Note: this project is by Dina Board Humans, the weakest link in information security. An organization can implement the strongest and most advanced and robust security controls on their physical and logical systems and fortify their building. Yet, all it will take is an employee being manipulated, frightened, or simply indifferent to security protocols to …
Category Archives: Uncategorized
7-Zip Zero-Day Exploited in Targeted Attacks: A Deep Dive into CVE-2025-0411
A critical vulnerability in the popular 7-Zip file archiver, identified as CVE-2025-0411, has been actively exploited in the wild, primarily targeting Ukrainian entities[1]. This zero-day flaw allows attackers to bypass Windows’ Mark of the Web (MoTW) security feature, enabling the execution of malicious code without user warnings. This poses a significant threat, as it lowers …
Continue reading “7-Zip Zero-Day Exploited in Targeted Attacks: A Deep Dive into CVE-2025-0411”
Ethics of Biometric Data Collection and Usage – Teaching Aide
Team Members Our medium for the teaching aide was an annotated presentation. Link to presentation: https://uofc-my.sharepoint.com/:p:/g/personal/abdul_salawu_ucalgary_ca/EblmcfzHnUVJiuBzzDNdVpsBWslk1E4w9LngTK-K08hkpw?e=uy9Wn8
ISEC 611 Group 8 – Garbled Circuits
Walkthrough : https://youtu.be/7MXVV858loU Code Example Link: https://github.com/HaydenMcNally/ISEC-611 Introduction to Garbled Circuits (History and Overview) Garbled circuit is a computational technique which Andrew Yao introduced in an oral presentation in 1986, and the first written document was authored by Goldreich, Micali, and Widgerson in 1987. The term “garbled circuit” was coined by Beaver, Micali, and Rogaway …
DeepSeek: Innovation in AI and the Security Risks of Rapid Expansion
What is DeepSeek DeepSeek is a Chinese artificial intelligence company that has developed its systems on high-performing large language models. As a result, it has gained so much prominence that it rivals top U.S.-based AI systems. DeepSeek’s newest iteration comes in the form of an R1 model developed at a much lower cost than its …
Continue reading “DeepSeek: Innovation in AI and the Security Risks of Rapid Expansion”
Walkthrough: K-Anonymization: A Comparative Analysis of MinGen and Greedy Algorithms
Group Members Introduction In an era where data privacy is a growing concern, k-anonymity plays a crucial role in protecting sensitive information while preserving data utility. A dataset is k-anonymous if quasi-identifiers for each person in the dataset are identical to at least k – 1 other people also in the dataset [1], making it more difficult for …
AI in Threat Detection for Private Data Breaches : Case Study: Real-World Applications of AI in Threat Detection
In today’s digital age where private data breaches pose significant risks to individuals and organizations alike, the role of Artificial Intelligence (AI) in safeguarding sensitive information has grown significantly. This project provides an overview of how AI identifies, mitigates, and responds to data breach threats more effectively than traditional methods. It will also provide real-world …
Shamir Secret Sharing
Walkthrough of the Teaching Aide: Shamir Secret Sharing “Welcome! Today, we will dive into Shamir’s Secret Sharing” Understanding cryptographic techniques is crucial for maintaining secure and reliable systems. Through this teaching aide, you will gain insights into Shamir’s Secret Sharing, a powerful method for dividing a secret into multiple parts (shares) that can only be …
EAGERBEE Malware: A New Variant That Targets Middle East.
The Middle East has always had a mixed history when it comes to cybersecurity measures. While countries like Israel, the UAE, and Saudi Arabia have been on par with global powers in terms of their security strategies, Jordan, Yemen, and Oman have extremely weak cybersecurity measures due to political instability, limited resources, and a lack …
Continue reading “EAGERBEE Malware: A New Variant That Targets Middle East.”
Project Walk-Through: Beaver Multiplication Triples in Oblivious Transfer (OT)
Introduction We are delighted to introduce our group project: Beaver Multiplication Triples in Oblivious Transfer (OT). This project has been completed by A S M Nazimuddoullah and Fahim Uddin Very recently, the Bipartisan Senate AI Working Group pronounced substantially $32 billion per year being requisite [1] for AI safety research which pivots on privacy. A …
Continue reading “Project Walk-Through: Beaver Multiplication Triples in Oblivious Transfer (OT)”