News Items

  • news

    Visible to the public "Banking Sector Targeted in Open-Source Software Supply Chain Attacks"

    Researchers have found what they say are the first open source software supply chain attacks that specifically target the banking sector. Checkmarx noted that these attacks exhibited sophisticated techniques, including targeting specific components in the victim bank's web assets by attaching malicious functionalities. In order to appear credible, the attackers created a fake LinkedIn profile and customized command-and-control (C2) centers for each target, exploiting legitimate services for malicious activities. The npm packages have been reported and taken down. In the first attack, the malware author posed as an employee of the target bank and uploaded packages to the npm registry in early April 2023. The modules included a preinstall script for activating the infection sequence. When launched, the script determined the host operating system and downloaded a second-stage malware from a remote server by using a subdomain on Azure that contained the name of the bank. Checkmarx researchers say the perpetrator used Azure's CDN subdomains to effectively deliver the second-stage payload. Due to Azure's status as a legitimate service, this tactic is clever as it circumvents traditional deny list methods. This article continues to discuss the open source software supply chain attacks targeting the banking sector.

    THN reports "Banking Sector Targeted in Open-Source Software Supply Chain Attacks"

  • news

    Visible to the public "Stolen Microsoft Key Offered Widespread Access to Microsoft Cloud Services"

    According to Wiz security researchers, the Microsoft consumer signing key stolen by Storm-0558 hackers gave them access beyond the Exchange Online and Outlook[.]com accounts that Redmond said were compromised. Redmond disclosed that the attackers had compromised the Exchange Online and Azure Active Directory (AD) accounts of about two dozen organizations. Using a now-patched zero-day validation flaw in the GetAccessTokenForResourceAPI, the attackers were able to forge signed access tokens and impersonate accounts within the targeted organizations. Shir Tamari, a security researcher with Wiz, noted that the impact extended to all Azure AD applications operating Microsoft's OpenID v2.0. The stolen key could sign any OpenID v2.0 access token for personal accounts as well as multi-tenant Azure AD applications. This article continues to discuss the widespread access to Microsoft cloud services provided by the stolen Microsoft consumer signing key.

    Bleeping Computer reports "Stolen Microsoft Key Offered Widespread Access to Microsoft Cloud Services"

  • news

    Visible to the public "Average Cost of a Data Breach Reaches $4.45 Million in 2023"

    IBM published its annual Cost of a Data Breach Report, revealing that the global average data breach cost reached $4.45 million in 2023, a 15 percent increase over the previous three years. Detection and escalation costs increased by 42 percent during the same time, representing the largest portion of breach costs and signaling a shift toward more complex breach investigations. According to the report, business strategies regarding the rising cost and frequency of data breaches are diverse. The study found that although 95 percent of organizations studied have experienced multiple breaches, breached organizations are more likely to pass incident costs on to consumers (57 percent) than to increase security investments (51 percent). This article continues to discuss key findings from IBM's latest Cost of a Data Breach Report.

    Help Net Security reports "Average Cost of a Data Breach Reaches $4.45 Million in 2023"

  • news

    Visible to the public "BGP Software Vulnerabilities Under the Microscope in Black Hat Session"

    In a presentation at Black Hat USA, Forescout researchers will bring attention to Border Gateway Protocol (BGP) implementation flaws. Few technologies are more fundamental to the Internet than BGP, which manages the transmission of data packets between networks. Its prominence on the global web has attracted the attention of state-level actors, the security community, and government agencies. The protocol itself has received the majority of attention from all parties. Daniel dos Santos, a researcher at Forescout, cautions that when people focus excessively on a single issue, they may leave a blind spot. BGP, like any other protocol specification, requires implementations that translate the protocol into code executable on routers. As with all software, this software may contain vulnerabilities. Santos and his collaborators published the findings of a study on seven BGP implementations, including the open source FRRouting, BIRD, and OpenBGPD, as well as the proprietary MikroTik RouterOS, Juniper Junos OS, Cisco IOS, and Arista EOS. Using fuzzing, or automated analysis in which invalid inputs are used to test software for vulnerabilities, they identified three new flaws. This article continues to discuss the discovery of new vulnerabilities in BGP software.

    Dark Reading reports "BGP Software Vulnerabilities Under the Microscope in Black Hat Session"

  • news

    Visible to the public "Purdue Part of a National Research Center Aimed At Hardening Transportation Systems Against Cyberattacks"

    Purdue University has been selected as a partner in a new University Transportation Center (UTC) focused on cybersecurity and funded by the US Department of Transportation (DOT). The Transportation Cybersecurity and Resilience (TraCR) center, led by Clemson University, is the first national security center funded by the DOT. UTCs will help the next generation of transportation professionals improve the safety, innovativeness, and efficiency of roads, bridges, shipping, and more. TraCR will monitor and address cybersecurity vulnerabilities in Transportation Cyber-Physical-Social Systems (TCPSS). Researchers will identify challenges and threats across transportation modes, geographies, and applications, as well as develop cybersecurity strategies and solutions for multimodal transportation. They expect to develop software and hardware that will serve as the essential foundation for preventing and mitigating potential cyberattacks on transportation systems, such as data falsification and Global Positioning System (GPS) spoofing. This article continues to discuss Purdue University becoming part of the national research center aimed at bolstering transportation systems against cyberattacks and expected research.

    Purdue University reports "Purdue Part of a National Research Center Aimed At Hardening Transportation Systems Against Cyberattacks"

  • news

    Visible to the public "Privacy and Security Crucial for Healthcare Robot Adoption – According to New Report"

    According to a recently published white paper by Sheffield Hallam University, healthcare robotic systems must prioritize security and privacy protections. The paper calls for "secure by design" and "privacy by design" principles to increase user trust in care robots that manage sensitive health and medical data. The use of assistive robots poses risks due to the sensitive health and medical data these systems manage. The paper emphasizes that security and privacy protections are essential for the widespread acceptance and adoption of care robots. The authors highlight the importance of having transparency in care machines so that their actions can be traced, and any privacy problems can be identified. This article continues to discuss key strategies designers and developers should adopt when implementing secure Robotics Autonomous Systems (RAS).

