About this newsletter
SACC-CCSIT-IAU
is
a
digital
newsletter
provides
an
effective
electronic
communication
channel
for
cybersecurity
experts
and
the
public.
It
raises
awareness
about
cyberattacks
and
how
to
stay
safe
in
the
cyber
world.
It
also
publishes
current
news
about
cybersecurity,
the
achievements
of
cybersecurity
students
at
the
College
of
Computer
Science
and
Information
Technology,
and
recent
research
publications
for
faculty
and
students.
|
|
News & Past Events
Aramco
Collaborated
with
IAU
to
Conduct
a
Two-Days
Cybersecurity
Workshop:
The
information
Protection
Department
(IPD)
collaborates
with
the
College
of
Computer
&
Information
Technology
(CCIT)
to
faciliate
a
2-days
cybersecurity
workshop
about
the
“Quantum
Era
&
Post-Quantum
Cryptography”.
IPD
employees
Abdulelah
S.
Alghamdi
and
Abdullah
T.
Alessa
from
Cryptography
Solutions
joined
forces
with
the
college
to
deliver
these
sessions.
The
1st
session
is
dedicated
to
exploring
the
advancements
in
quantum
computing
technology,
whereas
the
2nd
day
delves
into
the
cybersecurity
implications
of
the
post-quantum
era,
while
those
sessions
are
part
of
the
curriculum
and
integral
to
the
students’
forthcoming
examinations.
One
of
the
cybersecurity
chair
objectives
is
to
bridge
the
gap
between
academia
and
the
industry,
it
emphasizes
the
initiative’s
influence
on
academic
programs
and
introduces
real-word
business
challenges
to
university
students.
The
Aramco
Cybersecurity
Chair
initiative’s
partnership
with
IAU
is
designed
to
foster
ongoing
community
engagement
that
transcends
corporate
confines,
focusing
on
nurturing
future
graduates
who
will
enter
the
industry.
Aramco
Information
Protection
Department
Director
to
Participate
in
the
6th
National
Conference
for
Computer
Colleges:
Under
the
patronage
of
his
excellency
professor
Dr.
Abdullah
Al-Rubaish,
President
of
Imam
Abdulrahman
bin
Faisal
University.
The
College
of
Computer
&
Information
Technology
is
hosting
the
6th
National
Conference
for
Computer
Colleges
on
May
8-9,
2024.
Aramco
Information
Protection
Department
(IPD)
Director,
Omar
Y.
Al-Thukair
is
participating
in
a
panel
discussion
title
“The
role
of
computing
colleges
in
fostering
education
quality
for
human
development”,
where
he
will
be
shedding
lights
about
the
cybersecurity
chair’s
efforts
into
enhancing
curriculums,
and
how
can
the
private
sector
contributes
into
elevating
the
academic
programs
through
the
participation
as
a
member
of
advisory
committee.
D&IT
Hosted
Demonstration
Session
of
Yokogawa
SCADA
Systems
for
IAU
Senior
Students:
As
part
of
IPD’s
Cybersecurity
Chair
ongoing
efforts
to
make
an
impact
in
OT
Cybersecurity
domain,
IPD
in
collaboration
with
Yokogawa,
has
successfully
conducted
a
demonstration
session
to
enrich
the
knowledge
of
Imam
Abdulrahman
University
(IAU)
senior
students
about
Supervisory
Control
and
Data
Acquisition
(SCADA)
system
and
the
cyber
threats
related
to
it.
The
session
was
attended
by
two
groups
of
IAU
students
who
are
conducting
cybersecurity
capstone
projects
related
to
anomaly
and
intrusion
detection
within
SCADA
environment.
The
session
introduced
to
students
the
current
industrial
challenges
that
they
need
to
consider
as
part
of
their
capstone
projects
and
emphasized
in
the
need
for
their
innovation
to
play
a
pivotal
role
in
combating
OT
cyber
threats.
Abstract:
In
the
rapidly
evolving
landscape
of
technology,
a
groundbreaking
synergy
between
advanced
artificial
intelligence
and
cybersecurity
is
emerging,
paving
new
avenues
for
innovation
and
protection.
