RSS feed source: National Science Foundation

Full Proposal Deadline(s) (due by 5 p.m. submitting organization’s local time):

August 25, 2025

Track 1

September 25, 2025

Track 2 (Submission of a Concept Outline by August 25th is required. See full text for additional information)

IMPORTANT INFORMATION AND REVISION NOTES

A Concept Outline (CO) is required for Track 2 only. PIs interested in responding to Track 2 of this solicitation must submit a Concept Outline to [email protected] by August 25, 2025 prior to submission of a proposal to aid in determining the appropriateness of the scope and work for consideration under this opportunity.

Any proposal submitted in response to this solicitation should be submitted in accordance with the NSF Proposal & Award Policies & Procedures Guide (PAPPG) that is in effect for the relevant due date to which the proposal is being submitted. The NSF PAPPG is regularly

Click this link to continue reading the article on the source website.

RSS feed source: National Science Foundation

Summary

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint advisory to disseminate known tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) associated with threat actors deploying the LummaC2 information stealer (infostealer) malware. LummaC2 malware is able to infiltrate victim computer networks and exfiltrate sensitive information, threatening vulnerable individuals’ and organizations’ computer networks across multiple U.S. critical infrastructure sectors. According to FBI information and trusted third-party reporting, this activity has been observed as recently as May 2025. The IOCs included in this advisory were associated with LummaC2 malware infections from November 2023 through May 2025.

The FBI and CISA encourage organizations to implement the recommendations in the Mitigations section of this advisory to reduce the likelihood and impact of LummaC2 malware.

Download the PDF version of this report:

AA25-141B Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations (PDF, 1.28 MB )

For a downloadable copy of IOCs, see:

AA25-141B STIX XML (XML, 146.54 KB ) AA25-141B STIX JSON (JSON, 300.90 KB ) Technical Details

Note: This advisory uses the MITRE ATT&CK® Matrix for Enterprise framework, version 17. See the MITRE ATT&CK Tactics and Techniques section of this advisory for threat actor activity mapped to MITRE ATT&CK

Click this link to continue reading the article on the source website.

RSS feed source: National Science Foundation

Job Description

Provides support for funded research projects. Education: Ph.D.

Department

Mechanical Engineering Operations

General Submission Guidelines: 

Please submit an online application to be considered a candidate for any job at Stevens. Please attach a cover letter and resume with each application. Other requirements for consideration may depend on the job. 

Still Have Questions? 

If you have any questions regarding your application, please contact [email protected]

Click this link to continue reading the article on the source website.