    Sheffield Hallam University reports "Privacy and Security Crucial for Healthcare Robot Adoption - According to New Report"

  • news

    Visible to the public "Game Theory Comes to the Defense of the Smart Grid"

    There are various infiltration strategies adversaries can use to threaten the smart grid. For example, in a false-data injection attack, someone could hack into the grid's communication networks and replace actual measurements with false data. Denial-of-Service (DoS) attacks, in which threat actors flood the communication infrastructure with maliciously-generated data packets, are another technique in the cyber intruder's arsenal. Game theory involves mathematical models to simulate and analyze scenarios where the "players" in the game, in this case, the attackers and cyber defenders of the power grid, make a series of interdependent decisions as they execute and adapt their attack and defense strategies. Modeling attack jamming and defense anti-jamming as a zero-sum stochastic (probabilistic) game is part of the research at Purdue University. This article continues to discuss the use of game theory in defending the smart grid against attacks.

    Purdue University reports "Game Theory Comes to the Defense of the Smart Grid"

  • news

    Visible to the public "A Nested Inventory for Software Security, Supply Chain Risk Management"

    High-profile data breaches such as Kaseya and Apache Log4j continue to impact organizations, thus making software supply chain security more important than ever. A Software Bill of Materials (SBOM) consists of all the components and libraries used to develop a software application. It details all licenses, versions, authors, and more, providing greater visibility into risks and vulnerabilities. When organizations have this level of visibility, they are in a better position to identify known or emerging vulnerabilities and risks, facilitate security by design, and make informed decisions regarding software supply chain logistics and acquisition issues. This article continues to discuss SBOM elements and how organizations can benefit from them.

    CACM reports "A Nested Inventory for Software Security, Supply Chain Risk Management"

  • news

    Visible to the public "First Search Result Leads to Malware: Crooks Now Paying for Ads"

    Cybercriminals continue to look for new methods to manipulate search results. They are flooding Google with paid advertisements through malvertising campaigns, which direct unsuspecting users to malicious websites that exploit their data and trust. The cybersecurity company Sophos disclosed that hackers and fraudsters are paying to place malicious sites at the top of search results in the form of advertisements. This practice, known as malvertising, ensures visibility and typically targets users searching for popular downloads, such as software applications. Previous campaigns targeted users who searched for CCleaner, WinRAR, Notepad++, VLC, OBS, VirtualBox, Blender, or Capcut. Even searching for Adobe, Gimp, Slack, Tor, or Thunderbird may be risky, as malicious advertisements can infect a computer with Aurora Stealer, RedLine, Vidar, FormBook, and other stealers or trojans. The most recent paid advertisements often involve Artificial Intelligence (AI) tools such as Midjourney or ChatGPT. This article continues to discuss recent trends in malvertising.

    Cybernews reports "First Search Result Leads to Malware: Crooks Now Paying for Ads"

  • news

    Visible to the public "71 Percent of Organizations May Have Been Breached and Not Know About It"

    Vectra AI has released a new research report revealing that 97 percent of analysts are concerned about missing security events. Seventy-one percent acknowledge that their organization may have been compromised, but they are unaware of it. Analysts are overwhelmed as they receive an average of 4,484 alerts per day but cannot handle 67 percent of them. Sixty-seven percent of SecOps analysts are considering or actively quitting their positions as a result. The survey of more than 2,000 Information Technology (IT) security analysts showed that the size of their organization's attack surface (63 percent), as well as the number of security tools (70 percent) and alerts (66 percent) they handle, have increased significantly over the past three years, thus overwhelming their ability to quickly respond to alerts and manage breaches. This article continues to discuss key findings regarding the current state of threat detection in 2023.

    Continuity Central reports "71 Percent of Organizations May Have Been Breached and Not Know About It"

  • news

    Visible to the public "Clop Drives Record Ransomware Activity in June"

    According to researchers at NCC Group, ransomware attacks in June soared 221% year-on-year to hit a record 434 for the month. The researchers claimed that the figures were driven by Clop's targeting of global organizations via the MOVEit flaw, "consistently high levels" of activity by groups such as Lockbit 3.0, and the appearance of new groups since May. The researchers noted that Clop was responsible for a fifth (21%) of activity last month after it exploited SQL injection zero-day vulnerability CVE-2023-34362 in the popular managed file transfer software MOVEit. LockBit 3.0 accounted for 14% of ransomware attacks in the period, down 21% from the previous month. However, the group is still the most prolific of 2023 so far. The researchers stated that June also saw 8base, a new group first discovered in May, ramp up activity quickly. It was responsible for 40 attacks, 9% of the total recorded by the researchers. Two other groups spotted for the first time in May, Rhysida, and Darkrace, contributed 17 and nine attacks, respectively. The researchers stated that, unsurprisingly, North America once again contributed the most victims (51%), followed by Europe (27%) and Asia (9%). The most targeted sector in June was "industrials," which accounted for a third of victims, followed by "consumer cyclicals" (12%) and technology (11%).

    Infosecurity reports: "Clop Drives Record Ransomware Activity in June"

  • news

    Visible to the public "Take the First Steps Towards Better Cybersecurity With these Four Goals"

    President Biden's National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems required the Cybersecurity and Infrastructure Security Agency (CISA) to develop a set of voluntary Cross-Sector Cybersecurity Performance Goals (CPGs) in collaboration with industry and interagency partners. The CPGs were developed for organizations of all sizes across all sectors in order to facilitate rigorous prioritization. In addition, the CPGs can help organizations evaluate their current cyber posture and establish a solid cybersecurity foundation. In accordance with the Cybersecurity Framework, the CPGs incorporate input from experts across sectors, public and private, domestic and international. This article continues to discuss CPGs and some that organizations can start implementing now.

    CISA reports "Take the First Steps Towards Better Cybersecurity With these Four Goals"

  • news

    Visible to the public "HHS, FTC Warn Hospitals and Telehealth Providers About Third-Party Tracking Tech"

    The US Department of Health and Human Services (HHS) Office for Civil Rights (OCR) and the Federal Trade Commission (FTC) sent a letter to 130 hospitals and telehealth providers highlighting the security and privacy risks posed by third-party tracking technologies. As previously reported, numerous healthcare data breaches have resulted from the presence of third-party tracking technology on hospital websites, which inadvertently transmitted sensitive data back to technology companies like Facebook and Google. A study published in Health Affairs found third-party tracking technology on 98.6 percent of US nonfederal acute care hospital websites. OCR has previously issued a bulletin regarding the appropriate use of tracking technology under the Health Insurance Portability and Accountability Act (HIPAA), and the FTC has settled high-profile cases with GoodRx and BetterHelp regarding their use of this technology. This article continues to discuss HHS and the FTC bringing further attention to the privacy and security risks of online tracking technologies.

