Category: Security & Privacy

  • University of Pennsylvania Cyberattack Highlights Need for Robust Cybersecurity Measures

    This article was generated by AI and cites original sources.

    The University of Pennsylvania recently confirmed a data breach where a hacker stole university data, emphasizing the critical role of cybersecurity measures like multi-factor authentication (MFA) in protecting sensitive information.

    Last week, the university reported that hackers had targeted Penn, sending emails from official university addresses boasting of the breach and threatening data leaks. Initially deemed ‘fraudulent,’ the university later verified that data had indeed been compromised.

    According to Penn, the breach stemmed from a social engineering attack, a method that tricks individuals into revealing sensitive data. While Penn mandates MFA for students, staff, and alumni, exemptions granted to some officials potentially facilitated the breach.

    This incident underscores the ongoing cybersecurity challenges faced by educational institutions and organizations globally. Implementing robust security protocols, including MFA, is crucial to mitigating the risks of data breaches and unauthorized access.

    Source: TechCrunch

  • Armis Secures $435M Pre-IPO Funding, Eyeing 2026/2027 IPO Amid Cybersecurity Startup Trends

    This article was generated by AI and cites original sources.

    Armis, a nine-year-old cybersecurity company based in San Francisco, has raised a significant $435 million pre-IPO round led by Growth Equity at Goldman Sachs Alternatives, with CapitalG and Evolution Equity Partners also participating. This funding round has valued Armis at $6.1 billion, a substantial increase from its previous valuation. The company is now planning an IPO in late 2026 or early 2027, as confirmed by its co-founder and CEO, Yevegny Dibrov.

    This move towards an IPO comes amidst a prevailing trend of cybersecurity startups opting for acquisitions over public listings. While notable cybersecurity companies like SentinelOne, Rubrik, and Netscope have recently gone public, Armis is determined to follow suit, declining acquisition offers, including a reported $5 billion bid from Thoma Bravo.

    Armis’ decision to secure this funding and pursue an IPO underscores its commitment to independence and growth in the cybersecurity market. The company’s CEO has expressed a personal aspiration to take Armis public, highlighting the significance of this strategic move for the organization.

    Source: TechCrunch

  • US Introduces Mobile Identify App for Local Law Enforcement to Assist Immigration Enforcement

    This article was generated by AI and cites original sources.

    The U.S. Customs and Border Protection (CBP) has introduced a new face-scanning app, Mobile Identify, on the Google Play store to assist local law enforcement agencies in immigration-enforcement operations. The app, designed for tasks authorized by Section 287(g) of the Immigration and Nationality Act, enables designated officers to streamline immigration enforcement functions securely and efficiently in the field.

    According to a report by Ars Technica, the app does not return names after a face search but instructs users to contact ICE and provides a reference number or guidance on detainment based on the search result. The app’s code includes references to ‘facescanner,’ ‘FacePresence,’ and ‘No facial image found,’ indicating its focus on facial recognition technology.

    The app, currently available only on Google Play, requires camera access to capture subject photos, enhancing law enforcement capabilities related to immigration checks. This move showcases the integration of technology into law enforcement processes to improve operational efficiency and accuracy.

    Source: Ars Technica

  • FBI Warns of Impersonators Posing as Immigration Officers, Highlighting Need for Verification

    This article was generated by AI and cites original sources.

    The Federal Bureau of Investigation (FBI) has issued a bulletin warning about criminals impersonating U.S. immigration officers, leading to incidents of robbery, kidnapping, and assault across multiple states. As reported by WIRED, these impersonators have exploited the heightened profile of Immigration and Customs Enforcement (ICE) to target vulnerable communities, creating challenges in distinguishing between legitimate officers and imposters.

    The bulletin emphasizes the need for law enforcement agencies to ensure proper identification during operations and cooperate with individuals seeking verification. This development underscores the critical role of verification technologies in enhancing public safety and preventing criminal activities.

    One alarming incident cited in the bulletin involved individuals falsely claiming to be ICE agents and committing violent acts in a New York restaurant. Such deceptive practices not only endanger public safety but also erode trust in law enforcement.

    Given the rising concerns over impersonations, the FBI’s call for nationwide coordination to authenticate legitimate law enforcement operations attributed to ICE highlights the necessity for advanced verification measures and technology-driven solutions.

