Attacks/Breaches

6/12/2018
09:55 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

US Cyber Challenge Kicks Off 2018 Camp Season at Virginia Tech

Aspiring cybersecurity talent will participate in competitions and intensive training.

Blacksburg, VA, June 11, 2018 – U.S. Cyber Challenge kicks off its 2018 boot camp season next week at Virginia Tech in Blacksburg, Virginia for the Eastern Regional Cyber Camp. Camp participants qualified for the program based on their scores from the Cyber Quest competition (www.CyberQuests.org) in April and will spend the week receiving intensive instruction by some of the nation’s leading cybersecurity experts. The camp begins next Monday, June 18th and ends Friday, June 22nd with a Capture-the-Flag (CTF) competition and Award Ceremony recognizing all camp participants and specifically the winners of the CTF competition. Friday’s competition will test both individual performance and team performance, and the winners will receive scholarships from (ISC)2 at the Award Ceremony immediately following the CTF.

“Each year, through our online competition Cyber Quests, USCC identifies the nation’s leading talent in cybersecurity,” stated National Director Karen S. Evans. “Our goal is to help these talented individuals strengthen their skill sets in information security and begin a path toward their dream career and securing our nation’s government and economy.”

Next week’s intensive classwork programming will include the following classes: Cybersecurity Program Analysis, Windows Memory Forensics, WebAppPenTest 2018, and Packet Crafting with Scapy. On Wednesday, June 20th, the camp will host an Executive Roundtable luncheon. This luncheon will foster conversation between seasoned professionals from various organizations and camp participants about the needs our country has today for talented individuals in cybersecurity and the hurdles employers face in both acquiring talent and retaining the talent. The Executive Roundtable is open to the media. For more information about the Eastern Regional camp, visit the webpage athttps://security.vt.edu/cyber_challenge.html.

The Eastern Regional camp is supported in part through partnerships with Amazon Web Services, the Association for Federal Information Resources Management (AFFIRM), Adaptive Cyber, Center for Cyber Safety & Education, Center for Internet Security, CenturyLink, Cyber Ninjas, Defense Point Security LLC, the Department of Homeland Security, the Federal CIO Council, (ISC)2, Monster Government Solutions, NIC, SANS Institute, and Sherman Consulting. Local sponsorship includes Virginia Tech’s Division of Information Technology.

The 2018 Cyber Summer Camp Series features four week-long camps located in Delaware, Illinois, Nevada and Virginia. In line with the mission of USCC’s parent organization, the Center for Internet Security (www.CISecurity.org), the camps are an integral part in the mission to identify and develop cybersecurity talent in order to reduce the nation’s cybersecurity workforce gap and safeguard private and public organizations from cyber threats. Participants in USCC programming are encouraged to continue developing their skills and network with like-minded individuals by becoming active members in CyberCompEx.org, an online social community specifically for cybersecurity enthusiasts. 

For more information about the Cyber Camp program and each of the specific camps, visit U.S. Cyber Challenge online at www.uscyberchallenge.org

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-13435
PUBLISHED: 2018-08-16
** DISPUTED ** An issue was discovered in the LINE jp.naver.line application 8.8.0 for iOS. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method to disable passcode authentication. NOTE: the vendor indicates that this is not an attack of interest w...
CVE-2018-13446
PUBLISHED: 2018-08-16
** DISPUTED ** An issue was discovered in the LINE jp.naver.line application 8.8.1 for Android. The Passcode feature allows authentication bypass via runtime manipulation that forces a certain method's return value to true. In other words, an attacker could authenticate with an arbitrary passcode. ...
CVE-2018-14567
PUBLISHED: 2018-08-16
libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.
CVE-2018-15122
PUBLISHED: 2018-08-16
An issue found in Progress Telerik JustAssembly through 2018.1.323.2 and JustDecompile through 2018.2.605.0 makes it possible to execute code by decompiling a compiled .NET object (such as DLL or EXE) with an embedded resource file by clicking on the resource.
CVE-2018-11509
PUBLISHED: 2018-08-16
ASUSTOR ADM 3.1.0.RFQ3 uses the same default root:admin username and password as it does for the NAS itself for applications that are installed from the online repository. This may allow an attacker to login and upload a webshell.