    HealthITSecurity reports "HHS, FTC Warn Hospitals and Telehealth Providers About Third-Party Tracking Tech"

  • news

    Visible to the public "Rite Aid Announces Data Breach That May Have Compromised Customers' Personal Information"

    Rite Aid recently announced that a data breach may have compromised customers' personal information. The drug store chain said an "unknown party" had accessed names, birth dates, addresses, and prescription information. The company noted that insurance information like plan names and cardholder IDs was also accessed in some cases. The company said Social Security numbers and credit card information were not compromised. The breach occurred on May 27. Rite Aid said it's mailing letters to customers who are potentially affected.

    WGAL reports: "Rite Aid Announces Data Breach That May Have Compromised Customers' Personal Information"

  • news

    Visible to the public "Rutgers Among Universities Impacted by MOVEit Hack That Exposed Data"

    Rutgers recently announced that it was among numerous universities across the nation that may have exposed the personal information of students and employees through vendors that use a particular file transfer software that was hacked by a Russian ransomware gang. In the case of Rutgers, the university was notified by the National Student Clearinghouse (NSC), a nonprofit that provides a range of higher education data and research services, of a cybersecurity issue involving NSC information, including data from the university. The NSC issue involves a vulnerability in a third-party software tool, MOVEit Transfer. The NSC determined that an unauthorized party obtained certain files transferred through the clearinghouse's MOVEit environment,' including files from customers. Rutgers noted that the incident was not a data breach of Rutgers' systems. School officials stated that, at this time, the impact on Rutger's information is unclear. The NSC works with 3,600 colleges and universities, including Rutgers, to gather student data required by the U.S. Department of Education. The breach affected multiple other universities, including Stony Brook University, Middlebury College, Rutgers University, Loyola University Chicago, Trinity College in Connecticut, Colorado State University, the University of Dayton, and the University of Alaska.

    NJ Advanced Media reports: "Rutgers Among Universities Impacted by MOVEit Hack That Exposed Data"

  • news

    Visible to the public "Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities"

    Using .NET single-file deployment techniques, a new malware strain called BundleBot operates under the radar, allowing threat actors to steal sensitive data from compromised hosts. Researchers at Check Point noted that BundleBot exploits the dotnet bundle (single-file), self-contained format, resulting in very low or no static detection. According to the researchers, BundleBot is commonly distributed through Facebook Ads and compromised accounts leading to websites masquerading as regular program utilities, Artificial Intelligence (AI) tools, and games. Some of these websites attempt to mimic Google Bard, the company's generative AI chatbot, in order to lure victims into downloading a bogus RAR archive hosted on legitimate cloud storage services such as Dropbox. This article continues to discuss findings regarding the new BundleBot malware strain.

    THN reports "Sophisticated BundleBot Malware Disguised as Google AI Chatbot and Utilities"

  • news

    Visible to the public "GitHub Warns of Lazarus Hackers Targeting Devs With Malicious Projects"

    According to GitHub, a social engineering campaign is attempting to infect the devices of developers in the blockchain, cryptocurrency, online gambling, and cybersecurity industries with malware. The campaign has been attributed to the North Korean state-sponsored Lazarus Group, also known as Jade Sleet and TraderTraitor. The hacking group is known for targeting cryptocurrency companies and researchers to conduct cyber espionage and steal cryptocurrency. In a new security alert, GitHub warns that Lazarus Group is impersonating developers and recruiters on GitHub and social media by compromising legitimate accounts or creating fake personas. These personas are used to initiate conversations with targets. After gaining the target's trust, the threat actors invite them to collaborate on a project and clone a GitHub repository themed around media players and cryptocurrency trading tools. However, according to GitHub, these projects use malicious NPM dependencies that download malware. This article continues to discuss Lazarus hackers targeting developers with malicious projects.

    Bleeping Computer reports "GitHub Warns of Lazarus Hackers Targeting Devs With Malicious Projects"

  • news

    Visible to the public "CyLab Presents at White House's Launch of New IoT Cybersecurity Labeling System"

    Carnegie Mellon University's (CMU) CyLab Security and Privacy Institute recently met with government officials and technology industry leaders as the White House launched its new Internet of Things (IoT) cybersecurity label. CMU was represented at the event by School of Computer Science associate professor Yuvraj Agarwal, who presented critical findings from CyLab's five-plus years of IoT security and privacy label research. Consumers have reaped numerous benefits from the emergence of IoT technology, including improved energy efficiency and the automation of routine tasks. However, there are mounting concerns regarding the security and privacy of these devices, as well as the sale or sharing of sensitive data with third parties. Since 2018, faculty and students with CyLab have advocated for IoT labels that provide consumers with the knowledge required to make informed purchasing decisions. The team, led by Agarwal and Lorrie Cranor, director of CyLab and professor in CMU's Software and Societal Systems and Engineering and Public Policy departments, studied the role of privacy and security in IoT device purchase behaviors. They discovered that consumers are willing to pay significant premiums for products with a consistent label highlighting positive security and privacy features. This article continues to discuss CyLab's IoT privacy and security label research.

    CyLab reports "Cylab Presents at White House's Launch of New IoT Cybersecurity Labeling System"

  • news

    Visible to the public "Life Sciences Leaders Act to Counter Insider-Driven Data Loss"

    According to Code42, life sciences companies, such as medical device manufacturers, biotechnology companies, and pharmaceutical companies, are experiencing increased insider-caused data loss. With this expanding threat, life sciences leaders increasingly prioritize effective modern data loss prevention strategies. While data loss from insiders, or insider risk, occurs in all industries, it is especially damaging for life sciences companies as they contain large amounts of sensitive data, including patient information, product designs, formulations, trial results, and manufacturing details. Therefore, it is essential to protect sensitive data from unauthorized access in order to maintain a competitive advantage and guarantee uninterrupted business operations. Nearly 70 percent of respondents in the life sciences sector have observed an increase in data loss incidents caused by insiders over the past year, and they expect an even greater increase over the next 12 months. Seventy-eight percent of CISOs in the life sciences industry have a program dedicated to insider risk or threats, indicating that they recognize the issue's urgency. This article continues to discuss key findings regarding data exposure in the life sciences sector.