    Source: WIRED

  • Concerns Raised as Phone Location Data of Top EU Officials Reportedly Sold

    This article was generated by AI and cites original sources.

    Recent findings have revealed the concerning ease with which top European Union officials’ mobile phone location data can be accessed and exploited using commercially obtained information, despite the stringent data protection laws in place across the continent. According to a report by Netzpolitik, journalists in Europe discovered that data brokers are selling location histories, raising concerns among EU officials regarding the unauthorized tracking of citizens and officials.

    A coalition of journalists obtained a dataset, including 278 million location data points sourced from phones around Belgium, shedding light on the extensive reach of data brokers. The dataset also exposed the detailed location histories of prominent European officials, including those affiliated with the European Commission based in Brussels.

    Despite Europe’s robust GDPR laws, enforcement actions against data brokers have been reported as sluggish, contributing to the flourishing billion-dollar industry involved in the sale and exchange of individuals’ private data. To combat such pervasive tracking, Apple users can anonymize device identifiers, while Android owners are advised to regularly reset their device identifiers.

    Source: TechCrunch

  • Lawmakers Raise Cybersecurity Concerns over Flock Safety’s License Plate Scanning Cameras

    This article was generated by AI and cites original sources.

    Lawmakers have raised concerns over the cybersecurity practices of Flock Safety, a company known for its license plate scanning cameras. According to a report by TechCrunch, Senators Ron Wyden and Rep. Raja Krishnamoorthi have called on the Federal Trade Commission to investigate Flock Safety for allegedly failing to enforce multi-factor authentication (MFA) among its law enforcement customers.

    Flock Safety, which operates a vast network of cameras used by over 5,000 police departments and private businesses in the U.S., has faced criticism for not mandating MFA, leaving accounts vulnerable to potential compromise. The absence of MFA could allow hackers or spies to access restricted areas of Flock’s platform, compromising the privacy and security of data collected by the cameras.

    The legislators highlighted instances where stolen law enforcement logins were reportedly being sold online, raising significant concerns about the potential misuse of Flock’s surveillance data. Independent security researcher Benn Jordan also provided evidence of compromised logins being traded on a Russian cybercrime forum.

    With the increasing reliance on surveillance technologies like license plate scanning cameras, the need for robust cybersecurity measures becomes paramount to safeguard sensitive data and maintain public trust. The lawmakers emphasize the urgency for Flock Safety to enhance its security protocols to prevent unauthorized access and protect the integrity of its surveillance network.

    Source: TechCrunch

  • Former Defense Contractor Manager Confesses to Selling Cyber Exploits to Russian Broker

    This article was generated by AI and cites original sources.

    Peter Williams, the former general manager of Trenchant, a division of defense contractor L3Harris, recently confessed to stealing and selling valuable cyber exploits to a Russian broker. The exploits, known as ‘zero-days,’ are undisclosed software vulnerabilities that hackers can exploit to breach systems. Williams, also known as ‘Doogie,’ smuggled eight exploits from Trenchant’s secure network, worth a reported $35 million, and sold them for $1.3 million in cryptocurrency. His role granted him extensive access to the company’s internal network, allowing him to extract the sensitive hacking tools using a portable drive. Williams then transferred the stolen exploits to a personal device before sending them to the Russian broker through encrypted channels.

    This incident raises concerns about insider threats and the security of highly sensitive technology within defense contractors. It underscores the importance of robust access controls and monitoring mechanisms to prevent unauthorized data exfiltration. The case also highlights the lucrative black market for cyber exploits and the potential national security risks associated with their unauthorized sale to foreign entities.

    Source: TechCrunch

  • Cybersecurity Professionals Accused of Orchestrating Ransomware Attacks

    This article was generated by AI and cites original sources.

    U.S. prosecutors have filed charges against two individuals who worked as ransomware negotiators at a cybersecurity firm, accusing them of launching ransomware attacks against U.S. companies. The Department of Justice indicted Kevin Tyler Martin and another employee from DigitalMint for computer hacking and extortion related to attempted ransomware attacks on at least five U.S.-based companies. Additionally, Ryan Clifford Goldberg, a former incident response manager at Sygnia, was implicated in the scheme.

