Light up the ALPS 2025
Save the Date
(IN BRIEF) The Technical University of Munich (TUM) has launched a new Cybersecurity Program to train over 200 students in the essential field of cybersecur
Noch ist unklar, wie viele Fälle es in Österreich gibt. Der Angriff erfolgte über infizierte Dateien in Whatsapp-Gruppenchats
The use of wireless sensor networks (WSNs) in critical applications such as environmental monitoring, smart agriculture, and industrial automation has created significant security concerns, particularly due to the broadcasting nature of wireless communication. The absence of physical-layer authentication mechanisms exposes these networks to threats like spoofing, compromising data authenticity. This paper introduces a multi-attribute physical layer authentication (PLA) scheme to enhance WSN security by using physical attributes such as received signal strength indicator (RSSI), battery level (BL), and altitude. The LoRaWAN join procedure, a key risk due to plain text transmission without encryption during initial communication, is addressed in this study. To evaluate the proposed approach, a partially synthesized dataset was developed. Real-world RSSI values were sourced from the LoRa at the Edge Dataset, while BL and altitude columns were added to simulate realistic sensor behavior in a forest fire detection scenario. Machine learning (ML) models, including Logistic Regression (LR), Random Forest (RF), and K-Nearest Neighbors (KNN), were compared with deep learning (DL) models, such as Multi-Layer Perceptron (MLP) and Convolutional Neural Networks (CNN). The results showed that RF achieved the highest accuracy among machine learning models, while MLP and CNN delivered competitive performance with higher resource demands.
(Bild: Lila Patel - stock.adobe.com) Erfahren Sie, wie SIEM-Systeme Echtzeitanalyse, KI-gestützte Bedrohungserkennung und unbegrenzte Lookbacks für proaktive Cybersicherheit nutzen.
Palo Alto Networks, the global cybersecurity leader, has announced the release of a Quantum Random Number Generator (QRNG) Open API framework, empowering organizations to prepare for future quantum security threats.
The Global Healthcare Cybersecurity Market reached US 20 2 billion in 2023 and is expected to reach US 61 63 billion by 2031 growing at a CAGR of 15 5 during the forecast period 2024 2031 The Healthcare Cybersecurity market ...
Application security startup Semgrep raised a $100 million Series D funding led by Menlo Ventures in the biggest round of the year so far for the industry.
Rise in number of sophisticated cyberattack, growing need to secure critical infrastructure, and extensive adoption and deployment of digital technologies...
Leading cybersecurity experts reveal emerging threats posed by advanced artificial intelligence technologies.
Check Point hat an seiner Hausmesse CPX 2025 in Wien neue KI-Features in seinen Produkten vorgestellt. Nataly Kremer, Chief Product Officer und Head of Research & Development, sagt im Interview, welche Rolle KI in der Cybersicherheit heute und in Zukunft spielt.
The dream-come-true scenario of the existence of quantum computers transforming our day-to-day lives is a nightmare scenario from the cybersecurity perspective.
AI in Cybersecurity Market Size The AI in the cybersecurity market grows due to rising demand for advanced security, increasing cyber-attacks across industries, and digitalization in security. WILMINGTON, DE, UNITED STATES, February 5, 2025 /EINPresswire.com/ — AI in cybersecurity is the use of AI technologies and processes to improve the protection of computer networks, systems, […]
OpenNHP is the open-source implementation of NHP, a cryptography-based zero trust protocol for safeguarding servers and data.
The rapid expansion of cloud computing underscores the critical need for advanced security measures to protect sensitive data on remote servers. Authentication is crucial for safeguarding these data. Despite various proposed methods, vulnerabilities persist. This paper introduces a novel multi-factor authentication system integrated with a hybrid cryptographic framework that dynamically changes encryption algorithms using machine learning techniques based on an intrusion-detection system. The proposed system employs passwords, conditional attributes, and fingerprint authentication to derive the encryption key from fingerprint data. It uses a dual-encryption strategy that combines five algorithm pairs: AES + HMAC (SHA-256), ECC + HMAC (SHA-512), HMAC-MD5 + PBKDF2, Twofish + Argon2, and Blowfish + HMAC SHA3-256. A Hybrid CNN-transformer model predicts and classifies attacks by dynamically adjusting an encryption algorithm to secure the data. The framework exhibited strong resilience against brute force, spoofing, phishing, guessing, and impersonation attacks. The proposed model achieved a commendable accuracy of 96.8%, outperforming other models. Implementing this framework in a cloud authentication environment significantly enhances data confidentiality and protects against unauthorized access. This study highlights the potential of combining multi-factor authentication and adaptive cryptography to obtain robust cloud security solutions.
.
ESET analyzes a campaign that impersonates DeepSeek to distribute malware through sites that imitate the official one. In recent days, following the launch of DeepSeek, an open source generative artificial intelligence tool, a campaign was detected distributing malware through fake sites that imitate the official one. ESET, a leading company in proactive threat detection, warns how once again cybercriminals take advantage of topics or events of mass interest to deceive unsuspecting users. The malicious website, reported by X user @g0njxa, has…
… is a Connecticut-based nonprofit healthcare provider that offers comprehensive primary …
By Romain Dillet / TechCrunch. View the full context on Techmeme.
Eine Untersuchung von Sophos X-Ops in einschlägigen Cybercrime-Foren zeigt: Bedrohungsakteure setzen KI nach wie vor nur zögerlich ein.
Wegen der zunehmenden Umstellung von Unternehmen auf Web-Arbeitsumgebungen, SaaS-Plattformen, Cloud-basierte Anwendungen, Remote-Arbeit und
(IN BRIEF) An international team of engineers and physicists has made a significant breakthrough in time-domain spectroscopy by using quantum light to enhan
Das 2020 gegründete Cybersecurity-Start-up unterstützt Regierungen, Finanzinstitute und Unternehmenmit maßgeschneiderter Intelligence, die Sicherheitsverantwortliche bei proaktiven Entscheidungen unterstützt.
Der Dienst “Siemens OT Security Operations Center as-a-Service” (SOCaaS) soll weltweit Kunden mit Managed Security Services unterstützen.
Die US-Cybersicherheitsfirma Wiz hat ein Datenleck bei dem chinesischen KI-Startup Deepseek entdeckt. Mehr als 1 Million Datensätze sollen betroffen sein.
Dell & CrowdStrike have joined forces to boost cyber defense with custom threat indicators, expanded MDR services and 24/7 expert SOC support for data protection. Both technology vendors have co-developed more than 60 unique Indicators of Compromise (IOCs) tailored specifically for Dell PowerProtect Data Domain and PowerProtect Data Manager. ThreatRead More...