    Help Net Security reports "Life Sciences Leaders Act to Counter Insider-Driven Data Loss"

  • news

    Visible to the public "Mallox Ransomware Group Activity Shifts Into High Gear"

    A ransomware actor that infiltrates target networks via vulnerable SQL servers has become highly active. Mallox, also known as TargetCompany, Fargo, and Tohnichi, emerged in June 2021 and claims to have infected hundreds of organizations since then. Organizations in the manufacturing, retail, wholesale, legal, and professional services sectors are among the group's victims. According to Palo Alto Networks' Unit 42 threat intelligence team, the group's threat activity has been on the rise since the beginning of the year. Compared to 2022, Palo Alto's telemetry and other open threat intelligence sources indicate a 174 percent increase in Mallox-related activity thus far this year. Previously, Mallox was known for being a relatively small and closed ransomware gang, according to Lior Rochberger, senior security researcher at Palo Alto Networks. Researchers attribute the surge in activity to the group's leaders' concerted efforts to expand Mallox's operations. This article continues to discuss the increase in Mallox ransomware group activity.

    Dark Reading reports "Mallox Ransomware Group Activity Shifts Into High Gear"

  • news

    Visible to the public "Firmware Vulnerabilities in Millions of Computers Could Give Hackers Superuser Status"

    Two years ago, ransomware criminals breached the hardware manufacturer Gigabyte and released over 112 GB of data, including information from Intel and AMD, two of its most important supply chain partners. Researchers now warn that the leaked information exposed critical zero-day vulnerabilities that could threaten much of the computing world. The vulnerabilities exist within the firmware AMI makes for Baseboard Management Controllers (BMCs). BMCs enable cloud centers and sometimes their customers to streamline the remote management of vast fleets of computers. They allow administrators to remotely reinstall operating systems, install and deactivate applications, and more. Researchers from the security company Eclypsium analyzed the leaked AMI firmware from the 2021 ransomware attack and discovered vulnerabilities that had remained dormant for years. They can be exploited by any local or remote adversary with access to the industry-standard remote management interface Redfish to execute malicious code that will run on every server inside a data center. This article continues to discuss the new AMI BMC vulnerabilities.

    Ars Technica reports "Firmware Vulnerabilities in Millions of Computers Could Give Hackers Superuser Status"

  • news

    Visible to the public "Satellites Are Rife With Basic Security Flaws"

    A new study by a group of German academics reveals some of the security vulnerabilities of satellites currently circling the Earth. Researchers from Ruhr University Bochum and the Cispa Helmholtz Center for Information Security examined the software used by three small satellites. They discovered that the systems lacked some fundamental security measures. According to an academic paper, the satellites inspected by the researchers contain "simple" vulnerabilities in their firmware, showing that little security research from the last decade has reached the space domain. A lack of protection for who can communicate with satellite systems and the absence of encryption are among the issues. The vulnerabilities discovered by the researchers could theoretically enable an attacker to take control of a satellite and crash it into other objects. This article continues to discuss findings from the research on satellite security.

    Wired reports "Satellites Are Rife With Basic Security Flaws"

  • news

    Visible to the public "Phoenician Medical Center, Inc. Notifies 162,500 Patients of Recent Data Breach"

    On July 5, 2023, Phoenician Medical Center, Inc. and its affiliates, Phoenix Neurological & Pain Institute and Laser Surgery Center (collectively, "PMC"), filed a notice of data breach with the U.S. Department of Health and Human Services Office for Civil Rights after discovering that an unauthorized party accessed and potentially stole patient data. According to PMC, on March 31, they learned of a data security incident after some of the company's systems experienced disruption.

  • news

    Visible to the public "Scammers Are Targeting College Kids With Fake Bioscience Job Offers"

    Researchers at the cybersecurity company Proofpoint warn that cybercriminals are targeting college students with fake job offers in the bioscience and health industries to commit advance fee fraud, where victims are tricked into paying a fee in advance. The campaign was observed targeting university students in North America during the months of May and June using phishing emails with job-related content. The emails came from addresses associated with bioscience, healthcare, and biotechnology organizations. They included interview requests for remote data entry positions and were accompanied by PDF files detailing the job requirements. While Proofpoint could not confirm the requests made during the interviews, the campaign is part of a larger trend known as advance fee fraud. Since March, Proofpoint has observed this type of fraud involving biotechnology lures, but fraudulent job offer emails have been a scammer staple for years. This article continues to discuss the campaign in which cybercriminals target college students with fake job offers in the bioscience and health industries.

    The Record reports "Scammers Are Targeting College Kids With Fake Bioscience Job Offers"

  • news

    Visible to the public "Tampa General Hospital To Notify 1.2 Million Patients of Recent Data Breach"

    On July 19, 2023, Tampa General Hospital ("TGH") recently announced that the personal information of about 1.2 million Tampa General Hospital patients was leaked in a recent cyberattack. On May 31, 2023, TGH detected suspicious activity within its computer systems. In response, TGH notified the FBI, contained the incident, and then launched an investigation with the assistance of third-party data security specialists. The TGH investigation confirmed that an unauthorized third party accessed TGH's network and obtained certain files from its systems between May 12, 2023, and May 30, 2023. After learning that sensitive consumer data was accessible to an unauthorized party, TGH reviewed the compromised files to determine what information was leaked and which consumers were impacted. While the breached information varies depending on the individual, it may include an individual's name, Social Security number, address, phone number, date of birth, health insurance information, medical record number, patient account number, dates of service, and treatment information. On July 19, 2023, Tampa General sent out data breach letters to anyone who was affected by the recent data security incident.

    JD Supra reports: "Tampa General Hospital To Notify 1.2 Million Patients of Recent Data Breach"

  • news

    Visible to the public "Behavior Training Improves Cyber Resilience in Critical Infrastructure"

    The cybersecurity training services company Hoxhunt reveals in a new report that critical infrastructure employees are becoming more engaged with organizational security. "Human Cyber-Risk Report: Critical Infrastructure" is based on the analysis of over 15 million phishing simulations and actual email attacks reported by 1.6 million participants in security behavior change programs in 2022. Two-thirds of participants in security behavior training programs within critical infrastructure organizations were able to detect and report at least one malicious email attack within a year of training. It was discovered that the sector had a 20 percent higher resilience velocity, defined as the speed at which peak threat detection behavior is achieved. The report also found that the critical infrastructure sector has a high phishing simulation success rate. This article continues to discuss key findings from Hoxhunt's "Human Cyber-Risk Report: Critical Infrastructure."

