CHERI Alliance Aims to Secure Hardware Memory

June 20, 2024 at 09:18AM The CHERI Alliance, launching in September, aims to enhance chip security by isolating hardware and software to safeguard against cyberattacks, addressing memory vulnerabilities particularly prevalent in ARM processors. The consortium, involving entities like University of Cambridge and SRI International, focuses on fine-grained memory protection for ARM, MIPS, and RISC-V architectures. … Read more

FBI Warns More Election “Chaos” in 2024

January 12, 2024 at 08:51AM FBI Director Christopher Wray and NSA Director Gen. Paul Nakasone highlighted the resilience of the election defense system against illegal interference. They warned about potential chaos caused by foreign adversaries using misinformation and cyber attacks. China was emphasized as a major threat in cyber warfare, with the US focusing on … Read more

Kinsing Cyberattackers Debut ‘Looney Tunables’ Cloud Exploits

November 6, 2023 at 06:02PM Researchers are warning about an exploit for the “Looney Tunables” vulnerability that is being used by the Kinsing cybercrime group to gain root privileges on Linux systems. This represents a change in tactics for the group, as they typically focus on automated attacks for cryptojacking. The exploit allows the attackers … Read more

Budget Cuts at CISA Could Affect Enterprise Cybersecurity

October 30, 2023 at 04:39PM The US Cybersecurity and Infrastructure Security Agency (CISA) may face budget cuts if efforts to combat disinformation about US elections continue. Cuts could affect CISA’s ability to defend federal networks and aid critical infrastructure against cyberattacks. Cuts would hinder progress in handling increasing attacks, but CISA has been successful in … Read more

Curl Bug Hype Fizzles After Patching Reveal

October 11, 2023 at 04:24PM The cybersecurity community anxiously awaited the disclosure of two security flaws in the open source proxy resolution tool, Curl. However, after patches and bug details were unveiled, neither vulnerability lived up to the hype. The first flaw could allow data corruption or remote code execution, but it only affects a … Read more