News Items

  • news

    Visible to the public "Open Redirect Flaws Increasingly Exploited by Phishers"

    According to Kroll's Cyber Threat Intelligence (CTI) team, phishing attacks involving the exploitation of open redirect flaws are increasing again. Therefore, organizations should consider retraining their employees on how to spot them. Open redirect vulnerabilities in web applications allow threat actors to manipulate legitimate URLs to redirect victims to a malicious external URL. George Glass, Kroll's Head of Threat Intelligence, explains that they occur when a website accepts user-supplied input as part of a URL parameter in a redirect link without proper validation or sanitization. Targets are likelier to trust the URL because its first part typically consists of a trustworthy, legitimate domain. Once a victim is redirected to a malicious website, threat actors can steal sensitive information, including login credentials, credit card information, and personal data. This article continues to discuss the rise in the use of open redirect flaws among phishers.

    Help Net Security reports "Open Redirect Flaws Increasingly Exploited by Phishers"

  • news

    Visible to the public "More Than Half of Browser Extensions Pose Security Risks"

    A new study found that many of the browser extensions organizations allow employees to use when working with Software-as-a-Service (SaaS) apps like Google Workspace and Microsoft 365 have access to high levels of content and pose risks such as data theft and compliance issues. Researchers at Spin.AI conducted a risk assessment on about 300,000 browser extensions and third-party OAuth applications used in enterprise environments. The focus was Chromium-based browser extensions for multiple browsers, including Chrome and Edge. The study revealed that 51 percent of all installed extensions posed a high risk and could cause extensive harm to the organizations that used them. The extensions could capture sensitive data from enterprise apps, execute malicious JavaScript, and send protected data, such as banking information and login credentials, to external parties. This article continues to discuss findings from Spin.AI's risk assessment of nearly 300,000 browser extensions.

    Dark Reading reports "More Than Half of Browser Extensions Pose Security Risks"

  • news

    Visible to the public "Using Quantum Computing to Protect AI From Attack"

    Machine Learning (ML)-based frameworks remain highly vulnerable to adversarial attacks, which involve malicious data tampering that causes them to fail in unexpected ways, despite their successes and increased adoption. A study by researchers at the University of Melbourne suggests that quantum ML models may be more resistant to adversarial attacks launched through classical computers. Identifying and exploiting the features an ML model uses is how adversarial attacks function. However, the features used by generic quantum ML models are inaccessible to classical computers and, therefore, hidden from an adversary equipped with only classical computing resources. According to the researchers, these concepts could also be used to detect adversarial attacks by using both classical and quantum networks. This article continues to discuss the potential protection of Artificial Intelligence (AI) from attacks using quantum computing.

    The University of Melbourne reports "Using Quantum Computing to Protect AI From Attack"

  • news

    Visible to the public "Cyber Fire Puzzles Presents Real-Life Cyber Security Challenges to Develop Students' Cyber Defense Skills"

    On August 19-20, nearly 60 students were presented with cybersecurity challenges through puzzles to develop skills essential to practitioners. Cyber Fire Puzzles is hosted by the Auburn University/Los Alamos National Laboratory (LANL) Cyber Security Sciences Institute (CSSI), the Auburn Cyber Research Center (ACRC), and the Auburn University Ethical Hacking Club (AUEHC). It helps prepare college students for future cyber defense workforce needs. Engineering, business, sciences, and mathematics participants worked in teams, discussed calculations, and solved code-cracking puzzles designed by LANL. Students were led through binaries and malicious programs, reconstructing the hierarchical file structure of hard drives and more. This article continues to discuss the Cyber Fire Puzzles event.

    Auburn University reports "Cyber Fire Puzzles Presents Real-Life Cyber Security Challenges to Develop Students' Cyber Defense Skills"

  • news

    Visible to the public "Crypto Botnet on X Is Powered by ChatGPT"

    In May of this year, researchers at Indiana University Bloomington discovered a ChatGPT-powered botnet operating on X, formerly known as Twitter. The researchers named the botnet Fox8 due to its connection to cryptocurrency websites with variations of the same name. According to the researchers, it consisted of 1,140 accounts, many of which appeared to use ChatGPT to compose and respond to social media posts. The auto-generated content seemed designed to entice unsuspecting humans to click on links leading to cryptocurrency-hyping websites. The researchers discovered the botnet by searching the platform for the phrase "As an AI language model...", which ChatGPT sometimes uses in response to prompts on sensitive topics. Then they manually examined accounts to determine which ones appeared to be operated by bots. This article continues to discuss findings and observations regarding the ChatGPT-powered botnet.

    Ars Technica reports "Crypto Botnet on X Is Powered by ChatGPT"

  • news

    Visible to the public "Critical Insight Report: 15% Drop in Breaches, 31% Surge in Victims"

    Critical Insight has recently unveiled its 2023 H1 Healthcare Data Breach Report, offering insights into the cybersecurity landscape of the healthcare sector. The researchers analyzed data breaches from healthcare organizations to the US Department of Health and Human Services (HHS). The researchers noted that there was an overall decrease of 15% in total breaches during the first half of 2023 compared to the latter half of 2022. The researchers stated that this suggests a potential downturn in breaches for the entire year, making 2023 the lowest breach count since 2019. However, the decline in breaches was counterbalanced by a significant 31% increase in the number of individuals affected by data breaches during H1 2023 compared to H2 2022. The researchers stated that this surge resulted in 40 million individuals being impacted within six months, equivalent to 74% of the total affected in 2022. Primary breach causes remain centered around hacking and IT incidents, contributing to 73% of breaches in H1 2023. Unauthorized access and disclosure followed as the second most prevalent type. Breaches due to theft, loss of records, and improper disposal remained relatively minimal. The researchers also saw a shift in hacker tactics toward exploiting network server vulnerabilities, responsible for 97% of the compromised individual records. In contrast, breaches stemming from email vulnerabilities constituted only 2%. Another noteworthy finding is the increased targeting of third-party business associates. Breaches involving business associates surpassed those impacting healthcare providers and health plans. Around 48% of compromised records were linked to business associates, compared to 43% associated with healthcare providers. Notably, 50% of individuals affected by breaches during H1 2023 were connected to a business associate.