    SiliconANGLE reports "Behavior Training Improves Cyber Resilience in Critical Infrastructure"

  • news

    Visible to the public "US Power Grid Faces Escalating Cyber Threats, Infrastructure Experts Warn"

    According to experts on energy infrastructure, the US power grid is facing many escalating cybersecurity risks and threats from foreign adversaries and domestic extremists. The latest annual threat assessment from the Intelligence Community identifies Chinese cyber operations against the US homeland as a significant national security threat. It warns that Beijing can almost certainly launch cyberattacks capable of disrupting national critical infrastructure services, such as the power grid. In recent months, domestic extremists have been charged with plotting to attack energy facilities and power infrastructure across the country. Bruce Walker, former assistant secretary for the US Department of Energy's (DOE) Office of Electricity, testified before the House Energy and Commerce subcommittee on oversight and investigations that the most important evolving threat to the electric grid is related to cybersecurity and physical security. He called for increased public-private collaboration. This article continues to discuss the power grid facing heightened cyber threats from foreign adversaries and domestic extremist groups that can pose significant consequences for the nation's electricity supply.

    NextGov reports "US Power Grid Faces Escalating Cyber Threats, Infrastructure Experts Warn"

  • news

    Visible to the public "Fighting Fire With Fire: White Hat Hackers Using ChatGPT Against Threat Actors"

    Most cybersecurity experts and ethical hackers, also known as white hat hackers, have used the Artificial Intelligence (AI)-driven chatbot ChatGPT for web security practices. New research by Web3's bug bounty platform Immunefi reveals that despite ChatGPT's limitations, most recommend including it in toolkits. Seventy-six percent of white hat hackers have used ChatGPT for web security practices, while the remaining respondents (23.6 percent) have not yet used the technology. In regard to use cases, most white hat hackers cited education as ChatGPT's primary application (73.9 percent), followed by smart contract auditing (60.6 percent) and vulnerability discovery (46.7 percent). Cybersecurity researchers agree that ChatGPT has limitations, with most respondents citing limited accuracy in identifying security vulnerabilities, followed by a lack of domain-specific knowledge and difficulty managing large-scale audits. The accuracy of results and ease of use are the two most influential factors in deciding whether or not to use ChatGPT. This article continues to discuss the use of ChatGPT by white hat hackers.

    Cybernews reports "Fighting Fire With Fire: White Hat Hackers Using ChatGPT Against Threat Actors"

  • news

    Visible to the public "Famed Hacker Kevin Mitnick Dead at 59"

    Kevin Mitnick, a hacker who famously served time in prison for various computer and communications-related crimes, has died after a battle with pancreatic cancer. He was 59. Mitnick gained global fame in the mid-1990s when the FBI arrested him on computer hacking and wire fraud charges. After a plea deal, he was sentenced to prison, and would later write books, and was considered "world's most famous hacker ever." At the time of his death, Mitnick worked as a security evangelist and "Chief Hacking Officer" at KnowBe4, a security awareness training company based in Florida.

    SecurityWeek reports: "Famed Hacker Kevin Mitnick Dead at 59"

  • news

    Visible to the public "Old Roblox Data Leak Resurfaces, 4000 Users' Personal Information Exposed"

    A data breach affecting the online game platform Roblox has recently exposed sensitive information from thousands of users. Troy Hunt, founder of the website "Have I Been Pwned," first alerted on Twitter on July 18, 2023, about a potential leak impacting attendees of the 2017-2020 Roblox Developers Conferences. The leaked list was shared in CSV format and contained 4000 unique email addresses, alongside personal details such as names, usernames, dates of birth, phone numbers, and physical and IP addresses. One source told Hunt that the leak was initially posted in 2021 but "didn't spread beyond niche cheating communities within Roblox" and that "Roblox never publicly disclosed this leak or alerted those affected." Hunt noted that recently the data was re-published on a public hacking forum, where it gained much more attention. High-profile users have started receiving malicious calls, texts, and emails due to the leak. When Hunt reached out to Roblox Corporation, they confirmed the leak on July 20 and said that it sent an email to all Roblox developers. Roblox noted that seriously affected users got a year of identity protection.

    Infosecurity reports: "Old Roblox Data Leak Resurfaces, 4000 Users' Personal Information Exposed"

  • news

    Visible to the public "OpenSSH Vulnerability Uncovered by Researchers, RCE Exploit Developed"

    Researchers have discovered a vulnerability in the secure networking suite OpenSSH, tracked as CVE-2023-38408, that would enable hackers to remotely execute code using simple commands. Exploiting the vulnerability involves the helper program in OpenSSH called ssh-agent, which stores a user's private keys for frequent, often automated SSH public key authentication. Administrators managing remote servers often enable 'ssh-agent forwarding,' which allows the ssh-agent to be accessed from a specified server so that local SSH keys can be used without storing keys on the server itself. According to Qualys researchers, when a forwarded agent is set up using default settings, with PKCS11 enabled, a threat actor with a connection to the same remote server can load and unload shared libraries on a victim's machine with malicious side effects. Security researchers were able to use this technique for one-shot, Remote Code Execution (RCE) by combining only four side effects of loading and unloading common shared libraries. This article continues to discuss the potential exploitation and impact of the OpenSSH vulnerability.

    ITPro reports "OpenSSH Vulnerability Uncovered by Researchers, RCE Exploit Developed"

  • news

    Visible to the public "Anonymous Sudan DDoS Strikes Dominate Attacks by KillNet Collective"

    The capabilities of the hacktivist collective KillNet have grown considerably over the past six months, as its largest affiliate, Anonymous Sudan, claimed responsibility for a wave of Distributed Denial-of-Service (DDoS) attacks. KillNet's affiliates claim that their attacks are ideologically motivated, but the group is widely believed to be aligned with the Russian government. Its attacks, including those against US, Ukrainian, and NATO targets, consistently align with Russia's interests. In a new report published by Mandiant, the threat intelligence firm identified more than 500 different victims that KillNet allegedly targeted with DDoS attacks between January 1 and June 20. This article continues to discuss key findings from Mandiant's report on KillNet.