    The accused individuals are alleged to have hacked into companies, stolen sensitive data, and deployed ransomware developed by the ALPHV/BlackCat group. This group operates a ransomware-as-a-service model, where they provide the malware, and affiliates like the indicted employees carry out the attacks. The FBI affidavit revealed that the rogue employees received over $1.2 million in ransom payments from one victim, a medical device manufacturer in Florida, and targeted other companies as well.

    Sygnia confirmed Goldberg’s employment and subsequent termination in connection with the ransomware incidents. DigitalMint’s president acknowledged Martin’s employment during the alleged hacks but clarified that Martin was acting independently.

    Source: TechCrunch

  • University of Pennsylvania Hacker Aims to Sell Stolen Data for Profit

    This article was generated by AI and cites original sources.

    A self-proclaimed University of Pennsylvania hacker has revealed plans to sell approximately 1.2 million lines of stolen data before making it public, with a focus on obtaining the wealthy donor database. The hacker group also intends to disclose other documents in the future. The hackers have clarified that their primary goal was the donor database and not anti-diversity policies, as previously speculated. An alleged ‘fun rant’ email was dismissed as non-representative of their motives.

    The leaked data includes internal university documents, such as talking points on former university president Liz Magill’s congressional testimony. Ron Ozio, Penn’s head of media relations, has yet to comment on the breach. The university has reported the incident to the FBI and is conducting an investigation. The compromised data, including personal details like emails, phone numbers, and addresses, has been partially verified by individuals contacted by The Verge. Leakforum has already shared some of the leaked documents, including controversial statements made by Magill.

    Source: The Verge

  • Breach Exposes Kansas City Police Department’s Misconduct Records

    This article was generated by AI and cites original sources.

    A recent breach at the Kansas City, Kansas, Police Department has exposed a list of alleged officer misconduct, shedding light on incidents of dishonesty, sexual harassment, excessive force, and false arrest within the department. The breach, which occurred during a joint investigation between KCUR and WIRED, unveiled a troubling history of misconduct that had previously gone undisclosed.

    One notable operation, dubbed ‘Operation Sticky Fingers,’ was launched in 2011 to address complaints about the department’s SWAT team. This operation used undercover tactics, including hidden cameras in a rented house, to capture officers engaging in theft and other misconduct. The evidence gathered led to the dismissal and federal charges against three officers involved in theft and deprivation of civil rights.

    Despite the exposure of misconduct through the breach, challenges arose in prosecuting implicated officers. For instance, an officer with a history of misconduct, Jeff Gardner, avoided charges due to lack of concrete evidence beyond testimonies of discredited officers. This raised concerns about the reliability and integrity of police work involving Gardner.

    The breach serves as a stark reminder of the importance of transparency and accountability within law enforcement agencies. It highlights the role of technology, such as hidden cameras, in uncovering misconduct and ensuring justice. This incident underscores the need for robust oversight mechanisms and ethical conduct standards to prevent and address misconduct effectively.

    Source: WIRED

  • The Role of Technology in the Trump Administration’s Approach to Surveillance and Prosecution

    This article was generated by AI and cites original sources.

    Recent events surrounding the conviction of Casey Goonan highlight the intersection of technology, surveillance, and law enforcement strategies in the Trump administration’s approach towards individuals and groups deemed as potential threats.

    Goonan’s case, which involved criminal activities and affiliations with groups like Hamas, showcased how federal prosecutors utilized digital communications and evidence from technology to build their case. Goonan’s use of incendiary devices and statements made online were central to the prosecution’s argument that he intended to promote terrorism.

    The sentencing of Goonan to a lengthy prison term and probation, along with the request for placement in a Communications Management Unit, underscores the government’s use of advanced monitoring technologies and tactics in dealing with individuals perceived as ‘extremist’ or having terrorism-related affiliations.

    This case also points towards the broader implications of the Trump administration’s National Security Presidential Memorandum 7 (NSPM-7), which targets specific beliefs and activities as potential indicators of terrorism. The emphasis on surveillance, online communications, and the monitoring of dissenting voices through technological means raises concerns about the implications for civil liberties and privacy rights in an increasingly digital world.

