Keeping You Updated
Cybersecurity is a field requiring knowledge of current cybersecurity vulnerabilities, tactics, techniques, and procedures, adversaries, and the progress being made in cyber defense. College of Western Idaho is committed to increasing your knowledge about cybersecurity events by providing a cybersecurity news feed that keeps you up-to-date.
-
October 2024
- Protect Yourself from Political Donation Scams
- Unmasking the Central Villain: Inside Adversary-in-the-Middle Attacks
- What is Behavioral Analysis in Cybersecurity?
- Hunting for M365 Password Spraying
- One Order of Tips, Tricks & Hot Takes for Cybersecurity Awareness Month 2024.
- Will Patients’ Data Ever Be Safe if We Let GPTs Into Healthcare?
-
September 2024
- New Rust-Based Ransomware Cicada3301 Targets Windows and Linux Systems
- Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users
- Ex-Engineer Charged in Missouri for Failed $750,000 Bitcoin Extortion Attempt
- RansomHub Ransomware Group Targets 210 Victims Across Critical Sectors
- North Korean Hackers Targets Job Seekers with Fake FreeConference App
- Zyxel Patches Critical OS Command Injection Flaw in Access Points and Routers
-
August 2024
- Scattered Spider Adopts RansomHub and Qilin Ransomware for Cyber Attacks
-
Automated Threats Pose Increasing Risk to the Travel Industry
-
SolarWinds Patches 8 Critical Flaws in Access Rights Manager Software
-
Experts Uncover Chinese Cybercrime Network Behind Gambling and Human Trafficking
-
Cybercriminals Exploit CrowdStrike Update Mishap to Distribute Remcos RAT Malware
-
17-Year-Old Linked to Scattered Spider Cybercrime Syndicate Arrested in U.K.
-
Critical Docker Engine Flaw Allows Attackers to Bypass Authorization Plugins
-
CrowdStrike Explains Friday Incident Crashing Millions of Windows Devices
-
Ongoing Cyberattack Targets Exposed Selenium Grid Services for Crypto Mining
-
'Stargazer Goblin' Creates 3,000 Fake GitHub Accounts for Malware Spread
-
This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps
-
July 2024
-
U.S. Treasury Sanctions 12 Kaspersky Executives Amid Software Ban
-
Oyster Backdoor Spreading via Trojanized Popular Software Downloads
-
U.S. Bans Kaspersky Software, Citing National Security Risks
-
Google Introduces Project Naptime for AI-Powered Vulnerability Research
-
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping
-
Russian National Indicted for Cyber Attacks on Ukraine Before 2022 Invasion
-
New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems
-
Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment
-
How MFA Failures are Fueling a 500% Surge in Ransomware Losses
-
Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware
-
Global Police Operation Shuts Down 600 Cybercrime Servers Linked to Cobalt Strike
-
Microsoft's July Update Patches 143 Flaws, Including Two Actively Exploited
-
Chinese APT41 Upgrades Malware Arsenal with DodgeBox and MoonWalk
-
GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Jobs
-
GitHub Token Leak Exposes Python's Core Repositories to Potential Attacks
-
CRYSTALRAY Hackers Infect Over 1,500 Victims Using Network Mapping Tool
-
-
June 2024
-
Researcher Uncovers Flaws in Cox Modems, Potentially Impacting Millions
-
Authorities Ramp Up Efforts to Capture the Mastermind Behind Emotet
-
Beware: Fake Browser Updates Deliver BitRAT and Lumma Stealer Malware
-
Mysterious Cyber Attack Took Down 600,000+ Routers in the U.S.
