News Items

  • news

    Visible to the public "CISA Sponsors Hack the Building 2.0 Hospital Competition"

    The US Cybersecurity and Infrastructure Security Agency (CISA) and the National Centers of Academic Excellence in Cybersecurity (NCAE-C) have sponsored the Hack the Building 2.0: Hospital Edition competition at the Maryland Innovation and Security Institute (MISI) in Columbia, Maryland. The National Security Agency (NSA) manages the NCAE-C program in collaboration with CISA and the Federal Bureau of Investigation (FBI). Hack the Building 2.0 will include technical scenarios and cybersecurity kits comprised of real-world hardware and software, automation system technology, and connected medical devices. It aims to expand and strengthen the talent pool of future cybersecurity professionals in the healthcare industry. The competition invites student teams from NCAE-C-designated universities to compete in either an offensive or defensive capacity to develop skills in multiple cyber domains. This article continues to discuss the Hack the Building 2.0 competition.

    HSToday reports "CISA Sponsors Hack the Building 2.0 Hospital Competition"

  • news

    Visible to the public "Earth Lusca's New SprySOCKS Linux Backdoor Targets Government Entities"

    Earth Lusca, a threat actor with ties to China, has been observed targeting government organizations with a new Linux backdoor called SprySOCKS. Trend Micro first documented Earth Lusca in January 2022, detailing the adversary's attacks against public and private sector entities in Asia, Australia, Europe, and North America. Since 2021, the group has used spear-phishing and watering hole attacks to execute its cyber espionage schemes. Some of the group's activities overlap with another threat cluster tracked by Recorded Future as RedHotel. New findings suggest that Earth Lusca remains an active group, expanding its operations to target organizations worldwide in the first half of 2023. Foreign affairs, technology, and telecommunications-related government departments are primary targets. This article continues to discuss the China-linked threat Earth Lusca targeting government entities using a new Linux backdoor called SprySOCKS.

    THN reports "Earth Lusca's New SprySOCKS Linux Backdoor Targets Government Entities"

  • news

    Visible to the public "Companies Still Don't Know How to Handle Generative AI Risks"

    According to the Information Services Group (ISG), companies are actively pursuing practical applications of generative Artificial Intelligence (AI) technology while staying mindful of its risks. Eighty-five percent of companies surveyed by ISG believe investments in generative AI within the next two years are either important or critical. Rather than adopting a "blank slate" strategy, companies are requesting that their service providers apply generative AI to existing services, such as call center operations. Misinterpretation is one of the most significant concerns regarding generative AI. When generative AI cannot produce a correct response to a question, it begins to invent one through a process known as AI hallucination. This article continues to discuss key findings from the ISG State of Applied Generative AI Market report.

    Help Net Security reports "Companies Still Don't Know How to Handle Generative AI Risks"

  • news

    Visible to the public "'ShroudedSnooper' Backdoors Use Ultra-Stealth in Mideast Telecom Attacks"

    Two Middle Eastern telecommunications organizations were recently compromised by a potentially novel threat actor using two backdoors with new methods for covertly loading malicious shellcode onto a target system. Cisco Talos dubbed the intrusion set "ShroudedSnooper" because it could not link the activity to previously identified groups. ShroudedSnooper uses two backdoors, "HTTPSnoop" and "PipeSnoop," with advanced anti-detection mechanisms, such as masquerading as popular software products and infecting low-level Windows server components. Once implanted, they execute shellcode to give cyberattackers a persistent foothold in victims' networks, allowing them to move laterally, exfiltrate data, or release additional malware. This article continues to discuss findings regarding the ShroudedSnooper set of backdoors.

    Dark Reading reports "'ShroudedSnooper' Backdoors Use Ultra-Stealth in Mideast Telecom Attacks"

  • news

    Visible to the public "Threat Actor Claims Major TransUnion Data Breach"

    A notorious threat actor linked to previous big-name breaches has recently released several gigabytes of personal data stolen from credit agency TransUnion. According to security researchers at Vx-underground, an individual who goes by the moniker "USDoD" posted a 3GB database containing the personally identifiable information (PII) of 58,505 individuals. The researchers noted that the database appeared to be compromised on March 2, 2022. This leaked database has information on individuals all across the globe, including the Americas (North and South), as well as Europe. Among the PII taken are first and last names, internal TransUnion identifiers, passport information including place and date of birth, marital status, age, employer information, credit scores, and loan information.

    Infosecurity reports: "Threat Actor Claims Major TransUnion Data Breach"

  • news

    Visible to the public "Clorox Struggling to Recover From August Cyberattack"

    Clorox has recently admitted its operations are still experiencing significant disruption after the firm experienced a cyberattack a month ago. Clorox announced the attack on August 14, revealing it had observed unauthorized activity on some IT systems, which had to subsequently be taken offline while it remediated the incident. Although the company stated in an SEC filing yesterday that it "believes the unauthorized activity is contained," it warned of a significant impact to the business, as it was forced to revert to manual ordering and processing. Clorox admitted that it is operating at a lower rate of order processing and has recently begun to experience an elevated level of consumer product availability issues. Clorox noted that the attack had damaged portions of its IT infrastructure and caused "widescale disruption" to its operations. The company is repairing the infrastructure and is reintegrating the systems that were proactively taken offline. The company expects to begin the process of transitioning back to normal automated order processing the week of September 25. Clorox stated that it has already resumed production at the vast majority of its manufacturing sites and expects the ramp-up to full production to occur over time. However, at this time, the company cannot estimate how long it will take to resume fully normalized operations. Clorox is still working out the financial and business impact of the security breach, although it admitted that rising order processing delays and product outages mean that there will be a material impact on Q1 financial results.

    Infosecurity reports: "Clorox Struggling to Recover From August Cyberattack"

  • news

    Visible to the public "Microsoft AI Researchers Leak 38TB of Private Data"

    Microsoft has recently accidentally revealed a huge trove of sensitive internal information dating back over three years via a public GitHub repository. Security researchers at Wiz discovered the privacy snafu when they found the GitHub repository "robust-models-transfer" which belonged to Microsoft's AI research division. The researchers stated that although the repository was meant only to provide access to open-source code and AI models for image recognition, the Azure Storage URL was actually misconfigured to grant permissions on the entire account. The researchers noted that their scan shows that this account contained 38TB of additional data, including Microsoft employees' personal computer backups. The backups contained sensitive personal data, including passwords to Microsoft services, secret keys, and over 30,000 internal Microsoft Teams messages from 359 Microsoft employees. The researchers stated that in addition to the overly permissive access scope, the token was also misconfigured to allow "full control" permissions instead of read-only. This means that not only could an attacker view all the files in the storage account, but they could delete and overwrite existing files as well. The researchers stated that the problem appears to stem from Microsoft's use of a Shared Access Signature (SAS) token, a signed URL that grants users access to Azure Storage data. The original SAS token in this incident was first committed to GitHub in July 2020, with its expiry date updated in October 2021 to 30 years hence. After Wiz reported the incident, Microsoft invalidated the token and replaced it.