    Source: WIRED

  • FCC to Rescind Telecom Security Mandate: Implications for Network Protection

    This article was generated by AI and cites original sources.

    The Federal Communications Commission (FCC) is set to repeal a ruling that required telecom providers to secure their networks, a decision influenced by lobbying efforts from major internet service providers (ISPs). FCC Chairman Brendan Carr cited the ruling’s perceived overreach and lack of agility in responding to evolving cybersecurity threats as reasons for the repeal, emphasizing reliance on ISPs’ voluntary commitments.

    The original ruling, introduced in January, aimed to address cybersecurity concerns following attacks by China on telecom giants like Verizon and AT&T. The ruling interpreted the Communications Assistance for Law Enforcement Act (CALEA) to mandate network security measures to prevent unlawful access and interception of communications.

    While the FCC’s action aligns with ISPs’ preferences, it raises questions about the cybersecurity landscape. Critics argue that voluntary commitments may not be sufficient to safeguard networks against evolving threats, highlighting potential gaps in regulatory oversight.

    Industry experts speculate on the long-term implications of this regulatory shift, contemplating the balance between industry self-regulation and government oversight in ensuring network security. The move underscores the ongoing debate on the role of regulators in shaping cybersecurity practices within the telecom sector.

    Source: Ars Technica

  • Suspected Government Hackers Infiltrate Telecom Giant Ribbon’s Network for Nearly a Year

    This article was generated by AI and cites original sources.

    U.S. telecommunications company Ribbon has disclosed that suspected government hackers had unauthorized access to its network for nearly a year before being discovered. The telecom provider revealed in a public filing submitted to the U.S. Securities and Exchange Commission that a ‘nation-state actor’ infiltrated its IT systems as early as December 2024. Ribbon, headquartered in Texas, offers phone, networking, and internet services to various sectors, including Fortune 500 companies and government entities like the Department of Defense.

    While the breach impacted three of Ribbon’s customers, the company did not disclose the affected organizations due to confidentiality concerns. It remains unclear whether the hackers extracted personal data or sensitive information from these companies. However, Ribbon acknowledged that the threat actor accessed several customer files stored on external devices. The telecom firm promptly notified the affected customers about the security incident.

    This breach underscores the persistent cybersecurity challenges faced by telecommunication providers, with Ribbon becoming the latest victim in a string of similar incidents over the past couple of years. Despite the breach, Ribbon has not attributed the cyber attack to any specific government entity. Chinese state-sponsored hackers, in particular, have previously targeted numerous U.S.-based companies, including telecom firms, to pilfer phone records and calling data related to high-ranking U.S. officials.

    Source: TechCrunch

  • University of Pennsylvania Cyberattack Highlights Need for Robust Cybersecurity in Higher Education

    This article was generated by AI and cites original sources.

    A recent cybersecurity incident at the University of Pennsylvania has underscored the critical importance of robust security practices in educational institutions. Hackers breached the university’s systems, sending mass emails with alarming messages aimed at disrupting operations and potentially leaking sensitive data. The breach, which targeted alumni, students, and staff, highlights the vulnerability of academic organizations to cyber threats.

    The hackers, claiming to represent the university’s Graduate School of Education (GSE), criticized the institution’s security protocols and threatened to expose confidential information, including violating federal regulations like FERPA. This deliberate attack not only jeopardizes data privacy but also raises concerns about the integrity of the university’s digital infrastructure.

    In response to the incident, Penn’s spokesperson emphasized that the fraudulent emails did not reflect the values or activities of the university. The school’s incident response team is actively working to address the breach and prevent further unauthorized access to sensitive information.

    Furthermore, the breach’s potential connection to alumni donations highlights a concerning trend where cybercriminals exploit vulnerabilities for financial gain or to advance specific agendas. This event serves as a stark reminder of the evolving cybersecurity landscape and the urgent need for proactive measures to safeguard educational institutions from malicious cyber activities.

    Source: TechCrunch

  • CrowdStrike and NVIDIA Collaborate to Enhance Cybersecurity with AI Agents

    This article was generated by AI and cites original sources.

    CrowdStrike and NVIDIA have joined forces to enhance cybersecurity with the introduction of autonomous agents powered by Charlotte AI and NVIDIA Nemotron models. This collaboration aims to empower security analysts to deploy specialized AI agents at scale, bolstering defenses against adversarial AI.

