Author: Vincent Fermo, GSAS '26

I am a Cybersecurity graduate student set to graduate from the Graduate School of Arts and Sciences at Lincoln Center in 2026.

AI

NIST, the National Institute of Standards and Technology, recently published an article that demonstrated how face morphing software is used to commit identity fraud. This software combines two photos of different people into a singular image. If given to the wrong hands, a bad actor could potentially bypass identity verification systems in secure locations such as airports or at country borders. These photos have the ability to deceive face recognition systems, misidentifying the image as both individuals, allowing an individual to pose as both the first and second individual. Face Analysis Technology Evaluation Morph NIST released Face Analysis Technology Evaluation…

Read More

Recently, three vulnerabilities were discovered that affected over 10,000 WordPress sites.  The vulnerabilities include Arbitrary File Upload, Arbitrary File Deletion, and Arbitrary File Move which could potentially allow unauthorized attackers to execute malicious code or access and delete important files.  The National Vulnerability Database has recorded these vulnerabilities and has provided each of them with a numerical score ranging from 0 (least critical) to 10 (most critical). You can find these and more from the National Institute of Standards and Technology website – nist.gov. The Vulnerabilities: CVE-2025-7340 (Score: 9.8 CRITICAL):  The HT Contact Form Widget For Elementor Page Builder & Gutenberg…

Read More