    Infosecurity reports: "Microsoft AI Researchers Leak 38TB of Private Data"

  • news

    Visible to the public "Unhooking Phishing Threats - The Detection of Phishing Attempts in Communications Systems"

    There is a new approach to combating phishing attacks to improve online security, reduce cybercrime against individuals and businesses, and prevent attacks against governments. Computer security systems are continuously challenged by the emergence of increasingly sophisticated phishing attacks, which may also use social engineering and malware. T. Kalaichelvi of the Panimalar Engineering College in Chennai, India, and colleagues have proposed a new technique for threat modeling capable of identifying and eliminating vulnerabilities that make a computer system more vulnerable to phishing attacks. The team's method uses the STRIDE threat design methodology, a powerful tool with a 96.3 percent detection rate for phishing web addresses. Individuals and organizations can use this work to combat the phishing threat. This article continues to discuss the study on detecting phishing attempts in communications systems.

    Inderscience reports "Unhooking Phishing Threats - The Detection of Phishing Attempts in Communications Systems"

  • news

    Visible to the public "A New and Inclusive Approach to Privacy Technology Is Needed to Keep Users Safe Online"

    The UK's Online Safety Bill (OSB) will introduce several new digital regulations and offenses, but uncertainties persist regarding the future of online safety. The government and the technology industry are debating over how to create privacy-by-design (PBD) technologies that protect the privacy of Internet users without compromising public safety or national security. Researchers with the Center for Emerging Technology and Security (CETaS), a research center based at the Alan Turing Institute, the UK's national data science and Artificial Intelligence (AI) institute, have been conducting studies that provide insights into how different stakeholders in this debate can collaborate to effect meaningful change. In a new report from CETaS, the team provides recommendations for promoting a more inclusive and productive approach to future PBD technologies, which incorporate data protection considerations into their designs. In doing so, the researchers expect to reduce the potential use of these tools in online threats such as cybercrime and disinformation, securing Internet users' safety and human rights. This article continues to discuss the need for a new approach to privacy technology.

    The Alan Turing Institute reports "A New and Inclusive Approach to Privacy Technology Is Needed to Keep Users Safe Online"

  • news

    Visible to the public "New Proposal Aims to Boost IoT Security With a Sticker"

    The Federal Communications Commission (FCC) has proposed a cybersecurity labeling program to protect smart device users. The new initiative encompasses Internet of Things (IoT) devices such as Wi-Fi routers, digital personal assistants, home security cameras, GPS trackers, medical devices, and other Internet-connected appliances. Although the underlying problem is real and devices are often found to lack adequate cybersecurity, many, including one of the FCC's commissioners, consider the proposed solution lightweight. This article continues to discuss the effort to boost IoT security.

    Cybernews reports "New Proposal Aims to Boost IoT Security With a Sticker"

  • news

    Visible to the public "German Spy Chief Warns of Cyberattacks Targeting Liquefied Natural Gas Terminals"

    Bruno Kahl, the head of Germany's foreign intelligence service, warned that state-sponsored hackers could target the country's Liquefied Natural Gas (LNG) terminals. Due to the Russian invasion of Ukraine in 2022, estimated to have reduced Germany's GDP by 2.5 percent because of its reliance on gas pipelined from Russia, the country chartered three new LNG terminals, with plans for future expansion. However, according to the spy chief, these new LNG landing facilities should be viewed as potential targets for future cyberattacks. This article continues to discuss state-sponsored hackers potentially targeting Germany's LNG terminals.

    The Record reports "German Spy Chief Warns of Cyberattacks Targeting Liquefied Natural Gas Terminals"

  • news

    Visible to the public "Clop Gang Stolen Data From Major North Carolina Hospitals"

    The Microsoft-owned healthcare technology company Nuance has disclosed that the Clop extortion gang stole personal data on major North Carolina hospitals as part of the Progress MOVEit Transfer campaign. Companies use MOVEit Transfer to securely transmit files via SFTP, SCP, and HTTP-based uploads. Microsoft credits the Clop ransomware group, also known as Lace Tempest, with exploiting a zero-day vulnerability in the MOVEit Transfer platform, tracked as CVE-2023-34362. In June, the Clop ransomware group claimed to have compromised hundreds of businesses worldwide by exploiting the MOVEit Transfer flaw. The group's victims also include Microsoft's Nuance healthcare technology subsidiary. This article continues to discuss the Clop gang being behind a series of cyber thefts at major North Carolina hospitals.

    Security Affairs reports "Clop Gang Stolen Data From Major North Carolina Hospitals"

  • news

    Visible to the public "California Settles With Google Over Location Privacy Practices for $93 Million"

    Google recently agreed to a $93 million settlement with the state of California over its location-privacy practices. The settlement follows a $391.5 million settlement with 40 states, reached in November 2022, to resolve an investigation into how the company tracked users' locations. The states' investigation was sparked by a 2018 Associated Press story, which found that Google continued to track people's location data even after they opted out of such tracking by disabling a feature the company called "location history." As part of the settlement, in which Google admitted no wrongdoing, Google also agreed to a number of restrictions, including providing more transparency about location tracking, disclosing to users that their location information may be used for ad personalization, and showing additional information to users when enabling location-related account settings.

    SecurityWeek reports: "California Settles With Google Over Location Privacy Practices for $93 Million"

  • news

    Visible to the public "Canadian Government Targeted With DDoS Attacks by Pro-Russia Group"

    The pro-Russian cybercrime group named NoName057(16) has recently been observed launching distributed denial-of-service (DDoS) attacks against Canadian organizations. Since March 2022, the threat actor, also known as NoName05716, 05716nnm, or Nnm05716, has been launching disruptive attacks supporting Russia's invasion of Ukraine. According to the Canadian Centre for Cyber Security, the group has targeted financial, government, military, media, supply, telecoms, and transportation organizations in Ukraine and NATO-associated targets, including the Czech Republic, Denmark, Estonia, Lithuania, Norway, and Poland. Since September 13, 2023, the Cyber Centre has been aware and responding to reports of several distributed denial of service (DDoS) campaigns targeting multiple levels within the Government of Canada, as well as the financial and transportation sector. The Cyber Centre noted that NoName057(16) uses a botnet to target the web servers of victim organizations and then boasts about its malicious activities. Canadian organizations are advised to review systems to identify potential DDoS activity, review and proactively implement DDoS protections, review the US CISA's guidance on mitigating DDoS attacks, improve internet gateways' monitoring and protections, isolate web-facing applications, and report NoName057(16)-suspected DDoS attacks to the Cyber Centre.

