Tag: network
-
NDSS 2025 Siniel: Distributed Privacy-Preserving zkSNARK
Tags: blockchain, china, computer, computing, conference, cryptography, data, framework, Internet, network, oracle, privacySession 14B: Privacy & Cryptography 2 Authors, Creators & Presenters: Yunbo Yang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Yuejia Cheng (Shanghai DeCareer Consulting Co., Ltd), Kailun Wang (Beijing Jiaotong University), Xiaoguo Li (College of Computer Science, Chongqing University), Jianfei Sun (School of Computing and Information Systems, Singapore Management University), Jiachen…
-
NDSS 2025 Siniel: Distributed Privacy-Preserving zkSNARK
Tags: blockchain, china, computer, computing, conference, cryptography, data, framework, Internet, network, oracle, privacySession 14B: Privacy & Cryptography 2 Authors, Creators & Presenters: Yunbo Yang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Yuejia Cheng (Shanghai DeCareer Consulting Co., Ltd), Kailun Wang (Beijing Jiaotong University), Xiaoguo Li (College of Computer Science, Chongqing University), Jianfei Sun (School of Computing and Information Systems, Singapore Management University), Jiachen…
-
NDSS 2025 SHAFT: Secure, Handy, Accurate And Fast Transformer Inference
Authors, Creators & Presenters: (All Via The Chinese University of Hong Kong) Andes Y. L. Kei, Sherman S. M. Chow PAPER SHAFT: Secure, Handy, Accurate and Fast Transformer Inference Adoption of transformer-based machine learning models is growing, raising concerns about sensitive data exposure. Nonetheless, current secure inference solutions incur substantial overhead due to their extensive…
-
IPFire ships its 200th core update with a new domain blocklist and kernel upgrade
Network firewall distribution IPFire released Core Update 200, marking the 200th incremental update to the 2.29 branch. The release bundles a kernel upgrade, a beta domain … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/02/pfire-2-29-core-update-200-released/
-
Europol Operation Targets Online Network Exploiting Minors
A Europol-led operation across 28 countries led to 30 arrests targeting “The Com,” a decentralized network accused of exploiting minors online. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/europol-operation-targets-online-network-exploiting-minors/
-
German court convicts alleged mastermind behind global investment scam network
The Bamberg Regional Court in Bavaria handed down the sentence last Thursday after an 11-day trial conducted under heightened security measures, according to reports by local media. First seen on therecord.media Jump to article: therecord.media/german-court-convicts-alleged-mastermind-scam-network
-
APT37 combines cloud storage and USB implants to infiltrate air-gapped systems
North Korea-linked APT 37 used Zoho WorkDrive and USB malware to breach air-gapped networks in the Ruby Jumper campaign. North Korean group ScarCruft (aka APT37, Reaper, and Group123) deployed new tools in a campaign dubbed Ruby Jumper, using a backdoor that leverages Zoho WorkDrive for C2 and a USB-based implant to breach air-gapped systems. Zscaler ThreatLabz…
-
Link11 Releases European Cyber Report 2026: DDoS Attacks Become a Constant Threat
Frankfurt am Main, Germany, March 2nd, 2026, CyberNewswire Link11 has published its European Cyber Report 2026, revealing that DDoS attacks reached a new level in 2025 and have become a permanent stress factor for digital infrastructures. The report shows that the number of documented attacks in the Link11 network rose by 75% in 2025, following…
-
âš¡ Weekly Recap: SD-WAN 0-Day, Critical CVEs, Telegram Probe, Smart TV Proxy SDK and More
This week is not about one big event. It shows where things are moving. Network systems, cloud setups, AI tools, and common apps are all being pushed in different ways. Small gaps in access control, exposed keys, and normal features are being used as entry points.The pattern becomes clear only when you see everything together.…
-
Digital Outposts: Evaluating the Role of DDoS Attacks in US-Iran Conflict
Background According to the monitoring data from NSFOCUS Fuying Lab, since the outbreak of domestic conflict in Iran in January 2026 and the subsequent escalation of tensions over the nuclear issue between the U.S. and Iran, Iran has been continuously subjected to DDoS attacks. The attack methods have shown diverse characteristics, including both botnet-based attacks…The…
-
Configuration and Runtime: The PBJ of Effective Security Operations
For most of the security industry’s history, logs were the problem to solve. Attacks were easy to spot in events: Failed logins, suspicious processes, and unexpected network connections. Infrastructure was relatively static, identities were long-lived, and configuration changed slowly enough to be treated as background context. SIEMs emerged to centralize logs, correlate activity across systems,..…
-
Europol’s Project Compass nets 30 arrests in crackdown on “The Com”
Europol’s Project Compass led to 30 arrests targeting ‘The Com’ network, identifying 62 victims and protecting four children from harm. A yearlong operation, code-named Project Compass, led by Europol has dealt a major blow to The Com,’ a cybercrime network known for targeting children and teenagers. The joint effort, called Project Compass and coordinated by…
-
Project Compass Operation Cracks Down on “The Com” Cybercrime Collective 30 Arrested, 179 Suspects Identified
An international law enforcement operation named Project Compass has launched a major offensive against >>The Com,<< a dangerous transnational virtual network (TVN). The operation, which began in January 2025, has successfully led to the arrest of 30 suspects and the identification of 179 potential perpetrators connected to the sprawling cybercrime collective. Led by the European…
