Security News
![Friday Squid Blogging: Protecting Cephalopods in Medical Research](/static/build/img/news/alt/application-stats-small.jpg)
Cephalopods such as octopuses and squid could soon receive the same legal protection as mice and monkeys do when they are used in research. On 7 September, the US National Institutes of Health asked for feedback on proposed guidelines that, for the first time in the United States, would require research projects involving cephalopods to be approved by an ethics board before receiving federal funding.
![Week in review: 11 search engines for cybersecurity research, PoC for RCE in Juniper firewall released](/static/build/img/news/week-in-review-11-search-engines-for-cybersecurity-research-poc-for-rce-in-juniper-firewall-released-small.jpg)
What does optimal software security analysis look like?In this Help Net Security interview, Kevin Valk, co-CEO at Codean, discusses the consequences of relying solely on automated tools for software security. Apple offers security researchers specialized iPhones to tinker withApple is inviting security researchers to apply for its Security Research Device Program again, to discover vulnerabilities and earn bug bounties.
![Cybercriminals use research contests to create new attack methods](/static/build/img/news/cybercriminals-use-research-contests-to-create-new-attack-methods-small.jpg)
Adversary-sponsored research contests on cybercriminal forums focus on new methods of attack and evasion, according to Sophos. The contests mirror legitimate security conference 'Call For Papers' and provide the winners considerable financial rewards and recognition from peers and also potential jobs.
![Apple opens 2024 applications to get ‘security research’ iPhones](/static/build/img/news/apple-opens-2024-applications-to-get-security-research-iphones-small.jpg)
Apple announced today that iOS security researchers can now apply for a Security Research Device by the end of October. The company added that iPhones provided through the Security Research Device Program should only be used by authorized people and never leave the premises of the security research facility.
![11 search engines for cybersecurity research you can use right now](/static/build/img/news/11-search-engines-for-cybersecurity-research-you-can-use-right-now-small.jpg)
DNSdumpster is a free domain research tool that can discover hosts related to a domain. The search works with selectors, i.e. specific search terms such as email addresses, domains, URLs, IPs, CIDRs, Bitcoin addresses, IPFS hashes, etc.
![Cisco Talos Research: New Lazarus Group Attack Malware Campaign Hits UK & US Businesses](/static/build/img/news/cisco-talos-research-new-lazarus-group-attack-malware-campaign-hits-uk-us-businesses-small.jpg)
The Cisco Talos report exposes new malware used by the group to target Internet backbone infrastructure and healthcare organizations in the U.K. and the U.S. Two reports from cybersecurity company Cisco Talos provide intelligence about a new attack campaign from the North Korean threat actor Lazarus. The researchers observed the Lazarus group successfully compromise an internet backbone infrastructure provider in the U.K. in early 2023, deploying a new malware dubbed QuiteRAT. The initial compromise was done via exploitation of the CVE-2022-47966 vulnerability, which affects Zoho's ManageEngine ServiceDesk.
![Dependency Confusion Attacks: New Research Into Which Businesses are At Risk](/static/build/img/news/dependency-confusion-attacks-new-research-into-which-businesses-are-at-risk-small.jpg)
We share specifics from new security research about dependency confusion attacks, as well as explain how these attacks work, who is most at risk and how to mitigate them. New research from OX Security, a DevOps software supply chain security company, revealed that almost all applications with more than one billion users and more than 50% of applications with 30 million users are using dependencies that are vulnerable to dependency confusion attacks.
![Research Eyes Misconfiguration Issues At Google, Amazon and Microsoft Cloud](/static/build/img/news/alt/cloud-cybersecurity-statistics-small.jpg)
Qualys report looks at how misconfiguration issues on cloud service providers help attackers gain access. Cloud misconfiguration - incorrect control settings applied to both hardware and software elements in the cloud - are threat vectors that amplify the risk of data breaches.
![Patchwork Hackers Target Chinese Research Organizations Using EyeShell Backdoor](/static/build/img/news/patchwork-hackers-target-chinese-research-organizations-using-eyeshell-backdoor-small.jpg)
Threat actors associated with the hacking crew known as Patchwork have been spotted targeting universities and research organizations in China as part of a recently observed campaign. "Patchwork relied on a range of elaborate fictitious personas to socially engineer people into clicking on malicious links and downloading malicious apps," the social media giant said.
![New Research: 6% of Employees Paste Sensitive Data into GenAI tools as ChatGPT](/static/build/img/news/new-research-6-of-employees-paste-sensitive-data-into-genai-tools-as-chatgpt-small.jpg)
The revolutionary technology of GenAI tools, such as ChatGPT, has brought significant risks to organizations' sensitive data. The report titled "Revealing the True GenAI Data Exposure Risk" provides crucial insights for data protection stakeholders and empowers them to take proactive measures.