    SC Media reports "Anonymous Sudan DDoS Strikes Dominate Attacks by KillNet Collective"

  • news

    Visible to the public "Half of AI Open Source Projects Reference Buggy Packages"

    According to security researchers at Endor Labs, open source is playing a growing role across the AI technology stack, but most (52%) projects reference known vulnerable dependencies in their manifest files. The researchers claimed that just five months after its release, ChatGPT's API is used in 900 npm and PyPI packages across "diverse problem domains," with 70% of these brand new packages. The researchers warned that, as for any open source projects, the security risks associated with vulnerable dependencies must be managed. The researchers stated that, unfortunately, organizations appear to be underestimating the risk not only of AI APIs in open source dependencies but security sensitive APIs in general. Over half (55%) of applications have calls to security sensitive APIs in their code base, which rises to 95% when dependencies are included. The researchers also warned that large language model (LLM) technology like ChatGPT is poor at scoring the malware potential of suspicious code snippets. It found that OpenAI GPT 3.5 had a precision rate of just 3.4%, while Vertex AI text-bison performed a little better, at 7.9%. The researchers noted that both models produced a significant number of false positives, which would require manual review efforts and prevent automated notification to the respective package repository to trigger a package removal. The researchers also found during their research that developers may be wasting their time remediating vulnerabilities in code which isn't even used in their applications. The researchers found that 71% of typical Java application code is from open source components but that apps use only 12% of imported code. The researchers noted that vulnerabilities in unused code are rarely exploitable and that organizations can eliminate or de-prioritize up to 60% of remediation work with reliable insight into which code is reachable throughout an application.

    Infosecurity reports: "Half of AI Open Source Projects Reference Buggy Packages"

  • news

    Visible to the public "Ukraine's Cyber Police Dismantled a Massive Bot Farm Spreading Propaganda"

    The National Police of Ukraine's Cyber Police Department dismantled a massive bot farm, seizing computer equipment, mobile phones, over 250 GSM gateways, and about 150,000 SIM cards. In support of the Russian government and its narrative on the invasion of Ukraine, a gang of more than 100 individuals used fake social network accounts to spread disinformation and carry out psychological operations. The gang operated a bot farm to distribute illegal content, personal information belonging to Ukrainian citizens, and more. The cyber police discovered that the group registered thousands of bot accounts on multiple social networks using special equipment and software. This article continues to discuss the dismantlement of a massive bot farm by Ukraine's cyber police.

    Security Affairs reports "Ukraine's Cyber Police Dismantled a Massive Bot Farm Spreading Propaganda"

  • news

    Visible to the public "Microsoft Expands Cloud Logging to Counter Rising Nation-State Cyber Threats"

    After facing criticism following a recent espionage attack campaign aimed at its email infrastructure, Microsoft has announced that it will expand cloud logging capabilities to help organizations investigate cybersecurity incidents and gain more visibility. The company noted that the change directly responds to the increasing frequency and evolution of cyber threats from nation-states. The rollout is expected to begin in September 2023 for all government and commercial customers. Microsoft will provide its customers access to wider cloud security logs at no additional cost. The US Cybersecurity and Infrastructure Security Agency (CISA) applauded the action, emphasizing that having access to key logging data is essential for quickly mitigating cyber intrusions and that this is a major step forward in advancing security by design principles. The development follows disclosures that a China-based threat actor named Storm-0558 compromised 25 organizations by exploiting a validation error in the Microsoft Exchange environment. This article continues to discuss Microsoft expanding cloud logging capabilities, what prompted this move, and the response to this decision.

    THN reports "Microsoft Expands Cloud Logging to Counter Rising Nation-State Cyber Threats"

  • news

    Visible to the public "OpenAI Credentials Stolen by the Thousands for Sale on the Dark Web"

    With hundreds of thousands of OpenAI credentials for sale on the dark web and access to a malicious alternative for ChatGPT, threat actors are displaying a growing interest in generative Artificial Intelligence (AI) tools. Less skilled and advanced cybercriminals can use the tools to increase the likelihood of a successful attack by creating more convincing, targeted phishing emails. ChatGPT, OpenAI's AI-driven chatbot, was mentioned more than 27,000 times in six months by users of the dark web and Telegram, according to data from Flare, a threat exposure management company. Flare researchers discovered OpenAI credentials among the most recent goods available while analyzing dark web forums and marketplaces. Over 200,000 OpenAI credentials were discovered for sale on the dark web as stealer logs. This article continues to discuss findings regarding the sale of OpenAI credentials on the dark web.

    Bleeping Computer reports "OpenAI Credentials Stolen by the Thousands for Sale on the Dark Web"

  • news

    Visible to the public "Microsoft Exchange Servers Compromised by Turla APT"

    Turla, also known as Secret Blizzard, Snake, and UAC-0003, has been targeting defense sector organizations in Ukraine and Eastern Europe with DeliveryCheck and Kazuar backdoors and infostealers. The group has also been controlling them with compromised Microsoft Exchange servers. It is believed that the Russian state is behind the sophisticated and persistent Advanced Persistent Threat (APT) group Turla, which has been active for over a decade. The group has been linked to many attacks against government and military organizations, as well as cyber espionage campaigns against other organizations with information the Russian government may find useful. This article continues to discuss recent findings regarding the Turla APT group.

    Help Net Security reports "Microsoft Exchange Servers Compromised by Turla APT"

  • news

    Visible to the public "P2P Self-Replicating Cloud Worm Targets Redis"

    Researchers have discovered a cross-platform, Rust-based, peer-to-peer (P2) worm that targets the Redis open source database application, specifically containers in the cloud. Palo Alto Network's Unit 42 released a report naming the cloud malware "P2PInfect." Due to its command-and-control (C2) network and mentions of "miner," the team suspects it may be the initial phase of a larger cryptomining operation. While the Unit 42 team discovered more than 300,000 Redis systems online, only 934 of those systems were vulnerable to the P2PInfect worm. The team reported that vulnerable Redis systems lack a patch for the Lua sandbox escape vulnerability, tracked as CVE-2022-0543, with a CVSS severity rating of 10 out of 10. This article continues to discuss the P2 worm targeting the Redis open source database application.