    The partnership leverages open-source technologies, including Charlotte AI AgentWorks, NVIDIA Nemotron open models, and synthetic data tools like NVIDIA NeMo Data Designer. NVIDIA’s Vice President of Applied Deep Learning Research, Bryan Catanzaro, explains that this initiative enables analysts to quickly build and deploy AI agents, enhancing security with Nemotron models.

    By enabling autonomous agents to learn rapidly and reduce risks, threats, and false positives, the collaboration aims to alleviate the burden on Security Operations Center (SOC) teams, combating data fatigue caused by inaccurate information. The introduction of machine-speed defense at GTC Washington, D.C., signifies a significant advancement in cybersecurity, matching the pace of machine-speed attacks.

    The partnership also focuses on transforming elite analyst expertise into datasets at machine scale. By aggregating telemetry data and insights from CrowdStrike Falcon Complete Managed Detection and Response analysts, the AI agents continuously learn and adapt, enhancing their capabilities to tackle evolving threats.

    Open-source AI models play a crucial role in this collaboration, addressing concerns around AI adoption in regulated environments. NVIDIA’s Nemotron open models provide transparency and customization opportunities for organizations, allowing them to maintain data privacy and security while building domain-specific knowledge.

    This partnership not only aims to strengthen security but also brings intelligence to the edge, advancing security operations by deploying AI agents closer to where decisions are made. The NVIDIA AI Factory for Government reference design guides the deployment of AI agents in federal and high-assurance organizations, meeting stringent security requirements.

    Source: VentureBeat

  • Critical Windows Vulnerabilities Exploited in Widespread Cyber Attacks

    This article was generated by AI and cites original sources.

    Recent reports from security researchers have revealed that two critical Windows vulnerabilities are currently being exploited in widespread cyber attacks across the globe. One of these vulnerabilities, known as a zero-day, has been targeted by attackers since 2017. Security firm Trend Micro discovered this zero-day in March, noting that it has been exploited by multiple advanced persistent threats (APTs) linked to nation-states. The attacks have targeted infrastructure in nearly 60 countries, with a focus on regions like the US, Canada, Russia, and Korea.

    Despite the zero-day being known for several years, Microsoft has yet to release a patch for it. The vulnerability originates from a bug in the Windows Shortcut binary format, which facilitates quicker access to apps and files by enabling a single binary file to invoke them directly. The zero-day, identified as CVE-2025-9491, remains unpatched, leaving systems vulnerable to exploitation.

    More recently, security firm Arctic Wolf reported that a threat group aligned with China, tracked as UNC-6384, has been leveraging the CVE-2025-9491 vulnerability to deploy the PlugX remote access trojan in attacks against European nations. The exploit method involves encrypting the malware using the RC4 format until the final stages of the attack, enhancing its concealment.

    The coordinated nature of these attacks, targeting multiple European countries within a short timeframe, indicates a sophisticated and potentially large-scale intelligence collection operation or the deployment of several independent operational teams sharing similar tools and tactics.

    Source: Ars Technica

  • University of Pennsylvania Faces Cybersecurity Breach, Sensitive Student Data at Risk

    This article was generated by AI and cites original sources.

    A recent cybersecurity breach has put the University of Pennsylvania under scrutiny as hackers threatened to leak sensitive student data. The incident, originating from the Graduate School of Education’s email addresses, highlighted potential security vulnerabilities within the institution.

    The emails disparaged the university, criticizing its security practices and admissions processes, raising concerns about data privacy and institutional integrity. Referencing laws like the Family Educational Rights and Privacy Act (FERPA) and Supreme Court rulings, the hackers underscored the gravity of the breach.

    In response, the University of Pennsylvania issued a statement acknowledging the fraudulent emails and assured the community that its Information Security team was actively mitigating the situation.

    This breach serves as a stark reminder of the importance of robust cybersecurity measures in educational institutions, emphasizing the need for continuous vigilance and proactive security protocols to safeguard sensitive student information.

    Source: The Verge

  • Safeguarding Against Agentic AI Security Threats: Strategies for Tech Firms

    This article was generated by AI and cites original sources.

