{"id":124,"date":"2024-12-09T12:12:32","date_gmt":"2024-12-09T17:12:32","guid":{"rendered":"https:\/\/sites.udmercy.edu\/cyberclub\/?page_id=124"},"modified":"2025-02-06T21:15:46","modified_gmt":"2025-02-07T02:15:46","slug":"external-news","status":"publish","type":"page","link":"https:\/\/sites.udmercy.edu\/cyberclub\/external-news\/","title":{"rendered":"External News"},"content":{"rendered":"\n<h2 class=\"has-text-align-center\">Krebs On Security<\/h2>\n\n\n<ul class=\"is-grid columns-3 has-dates has-excerpts wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/05\/cisa-admin-leaked-aws-govcloud-keys-on-github\/'>CISA Admin Leaked AWS GovCloud Keys on Github<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">May 18, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Until this past weekend, a contractor for the Cybersecurity &amp; Infrastructure Security Agency (CISA) maintained a public GitHub repository that exposed credentials to several highly [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/05\/patch-tuesday-may-2026-edition\/'>Patch Tuesday, May 2026 Edition<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">May 12, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Artificial intelligence platforms may be just as susceptible to social engineering as human beings, but they are proving remarkably good at finding security vulnerabilities in [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/05\/canvas-breach-disrupts-schools-colleges-nationwide\/'>Canvas Breach Disrupts Schools &amp; Colleges Nationwide<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">May 8, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and universities across the United States [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/04\/anti-ddos-firm-heaped-attacks-on-brazilian-isps\/'>Anti-DDoS Firm Heaped Attacks on Brazilian ISPs<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 30, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/04\/scattered-spider-member-tylerb-pleads-guilty\/'>\u2018Scattered Spider\u2019 Member \u2018Tylerb\u2019 Pleads Guilty<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 21, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">A 24-year-old British national and senior member of the cybercrime group &quot;Scattered Spider&quot; has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/krebsonsecurity.com\/2026\/04\/patch-tuesday-april-2026-edition\/'>Patch Tuesday, April 2026 Edition<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">April 14, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day [&hellip;]<\/div><\/li><\/ul>\n\n\n<h2 class=\"has-text-align-center\">Secure World<\/h2>\n\n\n<ul class=\"is-grid columns-3 has-dates has-excerpts wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.secureworld.io\/industry-news\/drones-mobile-perimeter-threat'>Airborne Intrusion: Why Drones Are the New Mobile Perimeter Threat<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">May 20, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">When we think about physical security at large-scale public gatherings, our minds go to fences, bag checks, and ground-based guards. [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.secureworld.io\/industry-news\/security-anxiety-behaviors-data-sanitization'>Report Reveals &#039;Security Anxiety&#039; Behaviors with Data Sanitization<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">May 20, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">In the cybersecurity world, teams spend billions of dollars on the &quot;front door&quot;\u2014firewalls, identity platforms, and runtime detection. But according [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.secureworld.io\/industry-news\/newcomers-canada-fraud-victims'>Newcomers to Canada Are the Fraud Victims the Loss Ledger Keeps Missing<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">May 19, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Thirty-eight percent of newcomers to Canada say they have been hit by at least one fraud, more than double the [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.secureworld.io\/industry-news\/iranian-gas-station-exploits'>Why the Iranian Gas Station Exploits Mark a Kinetic Turning Point<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">May 19, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">For years, the cybersecurity community has warned that the line between a digital nuisance and a kinetic threat is razor-thin. [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.secureworld.io\/industry-news\/ddos-devil-in-details'>The DDoS Devil&#039;s in the Details<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">May 18, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">AI and automation have industrialized modern attack campaigns, shrinking timelines and increasing precision. Akamai&#039;s recent State of the lnternet Security [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.secureworld.io\/industry-news\/navigating-chinese-nexus-threats-summits'>Navigating Chinese-Nexus Threats Amidst High-Level Summits<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">May 15, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">While President Donald Trump and President Xi Jinping meet in China this week for high-stakes diplomatic talks, the digital front [&hellip;]<\/div><\/li><\/ul>\n\n\n<h2 class=\"has-text-align-center\">Dark Reading<\/h2>\n\n\n<ul class=\"is-grid columns-3 has-dates has-excerpts wp-block-rss\"><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/events\/anatomy-of-a-data-breach-what-to-do-if-it-happens-to-you'>[Virtual Event] Anatomy of a Data Breach: What to Do if it Happens to You<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">June 18, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\"><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/events\/infosecurity-europe'>Infosecurity Europe<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">June 2, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\"><\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/cybersecurity-analytics\/cyber-pros-ai'>Cyber Pros Can&#039;t Decide If AI Is a Good or a Bad Thing<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">May 20, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">There is nothing cybersecurity professionals are more excited about, and nothing they fear more, than AI.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/application-security\/github-confirms-breach-4k-internal-repos-stolen'>GitHub Confirms Breach, 4K Internal Repos Stolen<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">May 20, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Open source software giant GitHub confirmed a data breach this week involving the theft of thousands of repos. One threat [&hellip;]<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/mobile-security\/fake-android-apps-carrier-billing-fraud'>Fake Android Apps Commit Carrier Billing Fraud for Premium Svcs.<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">May 20, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">The disguised apps use WebView automation, JavaScript injection, and OTP interception to avoid detection and complete fraudulent subscriptions.<\/div><\/li><li class='wp-block-rss__item'><div class='wp-block-rss__item-title'><a href='https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/processes-and-culture-top-reasons-behind-data-breaches'>Processes and Culture Top Reasons Behind Data Breaches<\/a><\/div><time datetime=\"\" class=\"wp-block-rss__item-publish-date\">May 20, 2026<\/time> <div class=\"wp-block-rss__item-excerpt\">Government leaders revealed that, in spite of state laws meant to improve cyber hygiene, an analysis of incidents showed issues [&hellip;]<\/div><\/li><\/ul>","protected":false},"excerpt":{"rendered":"<p>Krebs On Security Secure World Dark Reading<\/p>\n","protected":false},"author":65,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0},"_links":{"self":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/pages\/124"}],"collection":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/comments?post=124"}],"version-history":[{"count":4,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/pages\/124\/revisions"}],"predecessor-version":[{"id":254,"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/pages\/124\/revisions\/254"}],"wp:attachment":[{"href":"https:\/\/sites.udmercy.edu\/cyberclub\/wp-json\/wp\/v2\/media?parent=124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}