    Infosecurity reports: "Critical Insight Report: 15% Drop in Breaches, 31% Surge in Victims"

  • news

    Visible to the public "HHS Launches Digital Health Security Project to Protect Healthcare Infrastructure"

    The Advanced Research Projects Agency for Health (ARPA-H), a division of the US Department of Health and Human Services (HHS), has announced the formation of the Digital Health Security (DIGIHEALS) project, which aims to protect the electronic infrastructure of the US healthcare system. ARPA-H is a funding agency supporting health and biomedical research. ARPA-H, established in 2022, funds research in various areas, focusing on solutions with the potential to advance areas of medicine and health that cannot be easily achieved through traditional research or commercial activity. The DIGIHEALS project is dedicated to developing technologies that ensure patients continue to receive care in the event of a widespread cyberattack against a medical facility. This article continues to discuss the DIGIHEALS project.

    HealthITSecurity reports "HHS Launches Digital Health Security Project to Protect Healthcare Infrastructure"

  • news

    Visible to the public "How to Stop Leaky Forms From Putting Ecommerce Customer Data at Risk"

    Compliance with data privacy regulations is an ongoing responsibility for online retailers, with most being vigilant in ensuring that their systems protect customers' information. Ultimately, no retailer wants to lose their customers' trust or be subject to penalties for noncompliance with the General Data Protection Regulation (GDPR) and other privacy regulations. However, some online shopping sites have been found to inadvertently expose customer data via third-party forms, some of which collect Personal Identifiable Information (PII) without user consent. There are things retail security teams must understand about "leaky forms" and how to implement security policies to safeguard customer data against this risk. This article continues to discuss the concept of a leaky form, potential consequences for consumers and retailers, and best practices for online form security.

    CPO Magazine reports "How to Stop Leaky Forms From Putting Ecommerce Customer Data at Risk"

  • news

    Visible to the public "US Military Targeted in Recent HiatusRAT Attack"

    According to security researchers at Lumen, a recent HiatusRAT campaign has been targeting a US military procurement system for reconnaissance. Initially observed at the beginning of the year, HiatusRAT has been targeting high-bandwidth routers typically used by medium-sized businesses, allowing attackers to run commands, exfiltrate data, and establish a covert proxy network. HiatusRAT has been active since at least June 2022, targeting organizations in Europe and Latin America, with at least 100 victims identified by March 2023. The researchers noted that following initial reporting on HiatusRAT, the threat actor changed tactics and, in attacks observed in June 2023, shifted focus to performing reconnaissance against a US military procurement system and to targeting Taiwan-based organizations. According to the researchers, the adversary continued the operation unhindered by the public exposure and recompiled their malware binaries for new architectures, including Arm, Intel 80386, and x86-64, hosting them on newly procured virtual private servers (VPSs). The researchers noted that one of these VPSs was used almost exclusively in attacks targeting Taiwanese entities, including a municipal government organization and various commercial firms, including semiconductor and chemical manufacturers. The researchers also identified a different VPS node being used to transfer data with a server that the US Department of Defense uses for contract proposals and submissions. The researchers noted that given that this website was associated with contract proposals, they suspect the threat actor could gather publicly available information about military requirements or search for organizations involved in the Defense Industrial Base (DIB).

    SecurityWeek reports: "US Military Targeted in Recent HiatusRAT Attack"

  • news

    Visible to the public "Australian Energy Software Firm Energy One Hit by Cyberattack"

    Energy One, an Australian company that provides software products and services to the energy sector, has recently been hit by a cyberattack. In a statement issued on Monday, the company said the incident was detected on August 18, impacting some corporate systems in Australia and the UK. Energy One is investigating the incident in an attempt to determine whether personal information and customer-facing systems have been impacted. The company is also working on determining the attacker's initial point of entry. The company noted that cybersecurity experts have been called in to assist with the investigation, and authorities in Australia and the UK have been notified. A recent report published by British threat intelligence company Searchlight Cyber showed that threat actors have been offering initial access into energy sector organizations worldwide for prices ranging between $20 and $2,500.

    SecurityWeek reports: "Australian Energy Software Firm Energy One Hit by Cyberattack"

  • news

    Visible to the public "Juniper Networks Fixes Flaws Leading To RCE in Firewalls and Switches"

    Juniper Networks has patched four vulnerabilities, tracked as CVE-2023-36844, CVE-2023-36845, CVE-2023-36846, and CVE-2023-36847, in Junos OS that, if chained, could enable Remote Code Execution (RCE) on the company's SRX firewalls and EX switches. Junos OS is an operating system based on Linux and FreeBSD that runs on firewalls, network switches, and other security devices offered by Juniper Networks. J-Web, a Graphical User Interface (GUI), is the component affected by the vulnerabilities. It is used to manage devices running Junos. Juniper noted that an unauthenticated, network-based attacker could remotely execute code on the devices by chaining exploits of these vulnerabilities. This article continues to discuss the potential exploitation and impact of the Junos OS vulnerabilities.

    Help Net Security reports "Juniper Networks Fixes Flaws Leading To RCE in Firewalls and Switches"

  • news

    Visible to the public "New Variant of XLoader macOS Malware Disguised as 'OfficeNote' Productivity App"

    A new variant of the macOS malware XLoader has emerged, masking its malicious capabilities with the office productivity app OfficeNote. The new version of XLoader is packaged within a standard Apple disk image named "OfficeNote[.]dmg," according to an analysis by SentinelOne security researchers. The contained application is signed with the developer signature "MAIT JAKHU (54YDV8NU9C)." XLoader, discovered in 2020, is considered Formbook's successor. It is an information stealer and keylogger distributed via the Malware-as-a-Service (MaaS) model. In July 2021, a macOS variant of the malware emerged, distributed as a Java program in the form of a compiled .JAR file. This article continues to discuss the new variant of the XLoader macOS malware.

    THN reports "New Variant of XLoader macOS Malware Disguised as 'OfficeNote' Productivity App"

  • news

    Visible to the public "Chinese APT Targets Hong Kong in Supply Chain Attack"

    Researchers have discovered that an emerging China-backed Advanced Persistent Threat (APT) group dubbed Carderbee targeted Hong Kong organizations in a supply chain attack involving legitimate software to deploy the PlugX/Korplug backdoor. The Symantec Threat Hunter Team disclosed that Carderbee used a compromised version of Cobra DocGuard, an application for protecting, encrypting, and decrypting software developed by the Chinese company EsafeNet, to get access to victims' networks. During the attack, the group used its PlugX installer malware signed with another legitimate entity, a Microsoft certificate. This article continues to discuss the Carderbee APT group targeting organizations in Hong Kong in a supply chain attack.