-
Microsoft Warns of Surge in Cyber Attacks Targeting Internet-Exposed OT Device
-
China-Backed Hackers Exploit Fortinet Flaw, Infecting 20,000 Systems Globally
-
New Cross-Platform Malware 'Noodle RAT' Targets Windows and Linux Systems
-
-
May 2024
-
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
-
New "Goldoon" Botnet Targets D-Link Routers With Decade-Old Flaw
-
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
-
China-Linked Hackers Suspected in ArcaneDoor Cyberattacks Targeting Network Devices
-
New Spectre-Style 'Pathfinder' Attack Targets Intel CPU, Leak Encryption Keys and Data
-
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
-
Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia
-
MITRE Unveils EMB3D: A Threat-Modeling Framework for Embedded Devices
-
New Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacks
-
North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign
-
Researchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox
-
NextGen Healthcare Mirth Connect Under Attack - CISA Issues Urgent Warning
-
Beware: These Fake Antivirus Sites Spreading Android and Windows Malware
-
WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites
-
TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks
-
U.S. Dismantles World's Largest 911 S5 Botnet with 19 Million Infected Devices
-
OpenAI, Meta, and TikTok Crack Down on Covert Influence Campaigns, Some AI-Powered
-
-
March 2024
- Key Lesson from Microsoft's Password Spray Hack: Secure Every Account
- Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In
- Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets
- LockBit Ransomware Hacker Ordered to Pay $860,000 After Guilty Plea in Canada
- Ex-Google Engineer Arrested for Stealing AI Technology Secrets for China
-
February 2024
- Cybersecurity for Healthcare—Diagnosing the Threat Landscape and Prescribing Solutions for Recovery
- U.S. State Government Network Breached via Former Employee's Account
- How Businesses Can Safeguard Their Communication Channels Against Hackers
- Hackers Exploit Job Boards, Stealing Millions of Resumes and Personal Data
- Former CIA Engineer Sentenced to 40 Years for Leaking Classified Documents
- Cloudflare Breach: Nation-State Hackers Access Source Code and Internal Docs
-
December 2023
- Generative AI Security: Preventing Microsoft Co-Pilot Data Exposure
- Crafting Shields: Defending Minecraft Servers Against DDoS Attacks
- Unveiling the Cyber Threats to Healthcare: Beyond the Myths
- Remote Encryption Attacks Surge: How One Vulnerable Device Can Spell Disaster
- Cost of a Data Breach Report 2023: Insights, Mitigators and Best Practices
- FBI Takes Down BlackCat Ransomware, Releases Free Decryption Tool
- China's MIIT Introduces Color-Coded Action Plan for Data Security Incidents
- New Hacker Group 'GambleForce' Targeting APAC Firms Using SQL Injection Attacks
-
November 2023
-
October 2023
-
September 2023
-
August 2023
- Russian Cyber Adversary BlueCharlie Alters Infrastructure in Response to Disclosures
- Major Cybersecurity Agencies Collaborate to Unveil 2022's Most Exploited VulnerabilitiesMajor Cybersecurity Agencies Collaborate to Unveil 2022's Most Exploited Vulnerabilities
- Microsoft Flags Growing Cybersecurity Concerns for Major Sporting Events
- New 'Deep Learning Attack' Deciphers Laptop Keystrokes with 95% Accuracy
- FBI Alert: Crypto Scammers are Masquerading as NFT Developers
- U.K. Electoral Commission Breach Exposes Voter Data of 40 Million Britons
- CISA Adds Microsoft .NET Vulnerability to KEV Catalog Due to Active Exploitation
- Charming Kitten Targets Iranian Dissidents with Advanced Cyber Attacks
- India Passes New Digital Personal Data Protection Bill (DPDPB), Putting Users' Privacy First
- What's the State of Credential theft in 2023?
