News Items

  • news

    Visible to the public "Third-Party Data Breach Impacts WSU Community Members"

    Many businesses and organizations worldwide have been impacted by a cybersecurity incident related to a widely used filesharing application known as MOVEit Transfer. While Washington State University (WSU) does not use the MOVEit software, WSU has recently received notifications from third-party service providers that personally identifiable information from some current and prospective WSU students and employees may have been exposed. The third-party service providers who have contacted WSU include the National Student Clearinghouse (NSC), the Teachers Insurance and Annuity Association (TIAA), and United Healthcare. The National Student Clearinghouse is a nonprofit organization that provides educational reporting, data exchange, and verification services to more than 3,600 colleges and universities nationwide. WSU works with the clearinghouse for a variety of purposes, including enrollment and degree verification services and student loan reporting requirements. Data provided to the National Student Clearinghouse includes personally identifiable information and education records. TIAA is a financial organization that offers investment and insurance services to employees working in the academic, research, medical, governmental, and cultural fields. WSU provides names, addresses, dates of birth, and social security numbers for those employees who choose to participate in TIAA services. The data transferred from WSU to TIAA was not compromised. However, TIAA has indicated that Pension Benefit Information, LLC, an outside vendor it shares information with, has been impacted. United Healthcare makes health insurance plans available to college students across the country, including at Washington State University. United Healthcare notified the university that personally identifiable information, as well as claims information, for some of its WSU student customers, was accessed during a MOVEit Transfer cyberattack in June.

    Washington State University reports: "Third-Party Data Breach Impacts WSU Community Members"

  • news

    Visible to the public "34 Million Indonesian Passports Exposed in a Massive Immigration Directorate Data Breach"

    Recently, over 34 million Indonesian passports were leaked in a massive data breach impacting the country's Immigration Directorate General at the Ministry of Law and Human Rights. Cybersecurity researcher and founder of Ethical Hacker Indonesia, Teguh Aprianto, disclosed the breach, attributing the attack to a hacktivist identified as Bjorka. Indonesian authorities are investigating the breach while the threat actor has offered the treasure trove for sale on his data leak site. Aprianto posted a screenshot on his Twitter of the allegedly stolen 4GB of passport data, currently selling for $10,000. The hackers have provided 1 million data samples which appear to be valid. The timestamp is from the 2009-2020 period. The exposed data includes full names, passport numbers, dates of issue, expiry dates, dates of birth, and gender of 34.9 million Indonesian passport holders. Indonesia's Ministry of Communications and Information Technology has confirmed being notified of the alleged data leak.

    CPO Magazine reports: "34 Million Indonesian Passports Exposed in a Massive Immigration Directorate Data Breach"

  • news

    Visible to the public "Fake Linux Vulnerability Exploit Drops Data-Stealing Malware"

    A fake proof-of-concept (PoC) exploit that installs Linux password-stealing malware targets cybersecurity researchers and threat actors. The fake PoC claims to be an exploit for a critical use-after-free vulnerability, tracked as CVE-2023-35829, affecting Linux kernel versions before 6.3.2. During their routine scans, Uptycs analysts discovered the malicious PoC exploit when detection systems flagged anomalies such as unexpected network connections, unauthorized system access attempts, and unusual data transfers. Three repositories were discovered to be hosting the malicious PoC exploit. According to Uptycs, the malicious PoC exploit has been widely distributed within the security research community, so infections may exist on many computers. This article continues to discuss the fake PoC exploit that drops data-stealing malware.

    Bleeping Computer reports "Fake Linux Vulnerability Exploit Drops Data-Stealing Malware"

  • news

    Visible to the public "New SOHO Router Botnet AVrecon Spreads to 70,000 Devices Across 20 Countries"

    A new strain of malware has been targeting small office/home office (SOHO) routers covertly for over two years, infiltrating more than 70,000 devices and creating a botnet with 40,000 nodes across 20 countries. The malware has been dubbed AVrecon by Lumen Black Lotus Labs, making it the third strain to target SOHO routers over the past year after ZuoRAT and HiatusRAT. According to the company, AVrecon is one of the largest SOHO router-targeting botnets ever. The campaign's objective appears to be the creation of a covert network to facilitate various criminal activities, including password spraying and digital advertising fraud. The US and the US account for most infections, followed by Argentina, Nigeria, Brazil, Italy, Bangladesh, Vietnam, India, Russia, and South Africa. This article continues to discuss the AVrecon malware behind one of the largest SOHO router-targeting botnets.

    THN reports "New SOHO Router Botnet AVrecon Spreads to 70,000 Devices Across 20 Countries"

  • news

    Visible to the public "Facebook and Microsoft Remain Prime Targets for Spoofing"

    According to Vade, although phishing trends often change, Facebook and Microsoft continue to dominate as the most spoofed brands. The collective dominance of Facebook and Microsoft as the most spoofed brands persisted into H1 2023, with Facebook accounting for 18 percent of all phishing URLs and Microsoft accounting for 15 percent. While Facebook was the clear leader, Microsoft surpassed the social media platform in Q2 due to a 22 percent increase in spoofing attempts quarter-over-quarter. Facebook and Microsoft together accounted for more unique phishing URLs than the next top five brands combined (i.e., Credit Agricole, SoftBank, Orange, PayPal, and Apple). This article continues to discuss key findings from Vade's H1 2023 Phishing and Malware Report.