    Dark Reading reports "Chinese APT Targets Hong Kong in Supply Chain Attack"

  • news

    Visible to the public "TP-Link Smart Bulbs Can Let Hackers Steal Your Wi-Fi Password"

    Researchers from Universita di Catania and the University of London have discovered four vulnerabilities in the TP-Link Tapo L530E smart bulb and the TP-Link Tapo app that could enable attackers to steal the Wi-Fi password of their target. The TP-Link Tapo L530E smart bulb is a best-seller on multiple online marketplaces, including Amazon. TP-Link Tapo is an app for managing smart devices that has been downloaded 10 million times from Google Play. Their research aims to highlight security vulnerabilities in the billions of smart Internet of Things (IoT) devices used by consumers, many of which use risky data transmission and inadequate authentication safeguards. This article continues to discuss the vulnerabilities found in TP-Link smart bulbs that can allow attackers to steal Wi-Fi passwords.

    Bleeping Computer reports "TP-Link Smart Bulbs Can Let Hackers Steal Your Wi-Fi Password"

  • news

    Visible to the public "Spoofing an Apple Device and Tricking Users Into Sharing Sensitive Data"

    At the DEF CON hacker conference, white hat hackers demonstrated how to spoof an Apple device and deceive users into divulging sensitive information. Conference attendees who use iPhones saw pop-up messages prompting them to connect their Apple ID or share their password with a nearby Apple TV. The messages were part of a study conducted by security researcher Jae Bochs. According to Bochs, data was not collected during the experiment. He was sending out Bluetooth Low Energy (BLE) advertisement packets that do not require pairing. He used inexpensive equipment consisting of a Raspberry Pi Zero 2 W, two antennas, a Bluetooth adapter compatible with Linux, and a portable battery. This article continues to discuss the demonstrated spoofing of an Apple device that could trick users into sharing their sensitive data.

    Security Affairs reports "Spoofing an Apple Device and Tricking Users Into Sharing Sensitive Data"

  • news

    Visible to the public "Software Must Be Secure by Design, and Artificial Intelligence Is No Exception"

    In discussions about Artificial Intelligence (AI), the functioning of an AI system is often shrouded in mystery. However, the truth is much simpler as AI is a software system. According to the Cybersecurity and Infrastructure Security Agency's (CISA) Christine Lai, AI Security Lead, and Dr. Jonathan Spring, like any software system, AI must be designed with security in mind, thus requiring AI system manufacturers to consider customer security as a fundamental business requirement, not just a technical feature. They must also prioritize security throughout the entire product lifecycle. It also calls for AI systems to be secure out-of-the-box, requiring little to no configuration or additional cost. This article continues to discuss why AI is powerful, the importance of building AI software with security in mind, AI community risk management, and AI system assurance.

    CISA reports "Software Must Be Secure by Design, and Artificial Intelligence Is No Exception"

  • news

    Visible to the public "Thousands of Illicit Cyber Networks Disrupted in Africa Operation"

    INTERPOL and AFRIPOL coordinated an operation across 25 African countries that led to the arrest of 14 suspected cybercriminals and the identification of 20,674 suspicious cyber networks, underscoring the rise of digital insecurity and cyber threats in the region. The identified networks were linked to losses of over $40 million. The four-month Africa Cyber Surge II operation centered on identifying cybercriminals and compromised infrastructure. It facilitated communication, provided analysis, and shared intelligence between countries. Cooperation was streamlined between African law enforcement agencies through the operation in order to prevent, mitigate, investigate, and disrupt cyber extortion, phishing, Business Email Compromise (BEC), and more. This article continues to discuss highlights from the operation.

    HSToday reports "Thousands of Illicit Cyber Networks Disrupted in Africa Operation"

  • news

    Visible to the public "CISA Conducts Largest Annual Election Security Drills Amid Threats Targeting Voting Systems"

    The Cybersecurity and Infrastructure Security Agency (CISA) recently led the largest annual election security exercise in the US, collaborating with the Justice Department, the FBI, and other federal participants to strengthen voting systems in the US. According to CISA Director Jen Easterly, the exercise aimed to promote information sharing among federal, state, and local election officials and the protection of equipment and systems before the 2023 and 2024 elections. Local election workers encountered increased cyberattacks during the 2022 midterms, as the FBI warned that cybercriminals were targeting election systems and critical infrastructure. In recent years, CISA has launched several initiatives to strengthen election security and published election security tools and guidelines, such as a cybersecurity toolkit and additional resources to protect voting systems and election operations. This article continues to discuss the election security exercise in which CISA officials coordinated with federal, state, and local agencies to explore hypothetical cybersecurity scenarios that could affect election operations.

    NextGov reports "CISA Conducts Largest Annual Election Security Drills Amid Threats Targeting Voting Systems"

  • news

    Visible to the public "FBI, Air Force Warn of Cyberattacks on Space Industry by 'Foreign Intelligence Operations'"

    According to US intelligence agencies, unnamed Foreign Intelligence Entities (FIEs) are escalating cyberattacks against US-based space companies. The FBI, the National Counterintelligence and Security Center (NCSC), and the Air Force Office of Special Investigations (AFOSI) recently released an advisory warning of cyberattacks on the space industry. The agencies noted that FIEs recognize the significance of the commercial space industry to the US economy and national security, as well as the rising dependence of critical infrastructure on space-based assets. They consider the innovation and assets of the US in space as both potential threats and opportunities to acquire critical technologies and expertise. FIEs gain access to the US space industry through cyberattacks, strategic investments, and targeting key supply chain nodes, among other methods. This article continues to discuss the increase in cyberattacks on the US space industry by FIEs.

    The Record reports "FBI, Air Force Warn of Cyberattacks on Space Industry by 'Foreign Intelligence Operations'"

  • news

    Visible to the public "Ivanti Ships Urgent Patch for API Authentication Bypass Vulnerability"

    Ivanti's problems with security defects in its enterprise-facing products are starting to pile up. The IT software company recently shipped urgent patches for a critical-severity vulnerability in the Ivanti Sentry (formerly MobileIron Sentry) product and warned that hackers could exploit the issue to access sensitive API data and configurations. In an advisory, Ivanti said the vulnerability, tagged as CVE-2023-38035, affects Ivanti Sentry versions 9.18 and prior and could be exploited by malicious hackers to change configuration, run system commands, or write files onto the system. Ivanti noted that if exploited, this vulnerability enables an unauthenticated actor to access some sensitive APIs that are used to configure the Ivanti Sentry on the administrator portal (port 8443, commonly MICS). While the issue carries a 9.8/10 CVSS severity score, Ivanti noted that there is a low risk of exploitation for enterprise administrations who do not expose port 8443 to the internet. The company has recommended that customers restrict access to MICS to internal management networks and not expose this to the internet. Ivanti said it was "aware of a limited number of customers impacted by CVE-2023-38035," but it is unclear if the issue is being exploited as zero-day in the wild. Ivanti's security problems have escalated in recent months with the release of patches for critical flaws in the Avalanche Enterprise MDM Product line, in-the-wild exploitation of vulnerabilities in Ivanti EPMM, and documented APT activity targeting Ivanti zero-day flaws.

