Request Information
Ready to find out what MSU Denver can do for you? We’ve got you covered.
Multiple scholarships are being offered by the ISSA Education Foundation for current and future Cybersecurity professionals.
Scholarships for undergraduate studies range from $2,000 to $3,500 and the window for applications closes June 15th, at the latest.
The Cybersecurity Center is hosting our next live-fire training event in June.
If you are interested in the opportunity to experience a virtual hack in a live environment please fill out our contact form and be sure the reference “June Live-Fire” in your message. Final dates will be shared with qualified candidates.
We will not be able to respond to each application individually but appreciate your interest if you decide to apply!
Dive into the thrilling world of cybersecurity and build skills that will set you apart in the tech industry with Centurion Secured.
Responsibilities:
Outcomes:
To get started, email your interest to [email protected]
Dive into the thrilling world of cybersecurity and build skills that will set you apart in the tech industry with Centurion
Cybersecurity firm Morphisec has issued a warning about a new malware strain called ResolverRAT, which has been seen recently in attacks on healthcare and pharmaceutical organizations.
Remote Access Trojans [RATs] are a type of malware disguised as legitimate software designed to give hackers unauthorized access to a victim’s computer. This access can take the form of viewing, modifying, deleting files; monitoring device activity such as keystrokes, screen content, webcam, or mic; and installing more malware to further compromise the system.
ResolverRAT is very advanced, using in-memory execution, layered evasion techniques, and runtime resolution mechanisms. It spreads through phishing emails, often referencing legal or copyright issues.
Once a user clicks the link and downloads the file, ResolverRAT runs through a process called DLL hijacking to infect the system. It’s payload is compressed and encrypted with AES-256. One decrypted, it stays hidden by existing only in memory
Learn more about how ResolverRAT works and what it’s being used to do Here.
The Cybersecurity and Infrastructure Security Agency [CISA] has extended its government contract with MITRE for another 11 months, after nearly allowing its contract with MITRE to maintain the Common Vulnerabilities and Exposures [CVE] and related programs to expire on April 16th.
One such related program includes the Common Weakness Enumeration [CWE] program, that lists software and hardware weaknesses, helping organizations and individuals understand and address vulnerabilities at a deeper, structural level. The CWE program highlights known flaws in software design, implementation, and configuration, and presents it all to create a roadmap for improving security practices and reducing or mitigating future risk.
Meanwhile, the CVE program focuses on identifying, defining, and cataloging publicly disclosed cybersecurity vulnerabilities. Each CVE entry contains standardized information on a specific vulnerability including its severity, affected systems, and mitigation strategies. This allows for professionals to assess the relevance of known vulnerabilities in their environment, prioritize patching and updates, and stay informed of the latest disclosed threats.
Both of these programs make it easier to manage and understand vulnerabilities, facilitating faster identification of weaknesses, improved risk management, and contributes immensely to broader cybersecurity community by sharing this important knowledge. The widespread use of these programs underscore their importance, described in a LinkedIn post by former CISA director Jen Easterly as the “Dewey Decimal System for cybersecurity.”
Moving forward, MITRE may need to get funding from the private sector, a possibility the CVE board has already been working on for over a year—starting a new CVE Foundation to supply it.
Generative AI has made it much easier to create convincing text and images, which threat actors have been able to successfully leverage in their workflows.
Microsoft’s Cyber Signals Report discloses a sharp rise in AI-powered scams, identifying two major attack vectors:
Threat actors have pulled off a convincing scam by spoofing Google using a DKIM Replay Attack. DomainKeys Identified Mail [DKIM] is an email security standard designed to prove that an email comes from the claimed sender’s domain and hasn’t been tampered with. It works by giving specific headers and the body of the message a digital signature- generated with the sender’s private key- at the time it’s sent.
The malicious email came from a real Google address, passed the standard DKIM, DMARC, and SPF security checks, had no typos, and contained no suspicious links. The email claimed a law enforcement subpoena needed access to the user’s Google Account, linking to a Google Sites page designed to mimic a Google support portal. This Sites page is where they were able to harvest credentials—if their target clicked a button, waited to be redirected to a fake Google login page, and entered their Google Account credentials to log in when prompted.
How the Attack Worked
Lessons Learned
Phishing attempts often create urgency, fear, or appeal to authority to seem more credible. If an email seems unusual or triggers a strong emotional response, don’t click any links—pause, review it carefully, verify the source, or report it.
For any inquires, please reach out to the Cybersecurity Center using our contact form and we will respond as quickly as we are able