    Help Net Security reports "Facebook and Microsoft Remain Prime Targets for Spoofing"

  • news

    Visible to the public "WormGPT Cybercrime Tool Heralds an Era of AI Malware vs. AI Defenses"

    Cybercriminals are using generative Artificial Intelligence (AI) technology to help conduct activities and execute Business Email Compromise (BEC) attacks. WormGPT is a black-hat alternative to GPT models designed specifically for malicious activities. According to a report by SlashNext, WormGPT was trained on a variety of data sources, with a focus on malware-related data. It generates human-like text based on the input it receives and can produce highly convincing phishing emails. Screenshots from a cybercrime forum show exchanges between malicious actors discussing how to use ChatGPT to boost the success of BEC attacks, suggesting that hackers with limited fluency in the target language can use generative AI to create a convincing email. The research team also looked at the potential risks associated with WormGPT, focusing on BEC attacks, by instructing the tool to generate an email to drive an account manager into making payment for a fraudulent invoice. This article continues to discuss the WormGPT cybercrime tool.

    Dark Reading reports "WormGPT Cybercrime Tool Heralds an Era of AI Malware vs. AI Defenses"

  • news

    Visible to the public "Embry-Riddle Cybersecurity Student Earns Place on Boeing's Security Hall of Fame"

    Kestral Carlough, a Cyber Intelligence and Security student at Embry-Riddle Aeronautical University, was recently inducted into Boeing's Security Hall of Fame for finding and reporting a security flaw in a popular flight application. Carlough began a research project under the direction of Dr. Krishna Sampigethaya, department chair and associate professor of Cyber Intelligence and Security at Embry-Riddle's Prescott Campus, to prevent air-traffic-related threats such as Denial-of-Service (DoS) attacks against portable Electronic Flight Bags (EFBs) connected to an insecure guest network. His focus on wireless network interfaces led him to discover a security flaw in a popular EFB application. He reported the vulnerability to Boeing, and as a result of his efforts, the security flaw was fixed. Carlough explained that airlines use EFBs to eliminate paper from their operations, and pilots use EFBs to monitor weather data, air traffic, and other flight-planning information. He initially focused on how to penetrate the application, which involved controlling the display of air traffic data. Carlough was able to spoof legitimate flight data and draw fictitious airplanes as tiny blue dots. This article continues to discuss Carlough's research and findings that earned him a spot on Boeing's Security Hall of Fame.

    Embry-Riddle Aeronautical University reports "Embry-Riddle Cybersecurity Student Earns Place on Boeing's Security Hall of Fame"

  • news

    Visible to the public "Virginia Tech Researchers Maximize Data Security, Minimize Machine Interactions to Improve Patient Care"

    According to Sarah Parker, the chair of health systems and implementation science at Virginia Tech Carilion School of Medicine, physicians spend much of their days handling computer inputs. Parker emphasized that while medical professionals work to save a patient's life, they are also responsible for the patient's digitized information. Therefore, she and her team are developing methods to improve data security while reducing machine interactions to improve patient care. The team is exploring how to foster a shared awareness between healthcare providers and patients. Recently, the project's scope has been expanded to research how to integrate privacy and security into the location-to-location flow of medical data within healthcare systems. This article continues to discuss the Virginia Tech research team's project aimed at exploring methods to streamline the workflow of medical data while integrating privacy and security.

    Virginia Tech reports "Virginia Tech Researchers Maximize Data Security, Minimize Machine Interactions to Improve Patient Care"

  • news

    Visible to the public "Huge Increase in USB Malware in First Half of 2023"

    Researchers at Mandiant have observed a threefold growth in USB malware attacks. In a blog post, Mandiant describes two espionage campaigns, the first of which involves malware called SOGU. The company identifies SOGU malware as one of the most prevalent software variants that enter a computer via a USB drive. It has been used to target both government agencies and private businesses. The second example provided by Mandiant is SNOWYDRIVE, which creates a backdoor at a target and then controls the system remotely. Additionally, it attempts to move laterally within a corporate network to get as much access as possible to sensitive data. This article continues to discuss the significant increase in the number of attacks using infected USB drives to steal secrets.

    Techzine reports "Huge Increase in USB Malware in First Half of 2023"

  • news

    Visible to the public "Cloud Poses Special Cyber Risks for Critical Infrastructure, Report Warns"

    According to recently published research, cloud computing technologies pose significant cybersecurity risks to federal agencies and other organizations that do not adapt their processes and workforce to the cloud paradigm. In its report, the Cyber Statecraft Initiative at the Atlantic Council examines emerging risks associated with critical infrastructure organizations that use new cloud services and offerings. The report highlights two different risks associated with cloud technologies: compounded risk and delegated control and visibility. Multiple cloud services create an increasingly complex infrastructure, heightening the threat of security vulnerabilities and thus compounding risk. Delegated control and visibility can pose risks when cloud service users have limited insight into the underlying infrastructure of their products and lack direct command over critical security issues. This article continues to discuss key findings and points shared in the report.

    NextGov reports "Cloud Poses Special Cyber Risks for Critical Infrastructure, Report Warns"

  • news

    Visible to the public "BlackLotus UEFI Bootkit Source Code Leaked on GitHub"

    The source code for the BlackLotus UEFI bootkit has recently been shared publicly on GitHub, albeit with several modifications compared to the original malware. The bootkit is designed specifically for Windows and emerged on hacker forums in October last year, being advertised with APT-level capabilities such as secure boot and user access control (UAC) bypass and the ability to disable security applications and defense mechanisms on victim systems. BlackLotus is able to persist in the firmware, which means it can be used to load unsigned drivers and has been observed exploiting CVE-2022-21894, a year-old vulnerability in Windows, to disable secure boot even on fully patched systems. In April, Microsoft released resources to help threat hunters identify BlackLotus infections. The BlackLotus source code that was published on GitHub on Wednesday has been stripped of the "Baton Drop" exploit targeting CVE-2022-21894 and uses the bootlicker UEFI firmware rootkit but contains the rest of the original code. According to Alex Matrosov, CEO of firmware security company Binarly, the public availability of the bootkit's source code represents a significant risk mainly because it can be combined with new exploits and create new attack opportunities.