    SecurityWeek reports: "Ivanti Ships Urgent Patch for API Authentication Bypass Vulnerability"

  • news

    Visible to the public "Post-Quantum Cryptography: CISA, NIST, and NSA Recommend How to Prepare Now"

    The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and National Institute of Standards and Technology (NIST) issued a warning that cyber actors could target the US' most sensitive information now and use future quantum computing technology to break traditional cryptographic algorithms that are not quantum-resistant. This could be especially detrimental for sensitive data with long-term confidentiality requirements. The joint Cybersecurity Information Sheet (CSI), titled "Quantum-Readiness: Migration to Post-Quantum Cryptography," helps the Department of Defense (DoD), National Security System (NSS) owners, the Defense Industrial Base (DIB), and others in protecting the confidentiality, integrity, and authenticity of sensitive information. This article continues to discuss the CSI on migrating to post-quantum cryptography.

    NSA reports "Post-Quantum Cryptography: CISA, NIST, and NSA Recommend How to Prepare Now"

  • news

    Visible to the public "Unveiling the Risks of Routing Protocols"

    Routing protocols are essential to the functioning of the Internet and the services that rely on them. However, many of these protocols were created without security in mind. Initially, the Border Gateway Protocol (BGP) did not account for the possibility of peer-to-peer attacks. Origin and path validation in BGP has been the subject of considerable effort over the past decades, but disregarding the security of BGP implementations, especially message parsing, has led to multiple vulnerabilities that could be exploited for Denial-of-Service (DoS) attacks. There is a tendency to disregard security auditing due to the misconception that these types of vulnerabilities are less severe than origin and path validation issues. This article continues to discuss the creation of vulnerabilities by the neglect of routing protocol security.

    Dark Reading reports "Unveiling the Risks of Routing Protocols"

  • news

    Visible to the public "Japanese Watchmaker Seiko Breached by BlackCat Ransomware Gang"

    The BlackCat/ALPHV ransomware group has added Seiko to its leak website, claiming responsibility for a cyberattack disclosed by the Japanese company. Seiko is one of the largest and oldest watchmakers in the world, with around 12,000 employees and an annual revenue of more than $1.6 billion. On August 10, 2023, the company published a data breach notice revealing that an unauthorized third party accessed or exfiltrated data from at least a part of its Information Technology (IT) infrastructure. The BlackCat ransomware group claimed responsibility for the attack on Seiko, posting samples of the data stolen during the attack. In the listing, the threat actors leak what appear to be production plans, employee passport scans, new model release plans, and specialized lab test results. This article continues to discuss the cyberattack on Seiko and the BlackCat ransomware gang claiming to have been behind it.

    Bleeping Computer reports "Japanese Watchmaker Seiko Breached by BlackCat Ransomware Gang"

  • news

    Visible to the public "New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC"

    A high-severity security vulnerability has been found in the WinRAR utility, which a threat actor could exploit for Remote Code Execution (RCE) on Windows systems. The vulnerability, tracked as CVE-2023-40477 with a CVSS score of 7.8, stems from improper validation while processing recovery volumes. According to the Zero Day Initiative (ZDI), the vulnerability is caused by improper validation of user-supplied data, which can lead to memory access beyond the end of an allocated buffer. This vulnerability allows an attacker to execute code in the context of the current process. Successful exploitation of the vulnerability requires user interaction, as the target must be lured to a malicious website or tricked into opening a booby-trapped archive file. This article continues to discuss findings regarding the new WinRAR vulnerability.

    THN reports "New WinRAR Vulnerability Could Allow Hackers to Take Control of Your PC"

  • news

    Visible to the public "Organizations Invest in AI Tools to Elevate Email Security"

    According to IRONSCALES and Osterman Research, specialized email security vendors are leveraging a combination of Artificial Intelligence (AI) and human insights to improve email security and combat emergent threat methods enhanced by AI. The threat posed by AI-generated email attacks is expected to increase exponentially. More than 74 percent of respondents have witnessed an increase in the use of AI by cybercriminals over the past six months, and more than 85 percent believe that AI will be used to bypass their existing email security technologies. Seventy-seven percent of organizations now rank email security among their top three priorities, and almost all of the security leaders surveyed predict that AI will be moderately or extremely important to their future email defenses. This article continues to discuss cybercriminals using AI in email attacks, strengthening defenses with AI-enabled email security solutions, and organizations still relying on human insights for complementary protection.

    Help Net Security reports "Organizations Invest in AI Tools to Elevate Email Security"

  • news

    Visible to the public "Australian Lender Latitude Financial Reports AU$76 Million Cyberattack Costs"

    Australian financial services company Latitude Financial recently reported that the cyberattack disclosed earlier this year has cost it tens of millions of dollars. In a financial report covering the first half of 2023, the consumer lender reported roughly $50 million of pre-tax costs and provisions relating to the cyber incident. The company previously estimated a total cost of approximately $70 million. In addition, the company said in its financial report that the cyberattack has negatively impacted various aspects of the business. The company noted that the attack, which is believed to have been carried out by a ransomware group, has exposed information belonging to roughly 7.9 million people in Australia and New Zealand. The compromised information includes contact details, dates of birth, driver's license and passport numbers, driver's license and passport copies, account statements, and income and expense information such as bank account numbers and payment card numbers.