    Dark Reading reports "P2P Self-Replicating Cloud Worm Targets Redis"

  • news

    Visible to the public "A Surprisingly Simple Way to Foil Car Thieves"

    Growing vehicle technology sophistication can make cars more vulnerable to hacking and theft. A research team led by the University of Michigan has developed a solution that involves what is considered to be the lowest-technology feature of modern vehicles, the auxiliary power outlet. The team is ready to begin large-scale testing of Battery Sleuth, a vehicle security system that can protect against sophisticated wireless hacking and old-school jimmying. The wireless connection that key fobs rely on is sidestepped by Battery Sleuth, as is the standardized onboard communication network used in modern vehicles. Instead, it authenticates drivers by measuring voltage fluctuations in the electrical system of a vehicle. Drivers control it through a keypad device inserted into the auxiliary power outlet. When the driver enters a numerical code on the keypad, Battery Sleuth sends a predetermined series of voltage fluctuations, a sort of "voltage fingerprint," to the car's electrical system. Then, a receiver recognizes the fingerprint and allows the vehicle to start. This article continues to discuss the Battery Sleuth authenticator device.

    The University of Michigan reports "A Surprisingly Simple Way to Foil Car Thieves"

  • news

    Visible to the public "Registering Refugees Using Personal Information Has Become the Norm – But Cybersecurity Breaches Pose Risks to People Giving Sensitive Biometric Data"

    In 2022, the number of refugees worldwide reached high levels as over 108.4 million people have been forced to leave their homes due to persecution or violence. In the meantime, governments and aid organizations increasingly use biometrics for identifying and tracking refugees. Biometrics involves the collection of a person's physical or behavioral characteristics, such as fingerprints or voice. Organizations that collect personal physical data can store it in order to immediately identify a person, for example, by scanning their fingerprints or irises. The United Nations refugee agency, or UNHCR, is among the organizations that have expanded their biometrics programs in recent years to help identify refugees and provide lifesaving help. Joseph K. Nwankpa, a cybersecurity scholar at Miami University, believes it is essential to remember that while identifying people with biometrics may be convenient for organizations gathering the data, the practice poses inherent privacy risks that can endanger the safety of vulnerable individuals. This article continues to discuss Nwankpa's insights regarding the biometrics data-gathering process and cybersecurity challenges associated with biometrics.

    The Conversation reports "Registering Refugees Using Personal Information Has Become the Norm - But Cybersecurity Breaches Pose Risks to People Giving Sensitive Biometric Data"

  • news

    Visible to the public "WormGPT Might Become Hackers' New Best Imaginary Friend"

    WormGPT is a new, custom-trained version of a Large Language Model (LLM) based on the GPT-J language model released in 2021. It is a conversational tool developed and trained to write and deploy black hat code and tools. WormGPT allows users to develop sophisticated malware at a fraction of the cost and level of expertise previously required. The cybersecurity company SlashNext tested the tool and warned that malicious actors are now creating their own ChatGPT-like modules. The custom modules created by the adversaries are said to be easier to use for malicious purposes. According to screenshots posted by the creator, WormGPT functions like an unprotected version of ChatGPT. It can produce Python-based malware and offer deployment-related tips, strategies, and solutions. This article continues to discuss findings and observations regarding WormGPT.

    Tom's Hardware reports "WormGPT Might Become Hackers' New Best Imaginary Friend"

  • news

    Visible to the public "Securing the Oil and Gas Industry"

    The oil and gas industry continues to be a critical pillar of the global economy, supporting millions of jobs worldwide and providing essential energy for households, businesses, and transportation. However, as digital technology increasingly permeates this industry, oil and gas companies are becoming more vulnerable to severe cyber threats. The industry's growing reliance on digital systems has increased the importance of developing and implementing strong cybersecurity strategies, which presents unprecedented challenges. The oil and gas sector relies on several external variables, thus complicating the industry's operational landscape and making cybersecurity a unique challenge. This article continues to discuss cybersecurity challenges in the oil and gas industry and ways to combat the unique security challenges of this sector.

    BetaNews reports "Securing the Oil and Gas Industry"

  • news

    Visible to the public "Recycling Giant Tomra Takes Systems Offline Following Cyberattack"

    Norwegian recycling giant Tomra has recently taken some of its systems offline after falling victim to what it describes as "an extensive cyberattack." Tomra is a multinational company that manufactures waste collection and sorting products, including reverse vending machines and food sorters. The company operates close to 100,000 recycling systems worldwide. On Monday, Tomra announced that some of its data systems were impacted by a cyberattack that was discovered on July 16 and that it immediately disconnected some systems to contain the incident. In an update on Tuesday, the company announced that it had disconnected additional systems and that it would keep all impacted systems offline until the incident is resolved. The attack currently has a limited impact on Tomra's customer operations. Tomra noted that most of their digital services are designed to operate offline for a certain amount of time but may have reduced functionality in the interim. The company announced that its internal IT services and some back office applications remain offline, with an impact on its supply chain management. With major office locations offline, employees have been asked to work remotely. Tomra's reverse vending machines (RVMs) in Australia and North America remain fully operational, RVMs in Europe and Asia continue to work in offline mode, but some older models are no longer operating. The company's recycling and food sorter systems are operating as usual, with some limited functionality due to digital services being offline. The company stated that they have not received any contact from those who are behind the cyberattack.

    SecurityWeek reports: "Recycling Giant Tomra Takes Systems Offline Following Cyberattack"

  • news

    Visible to the public "AI Must Have Better Security, Says Top Cyber Official"

    Lindy Cameron, CEO of the UK National Cyber Security Centre, emphasizes that cybersecurity must be implemented into Artificial Intelligence (AI) systems. According to Cameron, it is essential to implement robust systems in the early phases of AI development. In the future, AI will play a role in numerous facets of daily life, from homes and cities to national security and even warfare. Although there are benefits to using AI, there are multiple risks. As companies race to develop new AI products, there is concern that security is being neglected. Companies competing to secure their position in the growing AI market may prioritize getting their systems to market as quickly as possible without considering the potential for misuse. The scale and complexity of AI models are such that it will be much more difficult to retrofit security if the proper fundamental principles are not applied during the early stages of development. Malicious AI attacks could have "devastating" consequences. AI systems can be used to generate malicious code for hacking into devices or to write fake messages for spreading misinformation on social media. This article continues to discuss AI security risks and the importance of building cybersecurity into AI systems.