    SecurityWeek reports: "BlackLotus UEFI Bootkit Source Code Leaked on GitHub"

  • news

    Visible to the public "Juniper Networks Patches High-Severity Vulnerabilities in Junos OS"

    Networking appliances maker Juniper Networks recently announced software updates that patch multiple high-severity vulnerabilities in Junos OS, Junos OS Evolved, and Junos Space. The company published 17 advisories detailing roughly a dozen Junos OS-specific security defects and nearly three times as many issues in third-party components used in its products. Three of the new advisories describe high-severity vulnerabilities in Junos OS and Junos OS Evolved that could lead to denial-of-service (DoS). The flaws impact QFX10000, MX, and SRX series networking appliances. Eight other advisories deal with medium-severity Junos OS and Junos OS Evolved flaws that could also be exploited to cause DoS conditions. Juniper Networks also recently released software updates to patch all 11 vulnerabilities, noting that no workarounds are available for any of these issues. The company also announced software updates for SRX series and MX series devices to resolve a high-severity issue in Intrusion Detection and Prevention (IDP) that could allow an unauthenticated attacker on the network to cause a DoS condition. The company is unaware of any of these vulnerabilities being exploited in attacks.

    SecurityWeek reports: "Juniper Networks Patches High-Severity Vulnerabilities in Junos OS"

  • news

    Visible to the public "Popular WordPress Security Plugin Caught Logging Plaintext Passwords"

    The All-In-One Security (AIOS) WordPress plugin was recently found to be logging plaintext passwords from login attempts. Installed on over one million WordPress sites, the security and firewall plugin was designed to prevent cyberattacks such as brute-force attempts, warn when the default admin username is used for login, prevent bot attacks, log user activity, and eliminate comment spam. It was discovered that AIOS version 5.1.9 writes plaintext passwords from login attempts to the database, which essentially provides any privileged user with access to the login credentials of all other administrator users. The problem was identified roughly two weeks ago when users complained about the insecure design flaw on the plugin's support forums. Earlier this week, the Updraft team maintaining the plugin released AIOS version 5.2.0 to address the issue and remove the logged passwords from the database. However, plugin users have been complaining about the update breaking sites and not removing the password logs. AIOS version 5.2.1 was released on Wednesday to address these issues, but some users claim sites are still broken. Security experts urge AIOS users to update their installations as soon as possible. Based on WordPress statistics, hundreds of thousands of websites are still running a vulnerable version of the plugin.

    SecurityWeek reports: "Popular WordPress Security Plugin Caught Logging Plaintext Passwords"

  • news

    Visible to the public "Google's Bard Poses Ransomware Risk, Say Researchers"

    Bard, Google's Artificial Intelligence (AI)-powered content generator, will readily compose phishing emails upon request and, under the right prompting, can generate basic ransomware code. Researchers at Check Point note that this places Bard behind its principal rival ChatGPT in terms of cybersecurity. The cybersecurity company conducted the analysis as there are concerns that OpenAI's Large Language Model (LLM) could be used to generate similarly malicious texts and programs. According to Check Point, while ChatGPT's creator has strengthened security, Google has a ways to go before the same can be said about it. The research team ran identical queries through both AI programs. Its initial request for "a phishing email" was denied by both, but ChatGPT added the disclaimer that such activities were "fraudulent," while Bard merely stated that it was unable to follow through. This article continues to discuss Check Point's research on Bard's potential to generate malicious content that poses a significant cybersecurity risk.

    Cybernews reports "Google's Bard Poses Ransomware Risk, Say Researchers"

  • news

    Visible to the public "A Collaborative Approach to Improving Cybersecurity"

    As the inaugural cohort of the Catalyst Fellowship program at Rogers Cybersecure Catalyst, six researchers and cybersecurity experts from Toronto Metropolitan University (TMU) and the private sector are bridging the divide between academia and industry to address cybersecurity challenges. The fellows' research will pave the way for more trustworthy algorithms and their byproducts, such as more reliable online reviews and innovative systems for uncovering and monitoring cyber threats. Their research will provide a better understanding of existing security systems and how vulnerable they are to destructive and disruptive attacks. As an industry-stream fellow, for example, Monika Freunek, founder of Lighthouse Science Consulting and Technologies Inc. and a leader in the critical infrastructure and cybersecurity fields, aims to address the gap in Internet of Things (IoT) cybersecurity by collaborating with industry and academic experts to determine what solutions are currently available and how they can be implemented in a manner that is practical and efficient for modern society. This article continues to discuss the researchers' efforts to improve cybersecurity.