    SecurityWeek reports: "Australian Lender Latitude Financial Reports AU$76 Million Cyberattack Costs"

  • news

    Visible to the public "Tesla Discloses Data Breach Related to Whistleblower Leak"

    Tesla has recently disclosed a data breach impacting roughly 75,000 people, but the incident is the result of a whistleblower leak rather than a malicious cyberattack. Tesla recently told US authorities that a data breach discovered in May resulted in the exposure of the personal information, including social security numbers, of more than 75,700 individuals. A notification letter sent to impacted people reveals that the data breach is related to a couple of former employees sending confidential information to German media outlet Handelsblatt. Tesla said the ex-workers "misappropriated the information in violation of Tesla's IT security and data protection policies." The compromised information includes names, contact information, and employment-related records associated with current and former employees. Impacted individuals are being offered credit monitoring and identity protection services. The leak came to light in May when Handelsblatt reported that it had received 100 Gb of confidential Tesla data from a whistleblower. The leaked files, dubbed "Tesla Files," reportedly included information on more than 100,000 current and former employees, customer bank details, production secrets, and customer complaints regarding driver assistance systems. Handelsblatt has assured Tesla that it does not intend to publish the personal data provided by the whistleblower. Tesla stated that the chances of the exposed data being misused are slim, given the circumstances of the incident.

    SecurityWeek reports: "Tesla Discloses Data Breach Related to Whistleblower Leak"

  • news

    Visible to the public "Cuba Ransomware Group Steals Credentials Via Veeam Exploit"

    According to security researchers at BlackBerry, a notorious Russian-speaking ransomware group has updated its attack tooling to include a Veeam exploit designed to harvest logins. The researchers stated that their discovery came from investigations into attacks by the Cuba group on a US critical national infrastructure provider and a South American IT integrator. Now in its fourth year of operation, the group appears to be using a slightly tweaked set of tactics, techniques, and procedures (TTPs), blending old and new tools and methods. Among the new discoveries made by the researchers was Cuba's exploitation of CVE-2023-27532, which impacts Veeam Backup & Replication software and is being used to steal credentials from configuration files on the victim's device. The researchers noted that the exploit works by accessing an exposed API on a component of the Veeam application (Veeam.Backup.Service.exe). This vulnerability exists on any version of the Veeam Backup & Replication software prior to version 11a (build 11.0.1.1261 P20230227) and version 12 (build 12.0.0.1420 P20230223). The researchers noted that elsewhere, Cuba exploited a legacy flaw in Microsoft NetLogon (CVE-2020-1472) and used custom and off-the-shelf tools such as custom downloader BugHatch, a Metasploit DNS stager, host enumeration tool Wedgecut, BurntCigar malware, and numerous evasive techniques including Bring Your Own Vulnerable Driver (BYOVD). The researchers stated that initial access in these studied compromises came from an administrator-level login via Remote Desktop Protocol (RDP). The researchers noted that it is likely that the Cuba group bought this from an initial access broker (IAB) or achieved it via vulnerability exploitation.

    Infosecurity reports: "Cuba Ransomware Group Steals Credentials Via Veeam Exploit"

  • news

    Visible to the public "Research Hack Reveals Call Security Risk in Smartphones"

    Advanced smartphone features entice users who want more from their devices, especially in regard to health and entertainment, but the question is whether these features pose a security risk when making or receiving actual calls. A team of researchers from Texas A&M University and four other institutions developed malware to answer that question. The researchers' malware, dubbed EarSpy, uses Machine Learning (ML) algorithms to filter caller information from ear speaker vibration data recorded by an Android smartphone's motion sensors without evading protections or needing user permissions. This article continues to discuss the malware created by academic researchers that shows how call security can be compromised in three areas.

    Texas A&M University reports "Research Hack Reveals Call Security Risk in Smartphones"

  • news

    Visible to the public "Android Browsers Threaten User Privacy, Says Khoury-Led International Research Team"

    In a recent study titled "Not Your Average App: A Large-scale Privacy Analysis of Android Browsers," Amogh Pradeep, a doctoral student at Khoury College, and his multinational research team set out to examine the personal data collected by browsers and how to prevent such collection. After analyzing the largest dataset of these browsers ever compiled, the researchers discovered numerous Android browsers engaged in privacy-harming activities. Pradeep and his team analyzed 424 browsers, which included Google Chrome, UC Browser, Mozilla Firefox, and Opera. They conducted a series of experiments on each browser and hypothesized that the browsers were replacing or modifying content in ways that compromised user privacy. This article continues to discuss findings from the privacy analysis of Android browsers.

    Northeastern University reports "Android Browsers Threaten User Privacy, Says Khoury-Led International Research Team"

  • news

    Visible to the public "MRU Researchers Share Insights on How to Combat Hybrid-Cyber-Attacks"

    Due to their complexity, hybrid cyber threats are dangerous. Oftentimes, cyberattacks are accompanied by an information component designed to achieve specific objectives, such as misleading the public or convincing them of things favorable to the nation launching the attack. The cybersecurity experts and professionals, Dr. Darius Stitilis and Associate Professor Marius Laurinaitis from Mykolas Romeris University (MRU), along with Professor Matthew Warren, the Director of the Cyber Security Center at the Royal Melbourne Institute of Technology (RMIT) in Adelaide, Australia, are sharing their insights on new generation hybrid threats and the need to expand the application of the hybrid threat model developed within the European Union (EU) beyond its borders. This article continues to discuss insights on combating hybrid cyberattacks.

    Mykolas Romeris University reports "MRU Researchers Share Insights on How to Combat Hybrid-Cyber-Attacks"

  • news

    Visible to the public "Bug Hunter’s Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem"

    A team led by the University of Maryland received a distinguished paper award for examining the challenges encountered by bug bounty hunters or ethical hackers who discover and report vulnerabilities or bugs to a platform's developer. The paper, titled "Bug Hunter's Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem," provides insight into the obstacles faced by participants in bug bounty programs. When the ecosystem functions properly, bug bounties can enhance organizations' security posture at a low cost. According to the researchers, communication issues, such as unresponsiveness and disputes, are most likely to discourage bug hunters. They provide recommendations to make the bug bounties ecosystem more accommodating and increase participation in an underutilized market. This article continues to discuss the winning paper on challenges faced by bug bounty hunters and other papers presented at the 32nd USENIX Security Symposium.