- Syrian Threat Actor EVLF Unmasked as Creator of CypherRAT and CraxsRAT Android Malware
-
July 2023
- Evasive Meduza Stealer Targets 19 Password Managers and 76 Crypto Wallets
- Researchers Uncover New Linux Kernel 'StackRot' Privilege Escalation Vulnerability
- Vishing Goes High-Tech: New 'Letscall' Malware Employs Voice Traffic Routing
- Ransomware Extortion Skyrockets in 2023, Reaching $449.1 Million and Counting
- Chinese Hackers Deploy Microsoft-Signed Rootkit to Target Gaming Sector
- Decoy Dog: New Breed of Malware Posing Serious Threats to Enterprise Networks
- Fenix Cybercrime Group Poses as Tax Authorities to Target Latin American Users
- New AI Tool 'FraudGPT' Emerges, Tailored for Sophisticated Attacks
- GameOver(lay): Two Severe Linux Vulnerabilities Impact 40% of Ubuntu Users
- Researchers Expose Space Pirates' Cyber Campaign Across Russia and Serbia
-
June 2023
- Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering
- Chinese PostalFurious Gang Strikes UAE Users with Sneaky SMS Phishing Scheme
- Asylum Ambuscade: A Cybercrime Group with Espionage Ambitions
- Password Reset Hack Exposed in Honda's E-Commerce Platform, Dealers Data at Risk
- Apple's Safari Private Browsing Now Automatically Removes Tracking Parameters in URLs
- Microsoft Warns of New Russian State-Sponsored Hacker Group with Destructive Intent
- New Golang-based Skuld Malware Stealing Discord and Browser Data from Windows PCs
- Vidar Malware Using New Tactics to Evade Detection and Anonymize Activities
- Microsoft Blames Massive DDoS Attack for Azure, Outlook, and OneDrive Disruptions
- Chinese Hacker Group 'Flea' Targets American Ministries with Graphican Backdoor
- Chinese Hackers Using Never-Before-Seen Tactics for Critical Infrastructure Attacks
- Alert: New Electromagnetic Attacks on Drones Could Let Attackers Take Control
- MITRE Unveils Top 25 Most Dangerous Software Weaknesses of 2023: Are You at Risk?
-
May 2023
- APT28 Targets Ukrainian Government Entities with Fake "Windows Update" Emails
- Chinese Hacker Group Earth Longzhi Resurfaces with Advanced Malware Tactics
- Researchers Discover 3 Vulnerabilities in Microsoft Azure API Management Service
- Dragon Breath APT Group Using Double-Clean-App Technique to Target Gambling Industry
- Why Honeytokens Are the Future of Intrusion Detection
- New APT Group Red Stinger Targets Military and Critical Infrastructure in Eastern Europe
- Bl00dy Ransomware Gang Strikes Education Sector with Critical PaperCut Vulnerability
- New 'MichaelKors' Ransomware-as-a-Service Targeting Linux and VMware ESXi Systems
- Threat Group UNC3944 Abusing Azure Serial Console for Total VM Takeover
- GoldenJackal: New Threat Group Targeting Middle Eastern and South Asian Governments
-
April 2023
- Arid Viper Hacking Group Using Upgraded Malware in Middle East Cyber Attacks
- Supply Chain Attacks and Critical Infrastructure: How CISA Helps Secure a Nation's Crown Jewels
- Top 10 Cybersecurity Trends for 2023: From Zero Trust to Cyber Insurance
- CISA Warns of 5 Actively Exploited Security Flaws: Urgent Action Required
- Lazarus Hacker Group Evolves Tactics, Tools, and Targets in DeathNote Campaign
- Israel-based Spyware Firm QuaDream Targets High-Risk iPhones with Zero-Click Exploit
- Google Uncovers APT41's Use of Open Source GC2 Tool to Target Media and Job Sites
- Blind Eagle Cyber Espionage Group Strikes Again: New Attack Chain Uncovered
- Charming Kitten's New BellaCiao Malware Discovered in Multi-Country Attacks
- Lazarus Subgroup Targeting Apple Devices with New RustBucket macOS Malware
-
March 2023
- BlackLotus Becomes First UEFI Bootkit Malware to Bypass Secure Boot on Windows 11
- Core Members of DoppelPaymer Ransomware Gang Targeted in Germany and Ukraine
- Sharp Panda Using New Soul Framework Version to Target Southeast Asian Governments
- CISA Issues Urgent Warning: Adobe ColdFusion Vulnerability Exploited in the Wild
- Winter Vivern APT Group Targeting Indian, Lithuanian, Slovakian, and Vatican Officials
- Emotet Rises Again: Evades Macro Security via OneNote Attachments
- ScarCruft's Evolving Arsenal: Researchers Reveal New Malware Distribution Techniques
- U.K. National Crime Agency Sets Up Fake DDoS-For-Hire Sites to Catch Cybercriminals
-
February 2023
- Experts Warn of 'Ice Breaker' Cyberattacks Targeting Gaming and Gambling Industry
- New SH1MMER Exploit for Chromebook Unenrolls Managed ChromeOS Devices
- Is Your EV Charging Station Safe? New Security Vulnerabilities Uncovered
- NewsPenguin Threat Actor Emerges with Malicious Campaign Targeting Pakistani Entities
- NIST Standardizes Ascon Cryptographic Algorithm for IoT and Other Lightweight Devices
- 3 Overlooked Cybersecurity Breaches
- Hackers Create Malicious Dota 2 Game Modes to Secretly Access Players' Systems
- Honeypot-Factory: The Use of Deception in ICS/OT Environments
- Python Developers Beware: Clipper Malware Found in 450+ PyPI Packages!