    Toronto Metropolitan University reports "A Collaborative Approach to Improving Cybersecurity"

  • news

    Visible to the public "Fewer Than 100 Scammers Responsible For Global Email Extortion"

    According to security researchers at Barracuda Networks, global email-based extortion scams are the work of just a small group of fraudsters. The researchers teamed up with Columbia University to analyze over 300,000 extortion emails tracked by the firm over a one-year period. They looked specifically at the Bitcoin addresses used by the scammers in order to discern specific trends. The researchers found that the attacks are concentrated within a small number of Bitcoin addresses. There are, in total, around 3000 unique Bitcoin addresses in their dataset, of which the top 10 addresses appear in about 30% of emails, and the top 100 addresses appear in about 80% of emails. The researchers concluded that "even though extortion is a significant email threat with millions of malicious emails sent to victims every year, it is caused by a relatively small group of perpetrators (fewer than 100 attackers, and probably an even smaller number than that, assuming attackers use multiple Bitcoin addresses)." The researchers noted that they suspect these small groups of attackers use similar best practices and templates. The researchers noted that to stay under the radar, the fraudsters typically demand an amount between $400 and $5000, with 90% asking for less than $2000. This "sweet spot" is thought to be chosen because it's more likely victims will pay without investigating whether the scammer actually has compromising information on them.

    Infosecurity reports: "Fewer Than 100 Scammers Responsible For Global Email Extortion"

  • news

    Visible to the public "K-12 Schools Need Staff, Training To Face Cybersecurity Threats"

    The threat of cyberattacks against K-12 school districts has sparked concerns among staff and brought further attention to the need to increase technological resources. These are the findings of a recent study published in the Journal of Cybersecurity Education, Research and Practice that aimed to advance understanding of the cybersecurity challenges and needs of K-12 school districts. Researchers analyzed 23 school district websites and conducted interviews with 12 school technology leaders for the study. Leaders reported a need for additional technology professionals, training to implement security strategies, and technology infrastructure. This article continues to discuss insights from the study's lead author Florence Martin, professor of learning, design, and technology at North Carolina State University.

    North Carolina State University reports "K-12 Schools Need Staff, Training To Face Cybersecurity Threats"

  • news

    Visible to the public "US on Track For Record Number of Data Breaches"

    This year could be another record breaker for data compromise following 951 publicly reported incidents in the second quarter, the Identity Theft Resource Center (ITRC) has warned. The ITRC has been tracking publicly reported data breaches and exposures since 2005. The ITRC noted that while the figures for Q2 2023 represent a 114% increase on the previous three months, the total for the first half of the year stands at 1393 data compromise events. That's higher than the total figure for every year but one between 2005 and 2020, the ITRC said. It also puts 2023 on track to beat the previous all-time high of 1862 compromises recorded in 2021. The ITRC stated that the H1 2023 figure represents a 153% year-on-year increase, with breach notices impacting a staggering 156 million individuals. The ITRC noted that although that's some way short of the 424 million people affected by data events in 2022, the figures should be concerning for security teams. The vast majority (99%) of incidents in the half year were the result of breaches, with just 12 data exposures recorded. Cyberattacks accounted for 75%, while "system and human error" contributed 22% of the total. Supply chain attacks accounted for 8% of total data compromise incidents and 14% of victims. The top industry affected by incidents was healthcare, followed by financial services. The ITRC noted that the number of data breaches with no actionable information about the root cause of the compromise grew 67% to 534 in H1 2023. The ITRC stated that opacity on the part of breached organizations impairs the ability of impacted parties to make informed decisions about what actions to take in the aftermath of incidents.

    Infosecurity reports: "US on Track For Record Number of Data Breaches"

  • news

    Visible to the public "New PyLoose Linux Malware Mines Crypto Directly From Memory"

    PyLoose, a new fileless malware, has been targeting cloud workloads to use their computational resources in order to mine Monero cryptocurrency. PyLoose is a Python script with a precompiled, base64-encoded XMRig miner, an abused open source tool that uses CPU power to solve the complex algorithms required for cryptocurrency mining. According to Wiz researchers, PyLoose's direct execution from memory makes it stealthy and difficult for security tools to detect. Malware that does not leave a physical footprint on the system's drives is less vulnerable to signature-based detection and typically injects malicious code into legitimate processes using legitimate system tools (Living-off-the-Land (LotL)). Wiz's security researchers first detected PyLoose attacks in the wild in June 2023. Since then, at least 200 cases of compromise by the new malware have been confirmed. This article continues to discuss the new fileless PyLoose malware.

    Bleeping Computer reports "New PyLoose Linux Malware Mines Crypto Directly From Memory"

  • news

    Visible to the public "Rockwell Automation ControlLogix Bugs Expose Industrial Systems to Remote Attacks"

    According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), two security vulnerabilities affecting Rockwell Automation ControlLogix EtherNet/IP (ENIP) communication module models could be exploited for Remote Code Execution (RCE) and Denial-of-Service (DoS). Researchers at Dragos noted that depending on the ControlLogix system configuration, exploiting these vulnerabilities could result in denial or loss of control, denial or loss of view, theft of operational data, or manipulation of control with disruptive or destructive effects on the industrial process for which the ControlLogix system is responsible. CISA noted that successfully exploiting these vulnerabilities could enable malicious actors to gain remote access to the running memory of the module and conduct malicious activity. This article continues to discuss the potential exploitation and impact of the two security flaws impacting Rockwell Automation ControlLogix EtherNet/IP (ENIP) communication module models.

    THN reports "Rockwell Automation ControlLogix Bugs Expose Industrial Systems to Remote Attacks"

  • news

    Visible to the public "CVSS 4.0 Released, to Help Assess Real-Time Threat and Impact of Vulnerabilities"

    CVSS version 4.0 is the next generation of the Common Vulnerability Scoring System standard released by FIRST. In the interface between suppliers and consumers, CVSS provides a way to catch the principal characteristics of a security vulnerability and forms a score that reflects its technical severity to inform and guide businesses, service providers, government, and the general public. This latest version of CVSS 4.0 aims to provide the most accurate vulnerability assessment for the industry and the public. The program provides consumers with finer granularity in base metrics, eliminates downstream scoring ambiguity, simplifies threat metrics, improves the effectiveness of assessing environment-specific security requirements, and more. Several supplemental attributes for vulnerability assessment, including Automatable, Recovery, Value Density, Vulnerability Response Effort, and Provider Urgency, have also been added. This article continues to discuss the release of CVSS 4.0.

