The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
New CSIAC Journal – Artificial Intelligence: ‘The Next – Nuclear Arms Race – Space Race – To the Edge’ - CSIAC
It may be difficult to figure out where and how Artificial Intelligence (AI) and its various sub-types (Machine Learning, Deep Learning, etc.) fit into our world as we move into the future. In some cases it seems straightforward; AI/ML speech recognition is astoundingly good and can be applied across many domains in a meaningful way. This edition of the CSIAC Journal highlights three very different views of complex situations where AI might, should, and does intersect with our ability to use AI effectively. Domain experts provide understanding of the thought that is involved in "getting into" AI.
Tags: Artificial Intelligence (AI), Deep Learning, Machine Learning (ML)
The Open Web Application Security Project (OWASP) Amass project was originally created when the project lead was showing organizations what they look like on the Internet. During this process, he noticed that the tools available were returning incomplete results relative to what could be discovered manually. With the identification of this gap in capabilities for security experts, the Amass project was born. The OWASP Amass project is focused on DNS enumeration and automated network infrastructure mapping techniques. This presentation will discuss a variety of the techniques utilized by Amass.
Tags: Amass, Open Web Application Security Project (OWASP)
If You Used This App, the Passwords of the Private Wifi Networks You Connected to Leaked Online - Gizmodo
Thousands of users of an app called WiFi Finder, the stated purpose of which is, obviously, to locate and provide credentials for public wifi hotspots, inadvertently submitted their own home wifi passwords to the app's database, which has now leaked online.
Tags: Android, Data Security, Mobile Security
Hackers Steal and Ransom Financial Data Related to Some of the World’s Largest Companies - Motherboard
The New Electronic Warfare Tool Cyber Units Will Need - Fifth Domain
Industry leaders are warning that the targets U.S. Cyber Command will pursue in the future may not be connected to the internet or even accessible through the traditional, IP-based operations that the command has historically exploited in the past.
Tags: Cyberwarfare, Electronic Warfare (EW)
Microsoft isn't doing away with its password-expiration policies across the board, but the blog post makes the company's stance clear: expiring passwords does little good.
Tags: Microsoft, Password Security, Policy
In a paper that will be presented at the renowned IEEE Symposium on Security and Privacy in San Francisco this May, a group from Prof. Ben Zhao and Prof. Heather Zheng's SAND Lab describe the first generalized defense against these backdoor attacks in neural networks.
Tags: Artificial Intelligence (AI), Cyber Defense, Machine Learning (ML)
Government Officials Targeted With Trojanized TeamViewer - Security Week
Recently observed attacks targeting officials within government finance authorities and representatives in several embassies in Europe abuse the legitimate TeamViewer application to gain full control of victim machines.
Tags: Government Officials, TeamViewer, Trojan
The NCSC's first 'UK cyber survey' published alongside global password risk list.
Tags: Password Security
Utah Bans Police From Searching Digital Data Without A Warrant, Closes Fourth Amendment Loophole - Forbes
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.