    The University of Maryland reports "Bug Hunter's Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem"

  • news

    Visible to the public "Hackers Figured Out 3 separate Ways to Break Into US Air Force Satellites, And Won up to $50K For Doing it"

    Hackers recently managed to break into a US Air Force satellite in orbit and took home prizes of up to $50,000 for exposing the vulnerabilities. Italian team "mHACKeroni" were the winners of the US Space Force annual "Hack-A-Sat" competition, which took place at the hacker international conference DEF CON in Las Vegas on Friday and Saturday. The event was designed to figure out gaps in US cyber defenses before they can be exploited by rival states like Russia and China. For the first time, the hackers were asked to attack a real satellite in space, the US Air Force Moonlighter, which was deployed specifically for the event. Five teams were picked out of more than 700 applicants to strategically hack into the satellite. The participants aimed to break in and build a data link to the satellite while keeping competing teams out. The Italian team beat last year's winners, Poland-based "Poland Can Into Space." They came second and won $30,000, while the UK-US joint team "jmp fs:[rcx]" took $20,000 home. While the event had a decidedly fun-and-games tone to it, it reflects a serious and growing security threat. Satellite hacking can cause real geopolitics problems.

    Business Insider reports: "Hackers Figured Out 3 separate Ways to Break Into US Air Force Satellites, And Won up to $50K For Doing it"

  • news

    Visible to the public "Cisco Patches High-Severity Vulnerabilities in Enterprise Applications"

    Cisco recently announced security updates for several enterprise applications to patch high-severity vulnerabilities leading to privilege escalation, SQL injection, directory traversal, and denial-of-service (DoS). The most severe of these impacts the web management interface of Cisco Unified Communications Manager (Unified CM) and Unified Communications Manager Session Management Edition (Unified CM SME). The bug is tracked as CVE-2023-20211 (CVSS score of 8.1), and is described as an improper validation of user-supplied input that could allow a remote, authenticated attacker to perform an SQL injection attack. Cisco noted that an attacker could exploit this vulnerability by authenticating to the application as a user with read-only or higher privileges and sending crafted HTTP requests to an affected system. A successful exploit could allow the attacker to read or modify data in the underlying database or elevate their privileges. Cisco addressed the flaw with the release of Unified CM and Unified CM SME versions 12.5(1)SU8 and also released a patch file for version 14 of the applications. Cisco warned that proof-of-concept (PoC) exploit code targeting the vulnerability has been released. Cisco also announced patches for CVE-2023-20224, an elevation of privilege bug in the ThousandEyes Enterprise Agent, Virtual Appliance installation type. Also rooted in the insufficient input validation of user-supplied input, Cisco noted that the issue could allow an attacker to authenticate to an affected device via crafted commands. The attacker could then execute commands with root privileges. Cisco pointed out that the attacker must have valid credentials to exploit this vulnerability. The bug was addressed in ThousandEyes Enterprise Agent version 0.230. The article continues to talk about the other vulnerabilities Cisco patched.

    SecurityWeek reports: "Cisco Patches High-Severity Vulnerabilities in Enterprise Applications"

  • news

    Visible to the public "Bronze Starlight Targets the Southeast Asian Gambling Sector"

    SentinelOne observed Bronze Starlight, also known as APT10, Emperor Dragonfly, and Storm-0401, an Advanced Persistent Threat (APT) group with ties to China, targeting the Southeast Asian gambling sector. The malware and infrastructure used in the campaign are similar to those observed in Operation ChattyGoblin, which the security company ESET attributed to threat actors linked to China. According to SentinelOne, the threat actors used DLL hijacking of executables of Adobe Creative Cloud, Microsoft Edge, and McAfee VirusScan executables to launch Cobalt Strike beacons. Bronze Starlight is a nation-state group known for using ransomware as a distraction or misattribution technique. The perpetrators used modified chat application installers to download .NET malware loaders. The loaders then retrieve a second-stage payload contained in a password-protected ZIP archive from Alibaba buckets. This article continues to discuss the ongoing campaign attributed to China-linked Bronze Starlight targeting the Southeast Asian gambling sector.

    Security Affairs reports "Bronze Starlight Targets the Southeast Asian Gambling Sector"

  • news

    Visible to the public "Thousands of Android APKs Use Compression Trick to Thwart Analysis"

    Threat actors are increasingly distributing malicious Android APKs (packaged app installers) that can resist decompilation through unsupported, unknown, or highly adjusted compression algorithms. The main benefit of this strategy is evading detection by security tools using static analysis and impeding examination by researchers, thus delaying the discovery of how an Android malware strain works. Zimperium, a member of the 'App Defense Alliance' dedicated to identifying and removing malware from Google Play, analyzed the landscape of decompilation resistance in response to a tweet by Joe Security showcasing an APK that evades analysis but functions properly on Android devices. According to a new report by zLab, 3,300 APKs use these unusual anti-analysis techniques, which may cause many of them to crash. This article continues to discuss the compression trick used by thousands of Android APKs to avoid analysis.

    Bleeping Computer reports "Thousands of Android APKs Use Compression Trick to Thwart Analysis"

  • news

    Visible to the public "Jenkins Patches High-Severity Vulnerabilities in Multiple Plugins"

    Open source software development automation server Jenkins recently announced patches for high and medium severity vulnerabilities impacting multiple plugins. The patches address three high severity cross-site request forgery (CSRF) and cross-site scripting (XSS) issues in the Folders, Flaky Test Handler, and Shortcut Job plugins. Jenkins noted that the first bug, tracked as CVE-2023-40336, exists because no POST requests were required for an HTTP endpoint in version 6.846.v23698686f0f6 and earlier of the Folders plugin, leading to CSRF. This vulnerability allows attackers to copy an item, which could potentially automatically approve unsandboxed scripts and allow the execution of unsafe scripts. The second high severity bug, CVE-2023-40342, impacts Flaky Test Handler plugin versions 1.2.2 and earlier, which do not escape JUnit test contents when they are displayed in the Jenkins UI, allowing attackers to perform XSS attacks. Jenkins noted that Shortcut Job plugin versions 0.4 and earlier do not escape the shortcut redirection URL, leading to an XSS flaw tracked as CVE-2023-40346. Another high severity XSS flaw was identified in Docker Swarm plugin versions 1.11 and earlier, which do not escape values returned from Docker before they are inserted into the Docker Swarm Dashboard view. However, no patch was released for this bug. Jenkins also recently announced fixes for medium-severity vulnerabilities in the Folders, Config File Provider, NodeJS, Blue Ocean, Fortify, and Delphix plugins. According to Jenkins, these flaws could lead to information disclosure, credential leaks, CSRF attacks, HTML injection, and credential ID enumeration. Fixes were included in Blue Ocean version 1.27.5.1, Config File Provider version 953.v0432a_802e4d2, Delphix version 3.0.3, Flaky Test Handler version 1.2.3, Folders version 6.848.ve3b_fd7839a_81, Fortify version 22.2.39, NodeJS version 1.6.0.1, and Shortcut Job version 0.5. Additionally, Jenkins warned that no patches have been released for three medium severity flaws in the Maven Artifact ChoiceListProvider (Nexus), Gogs, and Favorite View plugins that could lead to credential exposure, information disclosure, and CSRF attacks.