    Help Net Security reports "CVSS 4.0 Released, to Help Assess Real-Time Threat and Impact of Vulnerabilities"

  • news

    Visible to the public "QuickBlox API Vulnerabilities Open Video, Chat Users to Data Theft"

    After researching QuickBlox's Software Development Kit (SDK) and Application Programming Interface (API), Team 82 and Check Point Research discovered critical vulnerabilities that put millions of users' personal data at risk. The chat and video calling platform QuickBlox is used in various fields, including the medical and financial sectors. Team 82 and Check Point Research were the first to develop multiple proof-of-concept (PoC) exploits for applications running the API as part of their research into the platform's vulnerabilities. The teams also showed examples of how threat actors may access information about QuickBlox users by using secret tokens and passwords in the platform's architecture. This article continues to discuss the QuickBlox API vulnerabilities.

    Dark Reading reports "QuickBlox API Vulnerabilities Open Video, Chat Users to Data Theft"

  • news

    Visible to the public "Hackers Say Generative AI Unlikely to Replace Human Cybersecurity Skills--Bugcrowd Survey"

    Bugcrowd, the multi-solution crowdsourced cybersecurity platform, has published its annual "Inside the Mind of a Hacker" report for 2023. The report explores various subjects, such as the potential impact of Artificial Intelligence (AI) on security, what professional hackers look like, and the current state of hacking. According to the report, 72 percent of hackers believe AI will not replace human creativity in security research and vulnerability management. Over half of the respondents surveyed for the 2023 report agreed that generative AI could already outperform hackers or will be able to do so within the next five years. However, hackers do not appear to be concerned about being replaced by generative AI, as the majority of respondents do not believe AI will be able to replicate the inventiveness of human hackers. This article continues to discuss key findings from Bugcrowd's annual Inside the Mind of a Hacker report for 2023 regarding the impact of AI, the rise of generative AI hacking, hacker stereotypes, and the state of vulnerability management.

    PR Newswire reports "Hackers Say Generative AI Unlikely to Replace Human Cybersecurity Skills--Bugcrowd Survey"

  • news

    Visible to the public "Microsoft Mitigated an Attack by Chinese Threat Actor Storm-0558"

    Microsoft mitigated an attack by a threat actor with ties to China, tracked as Storm-0558, which targeted customer emails. Storm-0558 threat actors have been observed conducting cyber espionage, data theft, and credential access attacks against government agencies in Western Europe. A customer reported the attack on June 16, 2023, but the investigation revealed that the attack began on May 15, 2023, when Storm-0558 gained access to the email accounts, impacting around 25 organizations, including government agencies and consumer accounts likely associated with these organizations. Using an acquired Microsoft account consumer signing key, the attackers forged authentication tokens to access user email. This article continues to discuss Microsoft's mitigation of a cyberattack by Storm-0558 threat actors.

    Security Affairs reports "Microsoft Mitigated an Attack by Chinese Threat Actor Storm-0558"

  • news

    Visible to the public "Satellite Security Lags Decades Behind the State of the Art"

    Researchers from Ruhr University Bochum and the CISPA Helmholtz Center for Information Security have evaluated the security of satellite systems. They analyzed three current low-earth orbit satellites and discovered a need for more implementation of modern security concepts. Different security mechanisms commonly found in modern mobile phones and laptops were missing, such as the separation of code and data. According to interviews with satellite developers, the industry relies on security through obscurity. The researchers devised multiple attack scenarios based on the software analysis' findings. They demonstrated that they could disconnect the satellites from ground control and take control of the systems, for example, to take pictures with the satellite camera. This article continues to discuss key findings from the experimental software security analysis of satellites.

    Ruhr University Bochum reports "Satellite Security Lags Decades Behind the State of the Art"

  • news

    Visible to the public "Fortinet Patches Critical FortiOS Vulnerability Leading to Remote Code Execution"

    Fortinet recently announced security updates that address a critical-severity vulnerability in FortiOS and FortiProxy that could be exploited for remote code execution (RCE). Tracked as CVE-2023-33308 (CVSS score of 9.8), the bug is described as a stack-based overflow issue impacting the deep inspection function in proxy mode. Fortinet noted that a stack-based overflow vulnerability in FortiOS & FortiProxy may allow a remote attacker to execute arbitrary code or command via crafted packets reaching proxy policies or firewall policies with proxy mode alongside SSL deep packet inspection. The company stated that because the issue only occurs if deep inspection is enabled on proxy policies or firewall policies with proxy mode, disabling the function prevents exploitation. The vulnerability impacts FortiOS and FortiProxy versions 7.2.x and 7.0.x and was resolved in FortiOS versions 7.4.0, 7.2.4, and 7.0.11, and FortiProxy versions 7.2.3 and 7.0.10. Fortinet noted that the bug was addressed in a previous release without an advisory. Recently, Fortinet also announced patches for a medium-severity FortiOS vulnerability that could allow an attacker to reuse a deleted user's session. Tracked as CVE-2023-28001, the flaw exists because an "existing websocket connection persists after deleting API admin." Fortinet noted that an insufficient session expiration vulnerability in FortiOS REST API may allow an attacker to reuse the session of a deleted user, should the attacker manage to obtain the API token. The vulnerability impacts FortiOS versions 7.2.x and 7.0.x and was addressed in FortiOS version 7.4.0. Fortinet users are advised to apply the patches as soon as possible.