    SecurityWeek reports: "Canadian Government Targeted With DDoS Attacks by Pro-Russia Group"

  • news

    Visible to the public "Modeling Social Media Behaviors to Combat Misinformation"

    Social media manipulation is used to spread false narratives, influence democratic processes, and more. However, not everyone with whom you disagree on social media is a bot. Misinformation strategies have continued to evolve. Their detection has been a reactive process, with malicious actors always one step ahead. Alexander Nwala, an assistant professor of data science at William & Mary, seeks to proactively combat these forms of exploitation. With collaborators from the Indiana University Observatory on Social Media, he recently introduced BLOC, a universal language framework for modeling social media behaviors. According to Nwala, the purpose of this framework is not to target a particular behavior, but rather to provide a language that can describe behaviors. The sophistication of bots that emulate human actions has increased over time. Inauthentic coordinated behavior is a common form of deception, manifested by actions that may not appear suspicious at the level of the individual account, but are actually part of a strategy involving multiple accounts. However, not all coordinated or automated behavior is malicious. BLOC does not categorize "good" or "bad" activities, but it does provide researchers with a language to describe social media behaviors, thereby facilitating the identification of potentially malicious actions. This article continues to discuss the work aimed at addressing current and future forms of social media manipulation.

    The College of William & Mary reports "Modeling Social Media Behaviors to Combat Misinformation"

  • news

    Visible to the public "New AMBERSQUID Cryptojacking Operation Targets Uncommon AWS Services"

    A novel cloud-native cryptojacking operation has targeted Amazon Web Services (AWS) offerings such as AWS Amplify, AWS Fargate, and Amazon SageMaker to mine cryptocurrency. Sysdig has given the malicious cyber activity the codename AMBERSQUID. The AMBERSQUID operation exploited cloud services without triggering the AWS requirement for approval of additional resources, as would have been the case if they had only spammed EC2 instances, according to Alessandro Brucato, a security researcher at Sysdig. Targeting multiple services presents extra challenges, such as incident response, as finding and eliminating all miners in each exploited service is required. Sysdig reported discovering the campaign after analyzing 1.7 million Docker Hub images, attributing it with moderate confidence to Indonesian attackers based on the use of the Indonesian language in scripts and usernames. This article continues to discuss the new AMBERSQUID cryptojacking operation.

    THN reports "New AMBERSQUID Cryptojacking Operation Targets Uncommon AWS Services"

  • news

    Visible to the public "Microsoft Flushes Out 'Ncurses' Gremlins"

    The "ncurses" programming library contains multiple memory corruption vulnerabilities that allow attackers to target applications running in macOS, Linux, and FreeBSD. Microsoft researchers discovered the vulnerabilities in the library that provides Application Programming Interfaces (APIs) for text-based user interfaces and terminal applications. Researchers from the company's threat intelligence team described the vulnerabilities in a technical report as enabling data leaks, privilege escalation, and arbitrary code execution. After finding the vulnerabilities in the ncurses library, they teamed up with the library's maintainer, Thomas E. Dickey, and Apple to resolve the issues across platforms. Exploiting vulnerabilities in the ncurses library could significantly impact users, as attackers could perform malicious actions such as elevating privileges to execute code in the context of a targeted program and accessing and modifying valuable data and resources. This article continues to discuss the recently patched memory corruption vulnerabilities.

    Dark Reading reports "Microsoft Flushes Out 'Ncurses' Gremlins"

  • news

    Visible to the public "Pirated Software Likely Cause of Airbus Breach"

    According to security researchers at Hudson Rock, a major data breach at Airbus revealed earlier this week stemmed from a RedLine info-stealer likely hidden in a pirated copy of Microsoft software. The European aerospace giant said it has launched an investigation into the incident. The researchers stated that a threat actor known as "USDoD," claiming to work as part of the Ransomed ransomware group, posted the breached data to the BreachForums site. Personal information associated with 3200 Airbus vendors, such as Rockwell Collins and Thales Group, was apparently featured in the data dump, including names, addresses, phone numbers, and email addresses. The threat actor's claim that this had come from "employee access from a Turkish Airline" was confirmed by the researchers. The researchers stated that the computer belongs to an employee of Turkish Airlines and contains third-party login credential details for Airbus. The victim likely attempted to download a pirated version of the Microsoft .NET framework, as indicated in the malware path. The researchers noted that they consequently fell victim to a threat actor utilizing the commonly employed RedLine info-stealing family. Worryingly, USDoD has hinted that more victims in the aerospace industry may soon suffer the same fate, including US defense contractors Lockheed Martin and Raytheon.

    Infosecurity reports: "Pirated Software Likely Cause of Airbus Breach"

  • news

    Visible to the public "BlackCat Ransomware Hits Azure Storage With Sphynx Encryptor"

    The BlackCat (ALPHV) ransomware group encrypts Azure cloud storage using stolen Microsoft accounts and the recently discovered Sphynx encryptor. Sophos X-Ops incident responders found that the attackers used a new Sphynx variant with added support for using custom credentials. After gaining access to the Sophos Central account with a stolen One-Time Password (OTP), the attackers disabled Tamper Protection and modified security policies. These actions were possible after stealing the OTP from the victim's LastPass vault through the LastPass Chrome extension. They encrypted the Sophos customer's systems and Azure cloud storage and added the [.]zk09cvt extension to all locked files. In total, the ransomware operators were able to effectively encrypt 39 Azure Storage accounts. This article continues to discuss the BlackCat (ALPHV) ransomware gang using stolen Microsoft accounts and the Sphynx encryptor to encrypt targets' Azure cloud storage.

    Bleeping Computer reports "BlackCat Ransomware Hits Azure Storage With Sphynx Encryptor"

  • news

    Visible to the public "Kubernetes Vulnerability Allows RCE on Windows Endpoints"

    Three high-severity Kubernetes vulnerabilities, tracked as CVE-2023-3676, CVE-2023-3893, and CVE-2023-3955, could enable attackers to remotely execute code and take control of all Windows nodes in the Kubernetes cluster. The three flaws impact all Kubernetes versions before 1.28. The Kubernetes team released updated versions at the end of August. If administrators are unable to upgrade to a patched version, Akamai has provided alternative mitigation steps. This article continues to discuss the potential exploitation and impact of the three high-severity Kubernetes vulnerabilities.