    SecurityWeek reports: "Jenkins Patches High-Severity Vulnerabilities in Multiple Plugins"

  • news

    Visible to the public "New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools"

    Microsoft disclosed a new variant of the BlackCat ransomware, also known as ALPHV and Noberus, which incorporates tools such as Impacket and RemCom to facilitate lateral movement and Remote Code Execution (RCE). The Impacket tool has modules for credential dumping and remote service execution that could be used for widespread deployment of the BlackCat ransomware, according to the company's threat intelligence team. This version of BlackCat also includes the RemCom hacking tool for RCE. RemCom, an open-source alternative to PsExec, has been used by Chinese and Iranian nation-state threat actors such as Dalbit and Chafer to traverse victim environments. Redmond said it first observed the new variant in BlackCat affiliate attacks in July 2023. This article continues to discuss the new version of the BlackCat ransomware.

    THN reports "New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools"

  • news

    Visible to the public "Researchers Trick an iPhone Into Faking Airplane Mode"

    Researchers have discovered how to manipulate the iPhone's user interface to fake airplane mode while secretly maintaining Internet connectivity. Jamf Threat Labs detailed in a new report how the code controlling the different elements of iOS 16's airplane mode experience can be manipulated to simulate the real thing. They say that mobile device attackers could use this technique post-exploitation to enable 24/7 persistence without the user's knowledge. According to Jamf's vice president of portfolio strategy, Michael Covington, this is a different form of social engineering attack in which the user is duped into believing something that is false. This article continues to discuss the research on how mobile attackers could deceive iPhone users and provide the ideal cover for post-exploitation malicious activity.

    Dark Reading reports "Researchers Trick an iPhone Into Faking Airplane Mode"

  • news

    Visible to the public "Zimbra Users in Europe, Latin America Face Phishing Threat"

    Researchers at ESET have discovered a widespread phishing campaign designed to steal the credentials of Zimbra account holders. The collaborative software platform Zimbra Collaboration is a popular alternative to enterprise email solutions. At least since April 2023, the campaign has been active, targeting various small to medium-sized businesses (SMBs) and government entities. According to ESET telemetry, most targets are located in Poland, but there are also victims in other European countries, such as Ukraine, Italy, France, and the Netherlands. Latin American countries have also been impacted, with Ecuador topping the list of detections in that region. This article continues to discuss the mass-spreading phishing campaign targeting Zimbra users.

    Help Net Security reports "Zimbra Users in Europe, Latin America Face Phishing Threat"

  • news

    Visible to the public "North Korean Cybercriminals Have Already Stolen $200 Million in Crypto Hacks in 2023"

    According to security researchers at TRM Labs, North Korea has stolen around $200 million in cryptocurrencies across 30 hacks so far in 2023, less than in 2022 but still a sum "10 times larger than attacks by other actors." The researchers noted that although this year has witnessed a considerable downturn in crypto hacks, largely attributable to the decrease in digital asset prices and the ongoing bear market, many cybercriminal groups remain undeterred. North Korean state-affiliated hacking groups were one of the most prolific actors in 2022, a record-breaking year for hacks, with nearly $4 billion stolen. In June, the Wall Street Journal reported the nation had netted more than $3 billion over the last five years, with stolen digital currency funding about 50% of the country's ballistic missile program. The researchers at TRM Labs puts that figure at $2 billion. U.S. officials say the North Korean government relies on a workforce of thousands of IT workers operating worldwide, including in China and Russia, earning as much as $300,000 a year. Officials noted that the operations also rely on "front people" who will apply for jobs at crypto firms and then make small changes to products to allow them to be hacked or slip malicious code to employees at targeted companies. The researchers at TRM Labs stated that although the proceeds from North Korean crypto hacks are down around 75% so far in 2023 compared with last year, the country is still responsible for over 20% of all crypto stolen so far this year. The most lucrative hack in 2023 targeted a non-custodial wallet provider called Atomic Wallet.

    Forune reports: "North Korean Cybercriminals Have Already Stolen $200 Million in Crypto Hacks in 2023"

  • news

    Visible to the public "Federally Insured Credit Unions Required to Report Cyber Incidents Within 3 Days"

    The National Credit Union Administration (NCUA) recently announced that it is updating its cyberattack reporting rules, requiring all federally insured credit unions to report incidents within 72 hours of discovery. The new policy, NCUA announced, comes into effect on September 1 and will cover all incidents that impact information systems or the integrity, confidentiality, or availability of data on those systems. NCUA defines reportable incidents as those leading to network or system compromise following unauthorized access to or exposure of sensitive information or to the disruption of services or operational systems. The organization noted that incidents involving unauthorized tampering with information systems or erroneous exposure of sensitive data are also reportable. NCUA stated that credit unions will continue to rely on the previous reporting framework for incidents that do not trigger reporting under the new regulation but involve unauthorized access to user information.

    SecurityWeek reports: "Federally Insured Credit Unions Required to Report Cyber Incidents Within 3 Days"

  • news

    Visible to the public "Down the Tubes: Common PVC Pipes Can Hack Voice Identification Systems"

    Researchers are trying to keep up with hackers and prevent data theft. Some standard tools include multi-factor authentication (MFA) systems, fingerprint technology, and retinal scans. Automatic speaker identification, which uses a person's voice as a passcode, is a type of security system growing in popularity. These systems, already in place for phone banking and other applications, effectively detect digitally-manipulated attempts to fake a user's voice. However, digital security engineers at the University of Wisconsin-Madison have discovered that these systems are not as foolproof in the face of an innovative analog attack. They found that speaking through customized PVC pipes, commonly found in hardware stores, can trick Machine Learning (ML) algorithms supporting automatic speaker identification systems. This article continues to discuss the method of defeating automatic speaker identification systems using the type of PVC pipe found at any hardware store.