    As agentic AI becomes increasingly prevalent, tech companies face growing concerns about security breaches. According to a recent VentureBeat report, the implementation of AI agents in enterprises introduces new security vulnerabilities that could disrupt operations and compromise data.

    Forrester’s Predictions 2026 foresee a challenging year for CISOs, with geopolitical turmoil and regulatory pressures driving the need for rapid deployment of agentic AI while minimizing risks. The report also anticipates a significant increase in quantum-security spending to combat emerging threats.

    CISOs are now tasked with addressing agentic AI threats head-on. Walmart’s Chief Information Security Officer emphasized the importance of building proactive security controls using advanced AI Security Posture Management to ensure continuous risk monitoring and regulatory compliance.

    One of the key challenges lies in managing the interactions between AI agents, ensuring they do not compete for resources or lack essential security measures. Companies like Clearwater Analytics and Walmart are actively investing in cybersecurity defenses to counter potential agentic AI cyberattacks.

    Seven proven strategies have emerged from discussions with security leaders to safeguard against imminent agentic AI threats. These include enhancing visibility, reinforcing API security, managing autonomous identities strategically, and upgrading to real-time observability for rapid threat detection.

    As agentic AI continues to reshape the threat landscape, enterprises must adapt by embedding proactive oversight, making governance adaptive, and engineering incident response ahead of machine-speed threats. The proactive stance taken by CISOs in mapping systems in real-time and integrating governance into daily operations will be crucial in staying ahead of the evolving cybersecurity landscape.

    Source: VentureBeat

  • Exposing the Vulnerabilities of Automated Card Shufflers: A Cautionary Tale for the Tech Industry

    This article was generated by AI and cites original sources.

    A recent episode of Uncanny Valley by WIRED revealed how a Deckmate 2 automatic shuffling machine, commonly used in poker games, could be manipulated to cheat. This discovery sheds light on the potential vulnerabilities of tech devices like card shufflers and the broader implications for the tech industry.

    The US Justice Department’s indictment involving rigged gambling games, including the manipulation of automatic shuffling machines, underscores the critical need to understand the security risks associated with prevalent tech tools. Hosts Michael Calore and Lauren Goode delve into the intricacies of compromising these machines, emphasizing the significance of identifying and addressing such vulnerabilities.

    By dissecting the methods employed by hackers to compromise card shufflers, this exploration serves as a cautionary tale for tech enthusiasts and industry professionals. Understanding the complexities of such manipulations not only highlights the importance of robust cybersecurity measures but also prompts a reevaluation of the trust placed in automated systems across various domains.

    As the tech industry continues to evolve, the insights shared on Uncanny Valley offer a valuable perspective on the changing landscape of cybersecurity and the need for continuous vigilance against potential exploits.

    Source: WIRED

  • Adversaries Exploit Trusted Tools to Evade Cybersecurity Detection

    This article was generated by AI and cites original sources.

    According to a recent report by CrowdStrike, 84% of modern cyber attacks evade detection by utilizing living-off-the-land (LOTL) techniques, bypassing traditional security systems. These attacks, increasingly common in finance and other sectors, leverage valid credentials and common tools to infiltrate and weaponize targeted infrastructures. The use of LOTL tactics has led to a notable rise in successful cyber intrusions, with adversaries remaining undetected for extended periods.

    Adversaries exploit well-known utilities such as PowerShell, Windows management instrumentation (WMI), PsExec, and others to establish persistence within networks, making it challenging for security teams to identify malicious activities. The use of legitimate tools by attackers has rendered signature-based detection methods ineffective, emphasizing the need for a proactive security approach.

    The shift towards malware-free attacks has significantly impacted organizations, with the average cost of ransomware-related downtime reaching $1.7 million per incident, underscoring the financial implications of cybersecurity breaches. Adversaries are now blending into the background, utilizing familiar tools and techniques to evade detection, resulting in faster breakout times for successful attacks.

    To combat the rising threat of LOTL attacks, organizations are advised to implement zero trust principles, enforce microsegmentation, and centralize behavioral analytics. Regular red team assessments, security awareness training, and continuous monitoring are crucial in mitigating the risks posed by advanced cyber threats.

    Source: VentureBeat