    Help Net Security reports "Kubernetes Vulnerability Allows RCE on Windows Endpoints"

  • news

    Visible to the public "TikTok Fined $368m For Child Data Privacy Offenses"

    TikTok has recently been fined hundreds of millions of dollars after Ireland's data protection regulator found it infringed the GDPR with regards to its processing of child users' information. The Data Protection Commission (DPC) conducted a lengthy investigation into TikTok's processing of children's personal data between July 31, 2020 and December 31 2020. The Ireland DPC ruled that TikTok infringed Articles 5(1)(c), 5(1)(f), 24(1), 25(1), 25(2), 12(1), 13(1)(e) and 5(1)(a) of the GDPR. As a result, the reprimanded Chinese social media giant will not only be forced to pay a fine of $368m but must also bring its processing into compliance within three months.

    Infosecurity reports: "TikTok Fined $368m For Child Data Privacy Offenses"

  • news

    Visible to the public "Researchers Develop Adversarial Training Methods to Improve Machine Learning-Based Malware Detection Software"

    Machine Learning (ML) has changed how computer-related tasks are considered and performed. Its ability to identify patterns and process massive amounts of data lends itself to many applications. When it comes to malware detection, ML has streamlined a once daunting process, allowing antivirus software to detect potential attacks more efficiently and with a higher success rate. Antivirus software previously relied on knowledge of earlier attacks, comparing program code to a list of known malicious binaries to determine which programs may be harmful. ML currently uses behavioral and static artifacts to identify ever-evolving malware attacks, improving antivirus software's effectiveness. However, with new technology comes numerous unknowns, so it is the responsibility of researchers to identify potential vulnerabilities. Professor Lujo Bauer from Carnegie Mellon's Electrical and Computer Engineering and Software and Societal Systems departments noted that the first step is determining the threat model for some of the newest ML technologies, such as generative Artificial Intelligence (AI). Bauer and a team of researchers demonstrated that ML-based malware detectors can be fooled by creating variants of malicious binaries, known as adversarial examples. These are transformed in a way that preserves functionality in order to avoid detection. In their most recent paper, titled "Adversarial Training for Raw-Binary Malware Classifiers," researchers examine the effectiveness of using adversarial training methods to develop malware detection models that are more resistant to some cutting-edge attacks. To train these models, the authors of this study discovered a method to increase the efficiency and scalability of creating adversarial examples, thus making adversarial training practical. This article continues to discuss the adversarial training methods developed to improve ML-based malware detection software.

    CyLab reports "Researchers Develop Adversarial Training Methods to Improve Machine Learning-Based Malware Detection Software"

  • news

    Visible to the public "LSU Computer Science Professor Leading Project to Increase Security in Federated Learning"

    Federated learning has garnered attention for its potential to bolster privacy, security, and efficacy across multiple industries. This technique is sometimes subjected to "critical learning" to improve its quality and robustness. However, during these times, external actors have the opportunity to initiate precise and damaging attacks. To better understand these opportunities and attacks, Louisiana State University Computer Science Assistant Professor Hao Wang is collaborating with Assistant Professor Jian Li, from the Department of Computer Science at Stony Brook University, and Associate Professor Xu Yuan, from the Department of Computer and Information Sciences at the University of Delaware. Their work aims to deliver a prototype federated learning system with algorithms that detect critical learning periods and use attack/defense methods. According to Wang, a critical learning period is an inherent property of the training process of deep learning models. He adds that it could boost various attacks, including data-poisoning attacks and model-poisoning attacks. This article continues to discuss the project aimed at improving security in federated learning.

    Louisiana State University reports "LSU Computer Science Professor Leading Project to Increase Security in Federated Learning"

  • news

    Visible to the public "Cloud to Blame for Almost all Security Vulnerabilities"

    According to security researchers at Palo Alto Networks' Unit 42, four out of five (80.3%) security vulnerabilities observed in organizations across all sectors come from a cloud environment. In a newly published report, the researchers outlined the most common cloud security flaws, of which 60% come from web framework takeover (22.8%), remote access services (20.1%), and IT security and networking infrastructure (17.1%). The researchers noted that constant changes in cloud offerings significantly impact the end-users' exposure. The researchers found that over 45% of most organizations' high-risk, cloud-hosted exposures in a given month were observed on new services that hadn't been present on their organization's attack surface in the month prior. The researchers noted that this finding wouldn't be too concerning if cloud providers weren't so volatile. But they are: the researchers estimated that, on average, over 20% of externally accessible cloud services change monthly. This volatility is even more acute in the transport & logistics and insurance & financial sectors, where organizations must deal with 27% and 24% of cloud offerings evolving on a monthly basis.

    Infosecurity reports: "Cloud to Blame for Almost all Security Vulnerabilities"

  • news

    Visible to the public "ChatGPT Jailbreaking Forums Proliferate in Dark Web Communities"

    The weaponization of generative Artificial Intelligence (AI) tools, such as ChatGPT, is taking shape. In online communities, threat actors are collaborating on new methods to circumvent ChatGPT's ethics rules, also known as "jailbreaking." Hackers are building a network of new tools to exploit or create Large Language Models (LLMs) for malicious purposes. It appears that ChatGPT has sparked a frenzy among cybercriminal forums. Since December, hackers have been looking for new and inventive ways to maliciously manipulate ChatGPT and open-source LLMs. According to SlashNext, the result is a new but thriving LLM hacking community, with many creative prompts and a few AI-enabled pieces of malware worthy of further examination. This article continues to discuss cybercriminals bypassing ethical and safety restrictions to use generative AI chatbots in the way they want.

    Dark Reading reports "ChatGPT Jailbreaking Forums Proliferate in Dark Web Communities"

  • news

    Visible to the public "New 'MetaStealer' Malware Targets Intel-Based macOS Systems"

    MetaStealer, a new malware designed to steal information from Intel-based macOS computers, has been discovered in the wild. MetaStealer, not to be confused with the 'META' information stealer malware that gained popularity last year, is a Go-based malware capable of evading Apple's built-in antivirus technology XProtect. SentinelOne reports that it has been tracking the malware for the past few months and has observed a strange social engineering component in its distribution. Although the malware shares some similarities with Atomic Stealer, a Go-based macOS-targeting information stealer, the code overlap is limited, and the delivery methods differ. This article continues to discuss the MetaStealer malware that steals a wide variety of sensitive information from Intel-based macOS computers.