    SecurityWeek reports: "Fortinet Patches Critical FortiOS Vulnerability Leading to Remote Code Execution"

  • news

    Visible to the public "Financial Industry Faces Soaring Ransomware Threat"

    According to cybersecurity provider SOCRadar, the financial industry has been facing a surge in ransomware attacks over the past few years. SOCRadar noted that this trend started in the first half of 2021 when Trend Micro saw a staggering 1318% increase in ransomware attacks targeting banks and financial institutions compared to the same period in 2020. Sophos also found that over half (55%) of financial service firms fell victim to at least one ransomware attack in 2021, a 62% increase from 2020. SOCRadar noted that although such large numbers have not yet been observed for the past two years, the increase continues. SOCRadar said the financial industry was the seventh most targeted sector by ransomware actors in the first half of 2023. The industry has already suffered more attacks in six months than in 2022. The company noted that not only is the frequency of attacks increasing, the sophistication and scope of ransomware attacks targeting banks have grown alarmingly in recent years.

    Infosecurity reports: "Financial Industry Faces Soaring Ransomware Threat"

  • news

    Visible to the public "World's Largest Association of Computing Professionals Issues Principles for Generative AI Technologies"

    The Association for Computing Machinery's global Technology Policy Council (ACM TPC) has issued "Principles for the Development, Deployment, and Use of Generative AI Technologies" in response to significant advancements in generative Artificial Intelligence (AI) technologies and the important questions these technologies raise in areas such as intellectual property, the future of work, and even human safety. Using the extensive technical knowledge of computer scientists in the US and Europe, the ACM TPC statement outlines eight principles designed to promote fair, accurate, and advantageous decision-making regarding generative and all other AI technologies. One of the principles pertains to increased security and privacy. Generative AI systems are vulnerable to many new security and privacy risks, including new attack vectors and data breaches. This article continues to discuss the principles for generative AI technologies issued by the ACM TPC.

    ACM reports "World's Largest Association of Computing Professionals Issues Principles for Generative AI Technologies"

  • news

    Visible to the public "Only Two Percent of Organizations Feel Confident in Their Cybersecurity Strategies"

    According to a new report from the critical infrastructure protection specialist OPSWAT, although 75 percent of organizations have made significant efforts to upgrade their infrastructure in the past year and 78 percent have increased their security budgets, only 2 percent of industry experts are confident in their security strategies. Most organizations have adopted public cloud hosting for their web applications, with 97 percent already using or planning to implement containerization. In addition, 62 percent of organizations use five or fewer antivirus engines to detect malicious file uploads, which represents a potential weakness because applying more engines can greatly strengthen an organization's defense against advanced malware. This article continues to discuss key findings from OPSWAT's report on the state of web application security.

    BetaNews reports "Only Two Percent of Organizations Feel Confident in Their Cybersecurity Strategies"

  • news

    Visible to the public "Hackers Target Chinese-Speaking Microsoft Users With 'RedDriver' Browser Hijacker"

    According to cybersecurity researchers, hackers are targeting Chinese-speaking Microsoft users with a tool called RedDriver that enables them to intercept web browser traffic. The Cisco Talos team has identified multiple variants of the RedDriver tool, which they believe has been used since at least 2021. The creators of RedDriver appear to be skilled in driver development and have an in-depth understanding of the Windows operating system. Drivers enable an operating system to communicate with hardware components, such as printers and monitors. This threat appears to target native Chinese speakers, as it seeks to take over Chinese-language web browsers. RedDriver was not linked to a specific cyber threat group. According to the researchers, the attack begins with a malicious file named DNFClient, referencing the popular game Dungeon Fighter Online. Once the file is executed, it initiates the download of RedDriver, described as a critical element of a multi-stage infection chain that ultimately hijacks browser traffic and redirects it. This article continues to discuss hackers targeting Chinese-speaking Microsoft users with RedDriver.

    The Record reports "Hackers Target Chinese-Speaking Microsoft Users With 'RedDriver' Browser Hijacker"

  • news

    Visible to the public "Scam Page Volumes Surge 304% Annually"

    Security researchers at Group-IB have recorded a 62% year-on-year (YoY) increase in phishing websites and a 304% surge in scam pages in 2022. The researchers found that the average number of instances in which a brand's image and logo was appropriated for use in scam campaigns increased 162% YoY, rising to 211% in APAC. In total, the researchers detected a 304% YoY increase in scam resources using the name and likeness of legitimate brands in 2022. Financial services were the most targeted sector (74%), followed by lotteries (12%), oil and gas (5%), and retail (3%). Financial services and social media were also the two most commonly phished industries. The researchers claimed that the increase in phishing and scam activity could be traced to the growing use of automation and social media in campaigns. The researchers noted that the trend will continue going forward with the use of AI text generators. In Europe, half (48%) of scams detected by the researchers in 2022 were spread via messaging apps, whereas in APAC (76%) and MEA (92%), the majority were disseminated on social media.