    The University of Wisconsin-Madison reports "Down the Tubes: Common PVC Pipes Can Hack Voice Identification Systems"

  • news

    Visible to the public "Alarming Lack of Cybersecurity Practices on World's Most Popular Websites"

    The Cybernews research team has explored an issue that developers often overlook: HTTP security headers. They analyzed the top 100 most-visited websites, such as PayPal, Wikipedia, and AliExpress. HTTP security headers provide instructions on how the browser should interact with the webpage. They help protect websites from attacks, such as clickjacking, and ensure secure connections. HTTP security headers are effective firewalls that can prevent the exploitation of many common vulnerabilities. These security headers are especially useful for client-side attacks, which aim to exploit security flaws on the user's device in order to gain unauthorized access, steal information, and perform other malicious activities. This article continues to discuss popular websites lacking security headers.

    Cybernews reports "Alarming Lack of Cybersecurity Practices on World's Most Popular Websites"

  • news

    Visible to the public "Play Ransomware Using MSPs and N-Days to Attack"

    Adlumin security researchers are warning of the Play ransomware group targeting security Managed Service Providers (MSPs) to gain initial access and exploit up to five-year-old security appliance vulnerabilities. According to Kevin O'Connor, director of threat research at Adlumin, it is a clever tactic to attack companies via their security vendor. Cyber defenders find it difficult to detect the attack because it initially masquerades as legitimate administrative access and grants attackers unrestricted access to the target's network and Infomation Technology (IT) assets. According to the security firm, the gang also uses intermittent encryption to avoid triggering defenses that check for entire file modifications. The latest campaign targets the financial, software, legal, and logistics industries in the US, Australia, the UK, and Italy. The Play ransomware group is responsible for cyberattacks on the city of Oakland, the Judiciary of Cordoba in Argentina, and more. TrendMicro reported that the group's activities are similar to those of the ransomware groups Hive and Nokoyawa, indicating a possible affiliation. This article continues to discuss the Play ransomware group's history and most recent campaign.

    BankInfoSecurity reports "Play Ransomware Using MSPs and N-Days to Attack"

  • news

    Visible to the public "Federal Agency Investigating Dallas Ransomware Attack, Number Impacted up to 30,253"

    The U.S. Department of Health and Human Services recently announced that it is investigating Dallas' ransomware attack from earlier this year. The city reported the data breach to the agency earlier this month, saying personal information from 30,253 people through Dallas' self-insured group health plans were exposed during the breach, which started April 7 but wasn't detected by the city until May 3. The number of individuals affected recently reported is higher than the 26,212 people the city reported earlier this month as being affected by the cyberattack to the state attorney general's office. City officials still haven't publicly disclosed all the departments where information was possibly stolen and several other key details of the data breach, such as how it happened. The city has sent around 27,000 letters to mostly employees, retirees, and their relatives giving notice that their names, home addresses, social security numbers, date of birth, medical diagnoses, and other information were exposed to hackers, and offering two years of free credit monitoring and identity theft insurance.

    Dallas Morning News reports: "Federal Agency Investigating Dallas Ransomware Attack, Number Impacted up to 30,253"

  • news

    Visible to the public "GridTrust Helps Protect the Nation's Electric Utilities from Cyber Threats"

    A new cybersecurity technology that relies on the unique digital fingerprint of a semiconductor chip could help defend the equipment of electrical utilities from malicious attacks in which software updates are exploited on devices controlling critical infrastructure. The GridTrust project, successfully tested in a US municipal power system substation, combines the digital fingerprint with cryptographic technology to enhance security for utilities and other critical industrial systems that must update control device software or firmware. The project was led by researchers at the Georgia Institute of Technology (Georgia Tech) in collaboration with the City of Marietta, Georgia. It was supported by the US Department of Energy's Office of Cybersecurity, Energy Security, and Emergency Response (CESER). Researchers from Sandia National Laboratories and Protect Our Power, a security-focused not-for-profit organization, also contributed to the project. This article continues to discuss the GridTrust project.

    Georgia Tech reports "GridTrust Helps Protect the Nation's Electric Utilities from Cyber Threats"

  • news

    Visible to the public "New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking Activities"

    A new, financially motivated operation named LABRAT has been exploiting a now-patched critical vulnerability in GitLab to conduct cryptojacking and proxyjacking. According to Sysdig, the attacker used undetected signature-based tools, sophisticated cross-platform malware, command-and-control (C2) tools that bypass firewalls, and kernel-based rootkits to hide their presence. In addition, the attacker used TryCloudflare to cover their C2 network. Proxyjacking enables the attacker to rent out the compromised host to a proxy network, monetizing the unused bandwidth. In contrast, cryptojacking refers to abusing system resources for cryptocurrency mining. A notable aspect of the campaign is the use of compiled binaries written in Go and .NET to avoid detection, with LABRAT also providing backdoor access to infected systems. This may pave the way for a follow-on attack, data theft, or ransomware. This article continues to discuss the LABRAT campaign.

    THN reports "New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking Activities"

  • news

    Visible to the public "Massive 400,000 Proxy Botnet Built With Stealthy Malware Infections"

    Researchers have discovered an extensive campaign that distributed proxy server apps to at least 400,000 Windows systems. The devices function as residential exit nodes without the users' permission. A company is charging for the proxy traffic running through the systems. Residential proxies are advantageous to cybercriminals because they facilitate the deployment of massive credential stuffing attacks from new IP addresses. Additionally, they serve legitimate functions such as ad verification, data scraping, website testing, and privacy-enhancing rerouting. Some proxy companies sell access to residential proxies and offer monetary incentives to users who agree to share their bandwidth. This article continues to discuss findings and observations regarding the 400,000 proxy botnet.

    Bleeping Computer reports "Massive 400,000 Proxy Botnet Built With Stealthy Malware Infections"

  • news

    Visible to the public "Passwordless Is More Than a Buzzword Among Cybersecurity Pros"

    Even though cybersecurity strategies are moving toward a passwordless future, password security remains critical. Fifty-four percent of the 100 Black Hat USA 2023 attendees surveyed by Delinea deemed passwordless a viable concept, while 79 percent agreed that passwords are evolving or becoming obsolete. When asked how they protect their passwords, most said they use an additional authentication method to protect their credentials and identity. Seventy-three percent of respondents use some form of multi-factor authentication (MFA), 57 percent specifically reported using an authenticator app, and 40 percent use biometrics. Fifty-two percent use a password manager, while 34 percent use a Privileged Access Management (PAM) solution to securely store credentials. Twenty-one percent reported using passkeys in place of or in addition to passwords. This article continues to discuss the concept and perceptions of passwordless security.

    Help Net Security reports "Passwordless Is More Than a Buzzword Among Cybersecurity Pros"