    Bleeping Computer reports "New 'MetaStealer' Malware Targets Intel-Based macOS Systems"

  • news

    Visible to the public "Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family"

    3AM is a new ransomware family that was detected in a single incident where an unidentified affiliate attempted to deliver LockBit, attributed to Bitwise Spider or Syrphid, to the target network but failed. According to the Symantec Threat Hunter Team, 3AM is written in Rust and appears to be a brand-new malware family. Before encrypting files, the ransomware tries to disable multiple services on the infected computer. Once encryption is complete, Volume Shadow (VSS) copies are deleted. The new ransomware family's name derives from its ransom note. It also appends the extension [.]threeamtime to encrypted files. However, it is currently unknown whether the malware authors have ties to known e-crime groups. In the attack identified by Symantec, the adversary reportedly launched the ransomware on three machines in the organization's network, but it was blocked on two of these machines. This article continues to discuss the new 3AM ransomware family.

    THN reports "Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family"

  • news

    Visible to the public "Microsoft Teams Phishing: Enterprises Targeted by Ransomware Access Broker"

    A threat actor known for providing ransomware groups with initial access to enterprise systems has used Microsoft Teams to phish employees. According to Microsoft threat researchers, Storm-0324 likely relies on the publicly available TeamsPhisher tool for this activity. Storm-0324 is a temporary name designated by Microsoft to this threat actor, suggesting that the company is still not highly confident about the origin or identity of the actor behind the operation. So far, it is known that Storm-0324 has been around for more than eight years and has previously used exploit kits and email-based vectors to deliver various malware payloads, including banking trojans, information-stealing malware, ransomware, and more. Microsoft reports that Storm-0324 began using phishing lures sent over Teams with malicious links, leading to a malicious SharePoint-hosted file in July 2023. However, they do not specify what malicious payload the file contained. They also noted that this particular phishing campaign is unrelated to a similar one conducted by a Russian Advanced Persistent Threat (APT) group. This article continues to discuss the threat actor phishing employees via Microsoft Teams.

    Help Net Security reports "Microsoft Teams Phishing: Enterprises Targeted by Ransomware Access Broker"

  • news

    Visible to the public "New Tool Skewers Socially Engineered Attack Ads"

    Online ads are often leveraged in personal cyberattacks, which can lead to the download of unwanted software and other malicious files. Researchers at the Georgia Institute of Technology are fighting deceptive online ads with an innovative solution designed to combat the growing threat of online social engineering attacks by eliminating them at their source. Trident, developed by Ph.D. student Zheng Yang and his team of researchers, is an add-on compatible with Google Chrome and has been shown to block these ads by nearly 100 percent. Yang noted that the objective is to identify suspicious ads that often lead users to malicious websites or activate unwanted software downloads. This article continues to discuss the solution developed by researchers at the Georgia Institute of Technology to address the rising threat of online social engineering attacks.

    Georgia Institute of Technology reports "New Tool Skewers Socially Engineered Attack Ads"

  • news

    Visible to the public "Researchers Used Wi-Fi Signals to See Through Walls. Game-Changing Breakthrough? Or Privacy Nightmare Waiting to Happen?"

    Using Wi-Fi signals, scientists have developed a technology that enables people to see objects and read letters through walls. The system, developed by UC Santa Barbara researchers, traces the edges of objects on the opposite side of solid barriers. In one experiment, the team used the technology to decipher the word "BELIEVE" from the other side of a wall by imaging each letter individually. Three off-the-shelf Wi-Fi transmitters were used to send wireless waves in an area. The receivers were on an unmanned vehicle emulating a Wi-Fi receiver grid as it moved. They measured the signal power, which was then used for imaging under the proposed method. However, the success of this strategy may raise significant privacy and security concerns. Cybercriminals could integrate this technology into an existing attack vector. This article continues to discuss the technology that enables seeing through walls, which could pose security and privacy issues.

    TechRadar reports "Researchers Used Wi-Fi Signals to See Through Walls. Game-Changing Breakthrough? Or Privacy Nightmare Waiting to Happen?"

  • news

    Visible to the public "Ransomware Gang Takes Credit for Disruptive MGM Resorts Cyberattack"

    A known ransomware gang has recently taken credit for the highly disruptive cyberattack on MGM Resorts, and the hospitality and entertainment giant has yet to restore many of the impacted systems. It is unknown how long the hackers had access to the company's systems, but the attack came to light on September 10, and the next day, MGM issued a statement saying it was forced to shut down many systems due to a cybersecurity issue. The incident has impacted MGM's website, casinos, and systems used for email, restaurant reservations, hotel bookings, and even digital hotel room keys. Security researchers at Vx-underground stated that the ransomware group named ALPHV (aka BlackCat), specifically one of its subgroups, has taken credit for the attack. The hackers told the researchers they gained initial access to MGM Resorts systems using social engineering. The researchers noted that from what they were told, all the ALPHV ransomware group did to compromise MGM Resorts was hop on LinkedIn, find an employee, and then call the Help Desk. The researchers noted that there is no mention of MGM on the ALPHV leak website, but victims are typically only named on the site when negotiations with the cybercriminals fail or stall. Other researchers at Reuters say they learned from sources that a threat group tracked as Scattered Spider is behind the attack on MGM. Scattered Spider, also known as 0ktapus and UNC3944, is described by cybersecurity researchers as an ALPHV ransomware affiliate. Scattered Spider, in the past, also hacked casino giant Caesars Entertainment, which has reportedly paid tens of millions of dollars to the cyber criminals. MGM has filed an 8-K form with the US Securities and Exchange Commission (SEC) regarding the cyberattack, which indicates that the incident may have a material impact on the company.

    SecurityWeek reports: "Ransomware Gang Takes Credit for Disruptive MGM Resorts Cyberattack"

  • news

    Visible to the public "NSA, US Federal Agencies Advise on Deepfake Threats"

    The National Security Agency (NSA) and US federal agency partners have issued new guidance regarding deepfakes. This emerging threat may pose a cybersecurity challenge for National Security Systems (NSS), the Department of Defense (DoD), and Defense Industrial Base (DIB) organizations. They issued the Cybersecurity Information Sheet (CSI) "Contextualizing Deepfake Threats to Organizations" to help organizations identify, defend against, and respond to deepfake threats. The CSI recommends that organizations consider implementing several technologies to detect deepfakes and identify the origin of multimedia. These include real-time verification capabilities, passive detection techniques, and protection for the communications of high-priority officers. The recommendations for mitigating the impact of deepfakes include information sharing, planning and rehearsing responses to exploitation attempts, and training personnel. This article continues to discuss the new guidance on deepfake threats.