    BBC reports "AI Must Have Better Security, Says Top Cyber Official"

  • news

    Visible to the public "Cameron Whitehead Wins US Department of Energy's 2023 CyberForce Conquer the Hill – Reign Edition Competition"

    Cameron Whitehead of the University of Central Florida won the US Department of Energy's (DOE) 2023 CyberForce Conquer the Hill - Reign Edition Competition. This virtual event, coordinated by the DOE's Argonne National Laboratory, included 144 participants from collegiate institutions nationwide. Competitors explored a virtual escape room where they were required to complete tasks that simulated real-world scenarios, such as hacking into server rooms, interacting with Artificial Intelligence (AI) robots, and deciphering secret messages. Due to the growing number of cyber threats in the digital world, there is a high demand for cybersecurity experts. DOE and Argonne acknowledge the significance of inspiring and educating a new generation of cybersecurity professionals. This is why DOE created the CyberForce Program, which offers opportunities for aspiring professionals to develop their skills and defend critical infrastructure. This article continues to discuss Whitehead of the University of Central Florida winning the DOE's 2023 CyberForce Conquer the Hill - Reign Edition Competition and the purpose of the CyberForce Program.

    The US Department of Energy reports "Cameron Whitehead Wins US Department of Energy's 2023 CyberForce Conquer the Hill - Reign Edition Competition"

  • news

    Visible to the public "Joven Claims City Had Major Data Breach"

    Odessa Mayor Javier Joven recently announced that someone had accessed the city's computer network numerous times since December using former Odessa City Attorney Natasha Brooks' accounts, which someone failed to deactivate following her termination on Dec. 13. The Odessa Police Department, with the assistance of other law enforcement agencies, launched an investigation after city officials discovered last week that sensitive information was transferred by email to a private account. Joven noted that a number of systems were accessed, such as Odessa Police Department reports, personnel information, and GovQA, which is the city's hosted system for public information requests. It's unknown at this time exactly how sensitive the transferred data was, but just the breach itself is concerning. Joven noted that it appears as though 200 emails and other data were accessed. Once the investigation concludes, the city will use all means available, including criminal charges, to ensure that everyone involved in this breach is punished to the full extent of the law. Joven noted that much of the information gathered could have been obtained through a Texas Public Information Act reques

    Yahoo News reports: "Joven Claims City Had Major Data Breach"

  • news

    Visible to the public "Cloudflare Reports Surge in Sophisticated DDoS Attacks"

    According to new research from the Content Delivery Network (CDN) provider Cloudflare, in the second quarter of this year, companies were hit with well-planned Distributed Denial-of-Service (DDoS) attacks launched by hacking groups, many of which are based in Russia. From April to June, the total number of DDoS requests reached 5.4 trillion, a 15 percent increase over the first quarter of this year. Despite the surge in attacks in 2023, DDoS incidents are down compared to the second quarter of 2022, when Cloudflare recorded 8.3 trillion requests. According to Cloudflare, the number of requests does not indicate the number of "unique" attacks, but rather the total volume of DDoS attacks. In recent months, the industries impacted the most by DDoS attacks were cryptocurrency, gaming, and gambling, with cryptocurrency companies alone having seen a 600 percent increase in DDoS attacks. This article continues to discuss key findings from Cloudflare's report on DDoS attack trends for the second quarter of 2023.

    The Record reports "Cloudflare Reports Surge in Sophisticated DDoS Attacks"

  • news

    Visible to the public "Initial Access Broker Posts Targeting Banks Increase on Dark Web"

    According to research conducted by Searchlight Cyber, Initial Access Brokers (IABs) on the dark web are increasingly targeting the banking sector. In addition, the dark web intelligence company discovered evidence of insiders sharing information about their organization or being recruited by cybercriminals on the dark web, as well as threat actors conducting infrastructure reconnaissance to target financial service supply chains. The company noted in a new study that these threats also present banks with a significant opportunity. According to the company, security teams can modify and improve their defenses based on what might happen by using dark web intelligence on potential malicious activity while criminals are still in their operations' 'pre-attack' stage. The research is based on an investigation by analysts at Searchlight Cyber involving dark web data collected from 2020 to the present. This article continues to discuss key findings from Searchlight Cyber's analysis of dark web data.

    CSO Online reports "Initial Access Broker Posts Targeting Banks Increase on Dark Web"

  • news

    Visible to the public "When Tech Vendors Make Key Logging Info Available for Free, Everyone Wins"

    Eric Goldstein, Executive Assistant Director for Cybersecurity at the Cybersecurity and Infrastructure Security Agency (CISA), emphasizes that access to key logging data is crucial for quickly mitigating cyber intrusions, such as the recently identified incident affecting a federal agency's Microsoft Exchange Online environment. In this case, the affected agency used available logging data as a resource to detect suspicious activity, enable remediation actions to limit damage, and help Microsoft and CISA teams in identifying and assisting additional victims. Goldstein stresses that requiring organizations to pay more for essential logging leads to insufficient visibility when investigating cybersecurity incidents, which could give adversaries dangerously high levels of success when targeting American organizations. CISA applauds Microsoft's decision to make necessary logs, identified by CISA and its partners as critical to identifying cyberattacks, available to customers without additional cost. This article continues to discuss the importance of logging data in mitigating cyber incidents.

    CISA reports "When Tech Vendors Make Key Logging Info Available for Free, Everyone Wins"

  • news

    Visible to the public "Chrome 115 Patches 20 Vulnerabilities"

    Google recently announced the release of Chrome 115 to the stable channel, with patches for 20 vulnerabilities, including 11 reported by external researchers. Google noted that four of the externally reported security defects are assessed with a "high severity" rating. Based on the bug bounties paid for them, the most important of these are CVE-2023-3727 and CVE-2023-3728, two use-after-free issues in WebRTC. Google says it handed out a $7,000 reward for each of them. The third high-severity flaw that Chrome 115 resolves is another use-after-free bug, this time in Tab Groups. Tracked as CVE-2023-3730, the vulnerability was awarded a $2,000 bug bounty. The fourth high-severity issue, CVE-2023-3732, is described as an out-of-bounds memory access in Mojo. Google noted that the bug was discovered by Google Project Zero researcher Mark Brand and, per their policies, no bug bounty will be issued for it. Google stated that Chrome 115 resolves six externally reported medium-severity vulnerabilities, which are described as inappropriate implementation flaws in the WebApp Installs, Picture In Picture, Web API Permission Prompts, Custom Tabs, Notifications, and Autofill components. This browser release also resolves a low-severity insufficient validation of untrusted input bug in Themes. Google says it has paid a total of $34,000 in bug bounty rewards to the reporting researchers. Google makes no mention of any of the newly resolved vulnerabilities being exploited in malicious attacks.

    SecurityWeek reports: "Chrome 115 Patches 20 Vulnerabilities"