- Researchers Link SideWinder Group to Dozens of Targeted Attacks in Multiple Countries
- New Threat Actor WIP26 Targeting Telecom Service Providers in the Middle East
- Cyber Espionage Group Earth Kitsune Deploys WhiskerSpy Backdoor in Latest Attacks
- U.S. Cybersecurity Agency CISA Adds Three New Vulnerabilities in KEV Catalog
- Hydrochasma: New Threat Actor Targets Shipping Companies and Medical Labs in Asia
-
January 2023
- PyTorch Machine Learning Framework Compromised with Malicious Dependency
- Blind Eagle Hackers Return with Refined Tools and Sophisticated Infection Chain
- Bluebottle Cybercrime Group Preys on Financial Sector in French-Speaking African Nations
- Millions of Vehicles at Risk: API Vulnerabilities Uncovered in 16 Major Car Brands
- Dark Pink APT Group Targets Governments and Military in APAC Region
- New Backdoor Created Using Leaked CIA's Hive Malware Discovered in the Wild
- Roaming Mantis Spreading Mobile Malware That Hijacks Wi-Fi Routers' DNS Settings
-
December 2022
- LastPass Suffers Another Security Breach; Exposed Some Customers Information
- SiriusXM Vulnerability Lets Hackers Remotely Unlock and Start Connected Cars
- Open Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper Malware
- Vice Society Ransomware Attackers Targeted Dozens of Schools in 2022
- Top 4 SaaS Security Threats for 2023
- Why PCI DSS 4.0 Should Be on Your Radar in 2023
- Minecraft Servers Under Attack: Microsoft Warns About Cross-Platform DDoS Botnet
- Cybercrime (and Security) Predictions for 2023
- FIN7 Cybercrime Syndicate Emerges as a Major Player in Ransomware Landscape
-
November 2022
- These Android Apps with a Million Play Store Installations Redirect Users to Malicious Sites
- Inside Raccoon Stealer V2
- OPERA1ER APT Hackers Targeted Dozens of Financial Organizations in Africa
- Hackers Using Rogue Versions of KeePass and SolarWinds Software to Distribute RomCom RAT
- APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network
- New "Earth Longzhi" APT Targets Ukraine and Asian Countries with Custom Cobalt Strike Loaders
- Chinese 'Mustang Panda' Hackers Actively Targeting Governments Worldwide
- LodaRAT Malware Resurfaces with New Variants Employing Updated Functionalities
-
October 2022
- Cybersecurity Summit
- Back to Basics: Cybersecurity's Weakest Link
- Mitigation for Exchange Zero-Days Bypassed! Microsoft Issues New Workarounds
- FBI, CISA, and NSA Reveal How Hackers Targeted a Defense Industrial Base Organization
- Eternity Group Hackers Offering New LilithBot Malware-as-a-Service to Cybercriminals
- BlackByte Ransomware Abuses Vulnerable Windows Driver to Disable Security Solutions
- New Report Uncovers Emotet's Delivery and Evasion Techniques Used in Recent Attacks
- Researchers Detail Malicious Tools Used by Cyber Espionage Group Earth Aughisky
- Hackers Using Vishing to Trick Victims into Installing Android Banking Malware
- Mirai Botnet Hits Wynncraft Minecraft Server with 2.5 Tbps DDoS Attack
- Black Basta Ransomware Hackers Infiltrate Networks via Qakbot to Deploy Brute Ratel C4
-
September 2022
- Iranian Hackers Target High-Value Targets in Nuclear Security and Genomic Research
- Asian Governments and Organizations Targeted in Latest Cyber Espionage Attacks
- Apple Releases iOS and macOS Updates to Patch Actively Exploited Zero-Day Flaw
- High-Severity Firmware Security Flaws Left Unpatched in HP Enterprise Devices
- Why Vulnerability Scanning is Critical for SOC 2
