Ethical Human Hacking

Note: this project is by Dina Board Humans, the weakest link in information security. An organization can implement the strongest and most advanced and robust security controls on their physical and logical systems and fortify their building. Yet, all it will take is an employee being manipulated, frightened, or simply indifferent to security protocols to …

7-Zip Zero-Day Exploited in Targeted Attacks: A Deep Dive into CVE-2025-0411

A critical vulnerability in the popular 7-Zip file archiver, identified as CVE-2025-0411, has been actively exploited in the wild, primarily targeting Ukrainian entities[1]. This zero-day flaw allows attackers to bypass Windows’ Mark of the Web (MoTW) security feature, enabling the execution of malicious code without user warnings. This poses a significant threat, as it lowers …

ISEC 611 Group 8 – Garbled Circuits

Walkthrough : https://youtu.be/7MXVV858loU Code Example Link: https://github.com/HaydenMcNally/ISEC-611  Introduction to Garbled Circuits (History and Overview)  Garbled circuit is a computational technique which Andrew Yao introduced in an oral presentation in 1986, and the first written document was authored by Goldreich, Micali, and Widgerson in 1987. The term “garbled circuit” was coined by Beaver, Micali, and Rogaway …

DeepSeek: Innovation in AI and the Security Risks of Rapid Expansion

What is DeepSeek DeepSeek is a Chinese artificial intelligence company that has developed its systems on high-performing large language models. As a result, it has gained so much prominence that it rivals top U.S.-based AI systems. DeepSeek’s newest iteration comes in the form of an R1 model developed at a much lower cost than its …

Walkthrough: K-Anonymization: A Comparative Analysis of MinGen and Greedy Algorithms

Group Members Introduction In an era where data privacy is a growing concern, k-anonymity plays a crucial role in protecting sensitive information while preserving data utility. A dataset is k-anonymous if quasi-identifiers for each person in the dataset are identical to at least k – 1 other people also in the dataset [1], making it more difficult for …

AI in Threat Detection for Private Data Breaches : Case Study: Real-World Applications of AI in Threat Detection 

In today’s digital age where private data breaches pose significant risks to individuals and organizations alike, the role of Artificial Intelligence (AI) in safeguarding sensitive information has grown significantly. This project provides an overview of how AI identifies, mitigates, and responds to data breach threats more effectively than traditional methods. It will also provide real-world …

Shamir Secret Sharing

Walkthrough of the Teaching Aide: Shamir Secret Sharing  “Welcome! Today, we will dive into Shamir’s Secret Sharing”  Understanding cryptographic techniques is crucial for maintaining secure and reliable systems. Through this teaching aide, you will gain insights into Shamir’s Secret Sharing, a powerful method for dividing a secret into multiple parts (shares) that can only be …

EAGERBEE Malware: A New Variant That Targets Middle East.

The Middle East has always had a mixed history when it comes to cybersecurity measures. While countries like Israel, the UAE, and Saudi Arabia have been on par with global powers in terms of their security strategies, Jordan, Yemen, and Oman have extremely weak cybersecurity measures due to political instability, limited resources, and a lack …

Project Walk-Through: Beaver Multiplication Triples in Oblivious Transfer (OT)

Introduction We are delighted to introduce our group project: Beaver Multiplication Triples in Oblivious Transfer (OT). This project has been completed by A S M Nazimuddoullah and Fahim Uddin Very recently, the Bipartisan Senate AI Working Group pronounced substantially $32 billion per year being requisite [1] for AI safety research which pivots on privacy. A …