Part 2 of this 6-part video series discusses the compilation process model, the preprocessor, and operations of the compile-link-load tool chain. The Execution model is described with a focus on function stack frames, memory, and use of streams.
This webinar will feature on overview of NASA's X-57 Maxwell, the agency's first all-electric experimental aircraft (X-plane), and NASA's first crewed X-plane in two decades. The presentation will include a discussion of the aircraft's electric-propulsion-focused design and airworthiness process, as well as the X-57 team's use of a "design driver" as a technical challenge, including a 500 percent increase in high-speed cruise efficiency, zero in-flight carbon emissions, and flight that is much quieter for the community on the ground.
Experts: Internet voting isn’t ready for COVID-19 crisis - Cyber Scoop
Internet technologies are set to play a critical role in the 2020 presidential election, but precisely which voting alternatives will be pursued - and whether they can adequately be secured - is now a $400 million question.
Tags: COVID-19, Internet Voting
Thousands Zoom credentials available on a Dark Web forum - Security Affairs
Google and Mozilla address serious flaws in Firefox and Chrome browsers - Security Affairs
Artificial Intelligence is Evolving All by Itself - Science Mag
Artificial intelligence (AI) is evolving-literally. Researchers have created software that borrows concepts from Darwinian evolution, including "survival of the fittest," to build AI programs that improve generation after generation without human input. The program replicated decades of AI research in a matter of days, and its designers think that one day, it could discover new approaches to AI.
Tags: Artificial Intelligence (AI)
Earlier this week video teleconferencing company Zoom fixed an issue that would have allowed users in Zoom "waiting rooms" to spy on meetings even if they weren't approved to attend them, according to researchers at Toronto-based Citizen Lab.
Tags: Vulnerabilities, Zoom
Russian telco Rostelecom hijacks traffic for IT giants, including Google, Amazon and Facebook - Security Affairs
Online scammers have begun impersonating President Donald Trump and the White House in phishing emails designed to lure recipients to websites for downloading malware on their systems.
Tags: Coronavirus Scam, COVID-19
xHelper, the Unkillable Android malware that re-Installs after factory reset - Security Affairs
Dark Nexus, a new IoT botnet that targets a broad range of devices - Security Affairs
Microsoft: No surge in malicious attacks, only more COVID-19 lures - Bleeping Computer
Microsoft says that the volume of malicious attacks hasn't increased but, instead, threat actors have repurposed infrastructure used in previous attacks and rethemed attack campaigns to exploit fears surrounding the COVID-19 pandemic.
Tags: COVID-19, Microsoft
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.