    NSA reports "NSA, US Federal Agencies Advise on Deepfake Threats"

  • news

    Visible to the public "Playing Hide and Seek with a New Breed of Malware Threatening Millions of Users"

    Georgia Tech's Cyber Forensics Innovation (CyFI) Lab discovered that Web App Engaged (WAE) malware has increased by 226 percent since 2020. Therefore, the team created a tool that enables cybersecurity incident responders to purge almost 80 percent of discovered WAE malware by teaming up with service providers. Ph.D. student at Georgia Tech Mingxuan Yao noted that web applications have become integral to our online lives, providing services such as content delivery, data storage, and social networking, but these utilities have made web applications attractive for malware creators. WAE malware aims to exploit these applications, exposing users to many risks. This type of malware is deceptive, but not in the ways one would expect. Instead of compromising the security of web applications, this form of malware exploits them by disguising its malicious traffic as benign. Yao and his co-authors developed Marsea to automatically and thoroughly examine WAE malware. The tool identifies and separates abuse based on the identity and assets of a web application. This article continues to discuss WAE malware and the tool developed to combat it.

    Georgia Tech reports "Playing Hide and Seek with a New Breed of Malware Threatening Millions of Users"

  • news

    Visible to the public "3 Activities for Making Software Secure by Design"

    According to Carnegie Mellon University (CMU) Software Engineering Institute (SEI)'s Robert Schiela, technical manager of the Secure Coding group, and Carol Woody, a principal researcher in the SEI's Computer Emergency Response Team (CERT) Division, current efforts to build secure code and implement risk-mitigation security controls are useful but insufficient to address the cybersecurity challenges of modern technology. Functional design and engineering decisions can pose security risks. The longer security is overlooked, the greater the likelihood of costly mitigations, as redesigning may be necessary. Before approving the implementation of a system, security experts could review its design and mandate redesigns. Developers should identify and address vulnerabilities as they create and unit test their code. Creators and suppliers of technology must incorporate security risk management into their standard system design and engineering practices. Software, hardware, firmware, reused components, and services must all be considered when assessing security risk. Security risk considerations must be integrated throughout the lifecycle processes, which requires effective planning and tooling as well as monitoring and measuring. This article continues to discuss making software secure by design.

    Carnegie Mellon University Software Engineering Institute reports "3 Activities for Making Software Secure by Design"

  • news

    Visible to the public "Quantum-Safe Data Encryption"

    Quantum computers are expected to break current encryption methods due to their unique functioning. A competition started by the National Institute of Standards and Technology (NIST) seeks to change this by looking for algorithms that can withstand cyberattacks from quantum computers. However, it has become evident that developing suitable cryptographic schemes will be anything but easy. Two proposals from the Technical University of Munich (TUM) have been submitted to the NIST competition. Antonia Wachter-Zeh, a professor of Coding and Cryptography at TUM, has developed two algorithms based on digital signature schemes with her team, another research group at TUM, and researchers from Universita Politecnica delle Marche in Italy. The algorithms are based on error-correcting codes. This article continues to discuss the competition for new encryption technology and the algorithms submitted by Wachter-Zeh.

    The Technical University of Munich reports "Quantum-Safe Data Encryption"

  • news

    Visible to the public "An Empirical Investigation Into Organization Cyber Security Readiness From the IT Employee and Manager Perspectives"

    New research highlights the essential elements for bolstering cybersecurity readiness. This study examines five critical factors influencing organizations' cybersecurity readiness management, which include employee expertise, awareness, organizational investment, compliance with standards, and risk assessment. Researchers from the Information Science Department at Kuwait University present several essential organizational considerations. According to the researchers, inadequacies in the five areas will inevitably compromise the organization's cybersecurity readiness. This article continues to discuss the empirical investigation into organizations' cybersecurity readiness from the Information Technology (IT) employee and manager perspectives.

    Inderscience reports "An Empirical Investigation Into Organization Cyber Security Readiness From the IT Employee and Manager Perspectives"

  • news

    Visible to the public "NSA-Funded GenCyber Cybersecurity Summer Bootcamp Reveals Exciting Career Opportunities for Richmond-Area Students"

    At the Virginia Commonwealth University (VCU) College of Engineering's GenCyber Cybersecurity Summer Bootcamp, over 40 middle and high school students from the Richmond area learned about cybersecurity. The program is part of a nationwide initiative sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF). GenCyber aims to increase cybersecurity awareness and introduce K-12 students from Reserve Officers' Training Corps (JROTC) schools and underrepresented communities to career opportunities in cybersecurity. Students were introduced to topics such as social network privacy, online safety, HTML programming, Linux administration, Raspberry Pi device networking, basic hacking, defensive computer techniques, and basic digital forensics. In addition to increasing the number of underrepresented minorities in the cybersecurity industry, VCU Engineering's GenCyber program seeks to increase the number of women pursuing professions in cybersecurity.

    Virginia Commonwealth University reports "NSA-Funded GenCyber Cybersecurity Summer Bootcamp Reveals Exciting Career Opportunities for Richmond-Area Students"

  • news

    Visible to the public "API Security Doesn't Get the Priority Treatment It Needs"

    Traceable and Ponemon Institute's research calls for more attention on Application Programming Interface (API) security. While threats continue to increase, organizations do not assess their APIs nearly enough for vulnerabilities. Traceable warns of the inherent potential risk that comes with API use. In many cases, they control the traffic between critical services and sensitive data, significantly increasing the attack surface. The survey included 1,600 cybersecurity professionals from around the world, 938 of which were in the Europe, Africa, and the Middle East (EMEA) region. Fifty-nine percent of respondents acknowledged that APIs are critical to their organization's digital initiatives. The average number of APIs maintained by surveyed organizations is 1,044. Forty-three percent admitted that API security is not a priority despite its widespread use. This article continues to discuss key findings from the research on the state of API security.

    Techzine reports "API Security Doesn't Get the Priority Treatment It Needs"

  • news

    Visible to the public "75% of Education Sector Attacks Linked to Compromised Accounts"

    According to security researchers at Netwrix, 69% of organizations in the education sector suffered a cyberattack within the last 12 months. Phishing and user account compromise were the most common attack paths for these organizations, while phishing and malware (such as ransomware) topped the list for other verticals. The researchers noted that 3 out of 4 attacks (75%) in the education sector were associated with a compromised on-premises user or admin account, compared to 48% for other sectors. During their research, the researchers found that 16% of organizations estimated their financial damage from cyber threats to be at least $50,000. The researchers noted that more than half (59%) of organizations have a cyber insurance policy or plan to purchase one within 12 months. More than a quarter (28%) of organizations with cyber insurance changed their security approach to reduce their premium, and 22% had to improve their security posture to even be eligible for the policy.