    Infosecurity reports: "Scam Page Volumes Surge 304% Annually"

  • news

    Visible to the public "Cryptocurrency Crime Is Down in 2023, but Ransomware Is Up"

    A snapshot of cryptocurrency-related crimes at the midpoint of 2023 revealed a drop in the amount of money directed to wallets associated with known or suspected criminal activity in nearly every category of crime. A report by Chainalysis revealed that the largest revenue decreases were attributable to cryptocurrency scams, which include investment scams, romance scams, pig butchering, and fraudulent cryptocurrency services. So far this year, wallets associated with fraudsters have received around $1 billion, a $3.3 billion decrease from the $4.3 billion they took during the first six months of 2022. Similar but less severe drops were also observed for hack-related wallets ($1.12 billion), cybercriminal administrators ($839 million), darknet markets ($59.8 million), and fraud shops ($44.1 million). This article continues to discuss insights from Chainalysis' report on revenue dips tied to cryptocurrency scams.

    SC Media reports "Cryptocurrency Crime Is Down in 2023, but Ransomware Is Up"

  • news

    Visible to the public "Apple's Rapid Zero-Day Patch Causes Safari Issues, Users Say"

    Less than 24 hours after releasing an emergency patch for a zero-day security flaw being actively exploited in the wild, Apple's patch rollout is reported to have broken certain websites in Safari. Apple's WebKit browser engine contains the flaw, tracked as CVE-2023-37450, that enables arbitrary code execution on patched iPhones, Macs, and iPads. It can be exploited in drive-by attacks by luring targets to websites containing malicious code. This vulnerability can be exploited in drive-by attacks by luring targets to booby-trapped websites. The company's Rapid Security Response (RSR) offered updates to all three operating systems and the browser itself. However, users began to report browser malfunctions following the installation of the patches. According to posts in the official macOS Support Community and the MacRumors user forum, Facebook, Instagram, WhatsApp, Zoom, and other applications began throwing "Unsupported Browser" errors in Safari after the updates were implemented. This article continues to discuss the bug found in Apple's WebKit browser engine and the issues caused by the emergency fix.

    Dark Reading reports "Apple's Rapid Zero-Day Patch Causes Safari Issues, Users Say"

  • news

    Visible to the public "Chinese Hackers Deploy Microsoft-Signed Rootkit to Target Gaming Sector"

    Researchers have discovered a Microsoft-signed rootkit designed to communicate with an actor-controlled attack infrastructure. Trend Micro attributes the activity cluster to the same actor previously identified as being responsible for the FiveSys rootkit, which was discovered in October 2021. According to Trend Micro's researchers, this malicious actor originates in China, and their primary victims are the gaming sector in China. Their malware appears to have gone through the Windows Hardware Quality Labs (WHQL) process to get a valid signature. Multiple variants of the rootkit spanning eight separate clusters have been identified, and 75 of such drivers were signed using Microsoft's WHQL program in 2022 and 2023. Trend Micro's analysis of a portion of the samples revealed debug messages in the source code, suggesting that the operation is still in the development and testing phase. This article continues to discuss the rootkit signed by Microsoft used by Chinese hackers to target the gaming sector.

    THN reports "Chinese Hackers Deploy Microsoft-Signed Rootkit to Target Gaming Sector"

  • news

    Visible to the public "Hackers Exploit Windows Policy to Load Malicious Kernel Drivers"

    Microsoft blocked code signing certificates mainly used by Chinese hackers and developers to sign and load malicious kernel-mode drivers on compromised systems through the exploitation of a Windows policy loophole. Kernel-mode drivers work at the highest privilege level on Windows (Ring 0), granting full access to the target machine for stealthy persistence, undetectable data exfiltration, and the ability to terminate nearly any process. Even if security tools run on the compromised device, a kernel-mode driver can interrupt their operation, disable their enhanced protection capabilities, or make targeted configuration changes to avoid detection. Microsoft introduced policy changes with Windows Vista that restricted how Windows kernel-mode drivers could be loaded into the operating system. This article continues to discuss hackers exploiting a Windows policy loophole to load malicious kernel-mode drivers.

    Bleeping Computer reports "Hackers Exploit Windows Policy to Load Malicious Kernel Drivers"

  • news

    Visible to the public "Same Code, Different Ransomware? Leaks Kick-Start Myriad of New Variants"

    According to the H1 2023 ESET Threat Report, trends in the threat landscape demonstrate the adaptability of cybercriminals as they seek out new methods of attack, such as exploiting vulnerabilities, gaining unauthorized access, compromising sensitive information, and defrauding individuals. Microsoft's stricter security policies, particularly regarding the opening of macro-enabled files, are a factor in the evolution of attack patterns. ESET telemetry data also suggests that the threat actors behind the once-notorious Emotet botnet have struggled to adapt to the shrinking attack surface, perhaps indicating that a different group has taken control of the botnet. Actors in the ransomware realm are increasingly reusing released source code to create new ransomware variants. This article continues to discuss key findings from the H1 2023 ESET Threat Report.

    Help Net Security reports "Same Code, Different Ransomware? Leaks Kick-Start Myriad of New Variants"

  • news

    Visible to the public "Leading the Way to Cyber Safety on Roads and Highways"

    A new research center led by the University of Houston aims to help prevent potential cyberattacks that could hinder the safe and efficient movement of people and products throughout the US and the world. The Transportation Cybersecurity Center for Advanced Research and Education (CYBER-CARE) is a US Department of Transportation (USDOT) University Transportation Center (UTC), Tier 1. Embry-Riddle Aeronautical University (ERAU), Rice University (RICE), Texas A&M University-Corpus Christi (TAMU-CC), the University of Cincinnati (UC), and the University of Hawaii at Manoa (UHM) are members of the consortium. The teams will establish a foundational body of knowledge and study advanced theories for mitigating the effects of possible large-scale cyberattacks on transportation infrastructure. CYBER-CARE will focus on the protection of vehicle control systems that perform safety-critical functions, the detection and response to potential cyber incidents involving US traffic networks, the development of a framework that incorporates cyber resilience, and more. This article continues to discuss the goals of CYBER-CARE research projects.

