Highlights

Apply for an ISSA Education Foundation Scholarship

Multiple scholarships are being offered by the ISSA Education Foundation for current and future Cybersecurity professionals.
Scholarships for undergraduate studies range from $2,000 to $3,500 and the window for applications closes June 15th, at the latest.

Upcoming CMUTE Live-Fire Event

The Cybersecurity Center is hosting our next live-fire training event in June.

If you are interested in the opportunity to experience a virtual hack in a live environment please fill out our contact form and be sure the reference “June Live-Fire” in your message. Final dates will be shared with qualified candidates.

We will not be able to respond to each application individually but appreciate your interest if you decide to apply!

Kickstart Your Cybersecurity Career with Centurion Secured

Dive into the thrilling world of cybersecurity and build skills that will set you apart in the tech industry with Centurion Secured.

Responsibilities:

  • Monitor and Defend: Gain invaluable experience by providing essential cybersecurity monitoring services for real-world customers.
  • Analyze and Act: Work with streaming data, evaluate alerts, and develop critical skills as you investigate and respond to potential security threats.
  • Ticketing and Escalation: Master the art of writing and escalating tickets for alerts that demand further action, honing your analytical and problem-solving skills.

Outcomes:

  • Real-World Impact: Contribute to protecting real-world systems and networks, making a difference for customers.
  • Skill Development: Sharpen your technical skills and gain a deep understanding of security operations.
  • Resume Boost: Stand out to future employers with hands-on experience and demonstrated expertise in a high-demand field.

To get started, email your interest to [email protected]
Dive into the thrilling world of cybersecurity and build skills that will set you apart in the tech industry with Centurion

Current Events

ResolverRAT Targeting Pharmaceutical and Healthcare Organizations

Cybersecurity firm Morphisec has issued a warning about a new malware strain called ResolverRAT, which has been seen recently in attacks on healthcare and pharmaceutical organizations.

Remote Access Trojans [RATs] are a type of malware disguised as legitimate software designed to give hackers unauthorized access to a victim’s computer. This access can take the form of viewing, modifying, deleting files; monitoring device activity such as keystrokes, screen content, webcam, or mic; and installing more malware to further compromise the system.

ResolverRAT is very advanced, using in-memory execution, layered evasion techniques, and runtime resolution mechanisms. It spreads through phishing emails, often referencing legal or copyright issues.
Once a user clicks the link and downloads the file, ResolverRAT runs through a process called DLL hijacking to infect the system. It’s payload is compressed and encrypted with AES-256. One decrypted, it stays hidden by existing only in memory

Learn more about how ResolverRAT works and what it’s being used to do Here.

CVE Program Cuts; MITRE Extended 11 Months

The Cybersecurity and Infrastructure Security Agency [CISA] has extended its government contract with MITRE for another 11 months, after nearly allowing its contract with MITRE to maintain the Common Vulnerabilities and Exposures [CVE] and related programs to expire on April 16th.

One such related program includes the Common Weakness Enumeration [CWE] program, that lists software and hardware weaknesses, helping organizations and individuals understand and address vulnerabilities at a deeper, structural level. The CWE program highlights known flaws in software design, implementation, and configuration, and presents it all to create a roadmap for improving security practices and reducing or mitigating future risk.

Meanwhile, the CVE program focuses on identifying, defining, and cataloging publicly disclosed cybersecurity vulnerabilities. Each CVE entry contains standardized information on a specific vulnerability including its severity, affected systems, and mitigation strategies. This allows for professionals to assess the relevance of known vulnerabilities in their environment, prioritize patching and updates, and stay informed of the latest disclosed threats.

Both of these programs make it easier to manage and understand vulnerabilities, facilitating faster identification of weaknesses, improved risk management, and contributes immensely to broader cybersecurity community by sharing this important knowledge. The widespread use of these programs underscore their importance, described in a LinkedIn post by former CISA director Jen Easterly as the “Dewey Decimal System for cybersecurity.”

Moving forward, MITRE may need to get funding from the private sector, a possibility the CVE board has already been working on for over a year—starting a new CVE Foundation to supply it.

Learn More

AI Facilitates More Believable Scams, Some Tips from ZDNET to Avoid Them

Generative AI has made it much easier to create convincing text and images, which threat actors have been able to successfully leverage in their workflows.

Microsoft’s Cyber Signals Report discloses a sharp rise in AI-powered scams, identifying two major attack vectors:

  • E-commerce fraud: fake websites that are eerily similar to legitimate ones, featuring AI-generated content such as images, product descriptions, and reviews.
  • Job and employment fraud: fake listings across job platforms use generated content, with some also using phishing campaigns facilitated by AI.

Learn More

Contact Us

Get in Touch

For any inquires, please reach out to the Cybersecurity Center using our contact form and we will respond as quickly as we are able