    Help Net Security reports: "75% of Education Sector Attacks Linked to Compromised Accounts"

  • news

    Visible to the public "Lazarus Steals $41M From Virtual Betting Site"

    The FBI has revealed that the North Korean threat group Lazarus stole $41 million in cryptocurrencies from Stake[.]com, including Ethereum. According to the FBI, its investigation has found that North Korean cyber actors moved stolen funds associated with the Ethereum, Binance Smart Chain (BSC), and Polygon networks from Stake[.]com to virtual currency addresses. The FBI says this is not the first cryptocurrency heist pulled off by Lazarus. However, the FBI stopped short of attributing cyberattacks to the Lazarus threat group specifically, instead focusing on its parent country, North Korea. This article continues to discuss the theft of $41 million from the virtual betting site by Lazarus.

    Cybernews reports "Lazarus Steals $41M From Virtual Betting Site"

  • news

    Visible to the public "New Phishing Campaign Launched via Google Looker Studio"

    Security researchers at Check Point have observed threat actors using Google Looker Studio to create fake crypto pages that are then delivered to the intended victims in emails sent from the legitimate tool itself. The message contains a link to the fake report, claiming to provide the victim with information on investment strategies that would lead to significant returns. The researchers noted that the recipient is lured into clicking on the provided link, which redirects to a legitimate Google Looker page, hosting a Google slideshow claiming to provide instructions on how the recipient could receive more cryptocurrency. The victim is then taken to a login page where they are shown a warning that they need to log into their account immediately or risk losing access to it. This page, however, is designed to steal the provided credentials. The researcher's analysis shows that the attack manages to pass email authentication checks that prevent spoofing because the sender's IP address is listed as authorized for a google[.]com subdomain. Furthermore, it passes checks against the tampering with message contents in transit (DKIM) and DMARC protections because these verifications are automatically made for the domain google[.]com, which also leads to no action being taken if the checks fail. The researchers stated that an email security service will look at all these factors and have a good deal of confidence that it is not a phishing email and that it comes from Google. The researchers noted that while these protections will likely fail in this attack, the recipients' vigilance might save the day. The campaign has been ongoing for several weeks. The researchers informed Google of these attacks on August 22.

    SecurityWeek reports: "New Phishing Campaign Launched via Google Looker Studio"

  • news

    Visible to the public "Emsisoft Tells Users to Update Products, Reboot Systems Due to Certificate Mishap"

    Endpoint security firm Emsisoft urges its users to update their anti-malware and other security products and reboot their systems after using an improperly issued digital certificate to sign them. The company stated that the problem affects its Extended Validation (EV) code signing certificate, which was renewed on August 23 and used to sign all program files compiled after that date, including the latest software version, released on September 4. GlobalSign, the certificate authority (CA) that issued the certificate, informed Emsisoft on September 4 that it introduced the wrong business number at issuance, meaning the certificate would need to be revoked and reissued. The CA has issued a new certificate and is revoking the improperly issued one today, September 8. Emsisoft noted that it has re-signed all files using the correct certificate and has made updates available for its products. Emsisoft stated that the new files are available through the online update of their products, and they expect that the vast majority of their customers will automatically receive the new version before the old certificate gets revoked. The main issue with this mishap is the fact that the security firm also used the improperly issued certificate to sign a new driver component, and updating it requires a system reboot. Emsisoft noted that when a certificate authority revokes a certificate, all software files that have been signed with it will produce a security warning, and drivers may not load at all. This essentially breaks the protection, including the ability to run online updates. According to Emsisoft, should it come to this, users would need to reinstall the affected software to restore the protection. The company is urging its customers to ensure automatic updates are enabled in Emsisoft Anti-Malware, Emsisoft Business Security, and Emsisoft Enterprise Security and reboot their computers before September 22, 2023.

    SecurityWeek reports: "Emsisoft Tells Users to Update Products, Reboot Systems Due to Certificate Mishap"

  • news

    Visible to the public "Patch 'Em or Weep: Study Reveals Most Vulnerable IoT, Connected Assets"

    Armis, a company specializing in asset visibility and security, has identified the connected assets that pose the greatest threat to global enterprises. New research from Armis, based on an analysis from its Asset Intelligence Engine, focuses on connected assets with the highest number of attack attempts, weaponized common vulnerabilities, and more. The top ten asset types with the most attack attempts were distributed across Information Technology (IT), Operational Technology (OT), the Internet of Things (IoT), the Internet of Medical Things (IoMT), the Internet of Personal Things (PIoT), and Building Management Systems (BMS). According to Armis, the devices with the highest number of attack attempts were engineering workstations, imaging workstations, media players, Personal Computers (PCs), Virtual Machines (VMs), Uninterruptible Power Supply (UPS) devices, servers, media writers, tablets, and mobile phones. This article continues to discuss Armis' identification of the riskiest assets that introduce threats to global businesses.

    TechRepublic reports "Patch 'Em or Weep: Study Reveals Most Vulnerable IoT, Connected Assets"

  • news

    Visible to the public "Atomic macOS Stealer Malware Delivered via Malvertising Campaign"

    According to security researchers at Malwarebytes, a piece of malware named Atomic macOS Stealer, or AMOS, has been delivered by cyber criminals through a malvertising campaign. AMOS emerged in the spring when its creators started advertising it for $1,000 per month, promising a wide range of data theft capabilities. Its authors claimed the malware could steal keychain passwords, browser data, cryptocurrency wallets, and files from the compromised device. The researchers noted that AMOS is mostly distributed through cracked software downloads, but the company recently observed it being delivered through a malvertising campaign. The researchers stated that cybercriminals set up a fake website for the TradingView financial market tracking app and advertised the site on Google using a hacked advertiser account apparently belonging to an entity in Belarus. The malicious website is designed to look authentic, claiming to offer downloads for the TradingView app's Windows, macOS, and Linux versions. The researchers noted that while the Windows and Linux files deliver the NetSupport RAT, the Mac file delivers the AMOS malware. Once executed, the macOS malware provides instructions for opening it without getting blocked by Apple's GateKeeper security feature. The researchers stated that the malware is bundled in an ad-hoc signed app, meaning it's not an Apple certificate, so it cannot be revoked. Once executed, it will keep prompting for the user password in a never ending loop until victims finally relent and type it in. The researchers noted that logs show that the malware attempts to collect and exfiltrate passwords, autofill data, wallets, cookies, and keychain data. The researchers stated that targeting TradingView makes sense since users who are looking for the market tracking application are more likely to use software that provides access to money or cryptocurrencies.

