Security

Maestro: a new attack that orchestrates malicious flows with BGP

Researchers at the University of Tennessee have recently identified the Maestro attack, a new link flooding attack (LFA) that leverages plane traffic control engineering techniques to concentrate botnet-sourced distributed ...

Computer Sciences

Selecting the best features for phishing attack detection algorithms

In recent decades, phishing attacks have become increasingly common. These attacks allow attackers to obtain sensitive user data, such as passwords, usernames, credit card details, etc., by tricking people into disclosing ...

Computer Sciences

New exploitation techniques and defenses for DOP attacks

Data-oriented attacks allow hackers to manipulate non-control data and alter a program's behavior, often causing significant damage to the systems affected. Researchers at Virginia Tech, Clemson University, Pennsylvania State ...

Computer Sciences

A new method to detect false data injection (FDI) attacks

Researchers at Beijing Institute of Technology (BIT) have recently developed a new method to detect false data injection (FDI) attacks on critical infrastructure such as power grids. Their solution, outlined in a paper presented ...

Computer Sciences

Using deep neural networks to hunt malicious TLS certificates

A team of researchers at Cyxtera Technologies has recently proposed a neural network-based method for identifying malicious use of web certificates. Their approach, outlined in a paper published in ACM Digital Library, uses ...

page 1 from 33