As
we
find
ourselves
on
the
cusp
of
a
new
digital
epoch,
the
advent
of
generative
AI
has
risen
as
a
foundational
pillar
of
innovation,
instigating
profound
changes
across
myriad
industries.
This
raises
a
critical
inquiry:
What
precisely
is
generative
AI,
and
why
is
its
role
so
vital,
especially
in
the
realm
of
cybersecurity?
Generative
AI
is
a
specialized
subset
of
artificial
intelligence
technologies
with
the
capability
to
produce
content
ranging
from
text
and
images
to
code
and
beyond.
It
harnesses
extensive
datasets
to
discern
patterns,
structures,
and
the
core
essence
of
the
input,
enabling
it
to
generate
new,
original
outputs
that
closely
replicate
the
learned
material.
This
process
extends
beyond
mere
creation—it
encompasses
understanding,
predicting,
and
innovating.
In
an
era
where
data
reigns
supreme,
generative
AI
introduces
an
unprecedented
level
of
intelligence
and
flexibility.
The
significance
of
generative
AI
extends
well
beyond
its
novelty;
it
signifies
a
shift
in
the
paradigms
of
problem-solving,
creativity,
and
decision-making.
Within
the
cybersecurity
domain,
this
shift
presents
both
opportunities
and
challenges.
Cyber
threats
are
becoming
increasingly
sophisticated
and
unpredictable
at
an
alarming
rate.
While
traditional
cybersecurity
measures
remain
indispensable,
there
is
a
pressing
need
for
these
systems
to
evolve
in
order
to
effectively
counter
these
advanced
threats.
Herein
lies
the
potential
of
generative
AI
to
revolutionize
cybersecurity
strategies.
The
integration
of
generative
AI
into
cybersecurity
systems
is
imperative,
not
merely
optional.
It
possesses
the
ability
to
simulate
cyber-attacks,
foresee
potential
threat
vectors,
and
forge
stronger
defense
mechanisms.
Additionally,
it
can
facilitate
the
automation
of
responses
to
security
incidents,
significantly
reducing
the
time
from
detection
to
resolution.
Nonetheless,
leveraging
this
technology
necessitates
a
thorough
comprehension
of
its
capabilities,
limitations,
and
the
ethical
considerations
it
entails.
Throughout
this
conference,
we
will
delve
into
the
core
principles
of
generative
AI,
its
pivotal
role
in
the
digital
world,
and,
most
importantly,
how
it
can
be
utilized
to
reinforce
our
cybersecurity
infrastructures.
Our
exploration
will
encompass
the
technical
nuances,
practical
applications,
and
forward-looking
perspectives
on
a
future
where
cybersecurity
is
not
merely
reactive
but
is
predictive
and
adaptive,
courtesy
of
the
power
of
generative
AI.
We
invite
you
to
join
us
on
this
exhilarating
journey
as
we
navigate
towards
shaping
the
future
of
cybersecurity
in
an
AI-dominated
era.
|
|
|
Top
Cybersecurity
News
from
Around
the
world
|
|
|
Proof-of-Concept
Exploit
Released
for
Progress
Software
OpenEdge
Vulnerability.
|
|
Hackers
exploited
WordPress
Popup
Builder
plugin
flaw
to
compromise
3,300
sites.
|
|
|
Dropbox
Abused
in
New
Phishing,
Malspam
Scam
to
Steal
SaaS
Logins.
|
|
Magnet
Goblin
Hacker
Group
Leveraging
1-Day
Exploits
to
Deploy
Nerbian
RAT.
|
|
|
Articles
Written
by
IAU
Students
|
|
|
|
By
Sarah
Albassam,
Khadijah
Alamoudi,
and
Razan
Sharaf.
|
Steganography:
The
Art
of
Hiding
Data
|
Over
the
years,
it
has
been
difficult
to
deliver
messages
only
to
the
intended
recipient
as
the
messages
were
at
risk
of
being
stolen
or
read
by
unauthorized
people.
|
|
|
|
|
Copyright
©
2022
Saudi
Aramco
Cybersecurity
Chair
at
IAU,
All
rights
reserved.
Dammam
31451 Kingdom
of
Saudi
Arabia
Tel: +
966
13
333-2003
|
|
|
|