    SecurityWeek reports: "Atomic macOS Stealer Malware Delivered via Malvertising Campaign"

  • news

    Visible to the public "North Korean Hackers Target Security Researchers With Zero-Day Exploit"

    Using a zero-day exploit, North Korean threat actors are attempting to compromise the machines of security researchers. The warning comes from Google's security researchers Clement Lecigne and Maddie Stone, who have described the government-backed attack campaign. The threat actors initially contacted the researchers via social media, such as X (formerly Twitter) or Mastodon, under the guise of security research collaboration. After moving the conversation to end-to-end encrypted instant messaging apps, including Signal, WhatsApp, and Wire, and establishing trust, they would deliver a malicious file containing a zero-day exploit. Lecigne and Stone note that, upon successful exploitation, the shellcode runs a series of anti-Virtual Machine (VM) checks and then sends the collected information along with a screenshot to an attacker-controlled command-and-control (C2) domain. The attackers also tried pointing the researchers towards a Windows tool named GetSymbol that downloads debugging symbols from Microsoft, Google, Mozilla, and Citrix symbol servers for reverse engineers, but can also download and execute arbitrary code from an attacker-controlled domain. This article continues to discuss North Korean hackers trying to compromise security researchers' machines with a zero-day exploit.

    Help Net Security reports "North Korean Hackers Target Security Researchers With Zero-Day Exploit"

  • news

    Visible to the public "Iranian Hackers Breach US Aviation Org via Zoho, Fortinet Bugs"

    The US Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the US Cyber Command (USCYBERCOM) published a joint advisory revealing that state-sponsored hacking groups exploited critical Zoho and Fortinet vulnerabilities to compromise a US aeronautical organization. The threat groups responsible for this breach have not yet been identified, but while the joint advisory did not attribute the attackers to a specific state, USCYBERCOM's press release connects them to Iranian exploitation efforts. CISA participated in the incident response between February and April and reported that the hacking groups had been inside the compromised aviation organization's network since at least January after hacking an Internet-exposed server running Zoho ManageEngine ServiceDesk Plus and a Fortinet firewall. This article continues to discuss key findings from the joint cybersecurity advisory on Iranian exploitation efforts that have impacted a US aeronautical organization.

    Bleeping Computer reports "Iranian Hackers Breach US Aviation Org via Zoho, Fortinet Bugs"

  • news

    Visible to the public "Weaponized Windows Installers Target Graphic Designers in Crypto Heist"

    A cryptocurrency-mining campaign targeting 3D modelers and graphic designers with malicious versions of a legitimate Windows installer tool has been ongoing since at least November 2021. According to a report by Cisco Talos Threat Researcher Chetan Raghuprasad, the campaign uses Advanced Installer, a tool for creating software packages, to hide malware in legitimate installers for software used by creative professionals, such as Adobe Illustrator, Autodesk 3ds Max, and SketchUp Pro. Through the Custom Action feature of the installer, attackers execute malicious scripts and drop multiple payloads, including the M3_Mini_Rat client stub backdoor, Ethereum cryptomining malware PhoenixMiner, and multi-coin mining threat lolMiner. This article continues to discuss attackers targeting 3D modelers and graphic designers with malicious versions of a legitimate Windows installer tool.

    Dark Reading reports "Weaponized Windows Installers Target Graphic Designers in Crypto Heist"

  • news

    Visible to the public "Apple Rushes to Patch Zero-Day Flaws Exploited for Pegasus Spyware on iPhones"

    Apple has released emergency security updates for iOS, iPadOS, macOS, and watchOS to patch two zero-day vulnerabilities exploited in the wild to deliver NSO Group's Pegasus mercenary spyware. The first vulnerability, tracked as CVE-2023-41061, is a validation issue in Wallet that could lead to arbitrary code execution when a maliciously crafted attachment is handled. The second vulnerability, tracked as CVE-2023-41064, is a buffer overflow issue in the Image I/O component that could lead to arbitrary code execution if a maliciously crafted image is processed. The Citizen Lab at the University of Toronto's Munk School disclosed that the vulnerabilities have been weaponized as part of a zero-click iMessage exploit chain dubbed BLASTPASS to launch Pegasus on fully patched iPhones running iOS 16.6. This article continues to discuss the zero-day flaws exploited to deliver NSO Group's Pegasus mercenary spyware.

    THN reports "Apple Rushes to Patch Zero-Day Flaws Exploited for Pegasus Spyware on iPhones"

  • news

    Visible to the public "Trustwave Releases New SpiderLabs Research Focused on Actionable Cybersecurity Intelligence for the Hospitality Industry"

    In a report titled "2023 Hospitality Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies," Trustwave shares research on the cybersecurity risks faced by the hospitality industry. Trustwave SpiderLabs has documented the attack flow used by threat groups, revealing their tactics, techniques, and procedures (TTPs). Persistent threats, such as brute force attacks, the exploitation of known vulnerabilities, and attacks on exposed open ports, pose significant risks to the hospitality industry. The hospitality industry, which includes hotels, restaurants, and cruise ships, has become ingrained in the daily lives of millions of people, making its cybersecurity threat landscape wide, complex, and critical. According to a report by Cornell University and FreedomPay, nearly 31 percent of hospitality organizations have reported a data breach in their company's history, 89 percent of which have been impacted more than once in a year. Although the average cost of a hospitality breach is lower than the average across all industries, the impact on reputation can have a significant negative effect on the bottom line due to the industry's highly competitive nature. This article continues to discuss key findings regarding the specific threats and risks that hospitality organizations face.

    Business Wire reports "Trustwave Releases New SpiderLabs Research Focused on Actionable Cybersecurity Intelligence for the Hospitality Industry"

  • news

    Visible to the public "Exposing Deepfake Imagery"

    Deepfakes, or images and videos created or altered by Artificial Intelligence (AI), are becoming increasingly sophisticated, causing widespread concern among scientists, journalists, and government officials. Rushit Dave, a computer scientist at Minnesota State University, Mankato, emphasizes that the threat of deepfakes goes beyond spreading fake videos. Attackers could create believable images of people that could deceive facial recognition systems and grant them access to people's cell phones and, ultimately, their private data. Dave calls on security experts to develop generalizable detection systems that can be installed on every phone to identify fake images. This article continues to discuss the concept of deepfakes, the potential impact of deepfakes on security, and efforts to create or improve upon deepfake detectors.

    SPIE reports "Exposing Deepfake Imagery"