- Hacktivist Group GhostSec Compromises 55 Berghof PLCs Across Israel
- Cisco Releases Security Patches for New Vulnerabilities Impacting Multiple Products
- New Stealthy Shikitega Malware Targeting Linux Systems and IoT Devices
- Ransomware Attackers Abuse Genshin Impact Anti-Cheat System to Disable Antivirus
- TikTok Denies Data Breach Reportedly Exposing Over 2 Billion Users' Information
- Google Releases Urgent Chrome Update to Patch New Zero-Day Vulnerability
- Over 1,800 Android and iOS Apps Found Leaking Hard-Coded AWS Credentials
-
July 2022
- Unpatched GPS Tracker Bugs Could Let Attackers Disrupt Vehicles Remotely
- Over a Dozen Android Apps on Google Play Store Caught Dropping Banking Malware
- Vendor data breach at St. Luke's
- Idaho schools looking to help fill cybersecurity workforce need
- What Idahoans Need to Know as Cyber Crime Increases
- How 2021’s Record for Cyber Attacks Affected Idaho Residents
- U of I Earns $4.46M Toward Cybersecurity Student Training Scholarships
-
May 2022
- Task Force: Idaho Must Shore Up Cybersecurity
- Idaho maps out cybersecurity strategy
- SHIELDS UP in bite sized chunks
- FBI: Rise in Business Email-based Attacks is a $43B Headache
- US Cyber Command Team Helps Lithuania Protect Its Networks
- Gov. Brad Little highlights recommendations in new Cybersecurity Task Force Report
- Governor's Cybersecurity Task Force releases 18 recommendations
- Cyber-security chiefs warn of malicious app risk
- Attackers Use Event Logs to Hide Fileless Malware
-
April 2022
- Ukrainian power grid 'lucky' to withstand Russian cyber-attack
- Ukraine foiled Russian cyberattack that tried to shut down energy grid
- Why Ransomware Should Be On Every Cybersecurity Team's Radar
- How US cybersecurity trends can help the UK prepare itself
- FCC Chair Claims Cybersecurity Role Congress Crafted for CISA
- Learn the latest cybersecurity techniques at the Microsoft Security Summit
- 5 dangerous cybersecurity mistakes you’re probably making
- Boise State 'CyberDome' program boosts rural cybersecurity throughout Idaho
- Could we see a passwordless future?
- What are the safety risks of removable media?
- War, fear, ‘hacktivist’ zeal are upending energy cybersecurity
- No plain sailing: modern pirates hack superyachts' cybersecurity
CWI Cybersecurity News
CWI’s Cybersecurity program was ranked 22 out of 150 Associate of Applied Science programs nationally in a new ranking by Cybersecurity Guide.
The week-long daytime event is aimed at teaching high school students the basics of computing, cybersecurity, and information technology through a hands-on, fun, and engaging experience.
College of Western Idaho’s Computer Science and Information Technology Department will host a day of education and training to expand cybersecurity knowledge around the state.
Cybersecurity student, Stanley Ward, was selected out of thousands of students for a national scholarship through his participation in a national cybersecurity competition.
Congratulations to College of Western Idaho's Cybersecurity team who advanced to the finals and placed fourth at the Future of Work Academy cybersecurity incubator competition.
Cybersecurity Representatives from College of Western Idaho’s Cyber Defense Center took part in the Idaho Office of Emergency Management’s annual Cybersecurity Summit Thursday, Oct. 13.
Need More Info?
- MS, MBA
- Center of Academic Excellence - Cyber Defense Accreditation Alternate Point of Contact