-
How CISOs can build a resilient workforce
Tags: ai, automation, ciso, communications, cyber, cybersecurity, data, infrastructure, jobs, monitoring, network, risk, service, skills, soc, software, strategy, technology, threat, tool, trainingBurnout leads to job dissatisfaction: Burnout is an ongoing concern for many CISOs and their teams, especially when unpredictable events can trigger workload spikes, burnout can escalate fast. “It’s something that can overwhelm pretty quickly,” Ford says.Industry surveys continue to flash red on persistent burnout that leads to job dissatisfaction. The ISC2 study found almost…
-
Leitfaden zur NIS2-Compliance Zero Networks mit 5-Punkte Checkliste
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/leitfaden-nis2-compliance-checkliste
-
Leitfaden zur NIS2-Compliance Zero Networks mit 5-Punkte Checkliste
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/leitfaden-nis2-compliance-checkliste
-
Leitfaden zur NIS2-Compliance Zero Networks mit 5-Punkte Checkliste
First seen on datensicherheit.de Jump to article: www.datensicherheit.de/leitfaden-nis2-compliance-checkliste
-
Things Were Even Worse at CISA Than We Thought
Just last week I wrote that CISA was on life support. That was before we knew how bad it really was. When Jen Easterly stepped down and the agency was left without a Senate-confirmed director, it was already troubling. The Cybersecurity and Infrastructure Security Agency, the nerve center for defending federal networks and coordinating.. First…
-
Iran Has One Card Left”, It’s Pointed at Your Network
In light of today’s attack by the U.S. and Israel on Iran, it is prudent to ask: What can Iran do? Strip away everything Iran had a year ago and ask yourself what’s left. Their nuclear program? Set back years, maybe a decade. Their air defenses? Dismantled across two conflicts. Hezbollah? Degraded to the point..…
-
NDSS 2025 JBomAudit: Assessing The Landscape, Compliance, And Security Implications Of Java SBOMS
Tags: compliance, conference, Internet, network, risk, sbom, software, technology, tool, vulnerability, vulnerability-managementSession 14A: Software Security: Applications & Policies Authors, Creators & Presenters: Yue Xiao (IBM Research), Dhilung Kirat (IBM Research), Douglas Lee Schales (IBM Research), Jiyong Jang (IBM Research), Luyi Xing (Indiana University Bloomington), Xiaojing Liao (Indiana University) PAPER JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs A Software Bill of Materials (SBOM)…
-
Zero Networks liefert NIS2Leitfaden mit Checkliste
Automatisierte, identitätsbasierte Mikrosegmentierung verhindert laterale Bewegungen in großem Maßstab. MFA auf Netzwerkebene erzwingt privilegierten Zugriff für alle Systeme, einschließlich Legacy-Umgebungen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/zero-networks-liefert-nis2-compliance-leitfaden-mit-checkliste/a43870/
-
Iran ‘s Internet near-totally blacked out amid US, Israeli strikes
Iran experienced a near-total internet blackout as Israel and the U.S. launched strikes, according to NetBlocks. Internet access across Iran was drastically reduced on Saturday as Israel and the United States carried out strikes against the country, according to independent and non-partisan global internet monitor NetBlocks. Network data indicated a near-total nationwide blackout. The national…
-
OpenAI Will Deploy AI in US Military Classified Networks
Announcement Comes Hours After Trump Blacklists Anthropic. OpenAI said late Friday night it reached an agreement with the U.S. Department of Defense to deploy its large language models onto military classified networks. The announcement came hours after President Donald Trump instructed federal agencies to cease using AI developed by OpenAI rival Anthropic. First seen on…
-
Security hole could let hackers take over Juniper Networks PTX core routers
The hole is “especially dangerous, because these devices often sit in the middle of the network, not on the fringes,” said Piyush Sharma, CEO of Tuskira. “If an attacker gains control of a PTX, the impact is bigger than a single device compromise because it can become a traffic vantage point and a control point…
-
NDSS 2025 CASPR: Context-Aware Security Policy Recommendation
Session 14A: Software Security: Applications & Policies Authors, Creators & Presenters: All From The Institute of Information Engineering, Chinese Academy of Sciences: Lifang Xiao, Hanyu Wang, Aimin Yu, Lixin Zhao, Dan Meng PAPER CASPR: Context-Aware Security Policy Recommendation Nowadays, SELinux has been widely used to provide flexible mandatory access control and security policies are critical…
-
APT37 hackers use new malware to breach air-gapped networks
North Korean hackers are deploying newly uncovered tools to move data between internet-connected and air-gapped systems, spread via removable drives, and conduct covert surveillance. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/apt37-hackers-use-new-malware-to-breach-air-gapped-networks/
-
NDSS 2025 Enhancing Security In Third-Party Library Reuse
Tags: conference, detection, Internet, network, open-source, programming, software, tool, update, vulnerabilitySession 14A: Software Security: Applications & Policies Authors, Creators & Presenters: Shangzhi Xu (The University of New South Wales), Jialiang Dong (The University of New South Wales), Weiting Cai (Delft University of Technology), Juanru Li (Feiyu Tech), Arash Shaghaghi (The University of New South Wales), Nan Sun (The University of New South Wales), Siqi Ma…