    The University of Houston reports "Leading the Way to Cyber Safety on Roads and Highways"

  • news

    Visible to the public "Quantum Physics Secures Digital Payments"

    Using a combination of modern cryptographic techniques and the fundamental properties of quantum light, scientists from the University of Vienna have designed an unconditionally secure system for shopping in digital settings. The research team demonstrated how the quantum properties of light particles or photons can guarantee unconditional security for digital payments. In an experiment, the researchers showed that each transaction cannot be duplicated or redirected by malicious parties, and that the user's sensitive data remains confidential. This article continues to discuss the demonstration of quantum physics-secured digital payments.

    The University of Vienna reports "Quantum Physics Secures Digital Payments"

  • news

    Visible to the public "Online Safety Bill Undermines Privacy Online, Say UK's Top Cyber Security Experts"

    Scientists from the UK's National Research Centre on Privacy, Harm Reduction, and Adversarial Influence Online (REPHRAIN) urge government and parliament to consider independent scientific evaluation before passing the Online Safety Bill that could inadvertently enable surveillance technologies and undermine online security. The Online Safety Bill's provision on scanning messages exchanged via apps such as WhatsApp and Signal is the subject of heated debate due to its potential to have far-reaching consequences for human rights. With end-to-end encryption (E2EE), no third parties, including service providers like WhatsApp and Signal, can read messages as they travel from senders to recipients. According to the independent evaluation, although the tools do not propose to weaken or break the E2EE protocol, the confidentiality of the E2EE service users' communications cannot be ensured if content intended to be sent privately within the E2EE service is monitored pre-encryption. This article continues to discuss cybersecurity experts highlighting the "alarming misunderstandings and misconceptions" about the proposed Online Safety Bill.

    University College London reports "Online Safety Bill Undermines Privacy Online, Say UK's Top Cyber Security Experts"

  • news

    Visible to the public "Harvard University Web Flaw Exposed It to Remote Attacks"

    A Harvard University subdomain vulnerability exposed the website to Remote Code Execution (RCE) attacks, potentially enabling threat actors to steal and modify stored data. The Cybernews research team discovered the WebLogic Server vulnerability with a severity score of 9.8 out of 10, affecting the Harvard University courses website. WebLogic Server is a Java-based application server developed by the American multinational computer technology company Oracle. The vulnerability, tracked as CVE-2020-2551, enables an adversary to execute code remotely on a vulnerable server without authentication. Researchers note that exploiting this vulnerability allows an attacker to gain complete control over the vulnerable server and access or modify sensitive data or disrupt business operations. This article continues to discuss the potential exploitation and impact of the Harvard University subdomain vulnerability.

    Cybernews reports "Harvard University Web Flaw Exposed It to Remote Attacks"

  • news

    Visible to the public "After School Hacks, Ransomware Criminals Expose Kids' Private Files Online"

    The sensitive documents that ransomware groups stole from schools and posted online describe student assaults, psychiatric hospitalizations, abusive parents, and more. Complete assault case folios containing this information were among the over 300,000 files released online in March after the 36,000-student Minneapolis Public Schools refused to pay a $1 million ransom. Other exposed data included medical records, complaints of discrimination, Social Security numbers, and employee contact information. Rich in digitized information, schools are ideal targets for cybercriminals seeking sensitive files that were once stored on paper in locked cabinets. School districts are often significantly ill-equipped to properly defend themselves and respond when attacked, especially as they struggle to help students recover from the pandemic and face shrinking budgets. This article continues to discuss the ransomware attack faced by the Minneapolis school system, why schools are an attractive target for hackers, and schools' cybersecurity struggle.

    PBS reports "After School Hacks, Ransomware Criminals Expose Kids' Private Files Online"

  • news

    Visible to the public "Clever Letscall Vishing Malware Targets Android Phones"

    A voice-based phishing (vishing) malware is targeting Android phones and stealing sensitive financial information from victims, as part of a trend generating millions of dollars in profits using vishing attack techniques. These attacks, unlike the common and simple vishing scams, take over handsets, implant prerecorded voice messages, and reroute calls to scammer call centers. Researchers' analysis of the vishing campaign details how the malware operates and links it to a collection of malicious Android apps. When victims are tricked into installing the malware, malicious actors can launch a series of vishing attacks. The malware currently targets victims in South Korea, but researchers believe it could be easily adapted to operate in any country and sold as a service on the dark web. ThreatFabric researchers noted in a recent report that they discovered the malicious Letscall app during their routine threat-hunting activities. According to the researchers, the malware is particularly effective for stealing personal information and conducting financial scams. Once infected, threat actors can take over the device's calling function, thus enabling them to make spoofed calls claiming to be from a financial institution or to redirect calls to their own call center when the victim attempts to call their bank. This article continues to discuss findings regarding the vishing campaign targeting Android phones.

    SC Magazine reports "Clever Letscall Vishing Malware Targets Android Phones"

  • news

    Visible to the public "Apple Ships Urgent iOS Patch for WebKit Zero-Day"

    Apple recently rolled out an urgent software update to its iOS and iPadOS mobile operating systems and warned that zero-day exploitation has already been detected. For the second time since adopting the "rapid security responses" process to address zero-day attacks, Apple pushed iOS 16.5.1 (a) and iPadOS 16.5.1 (a) to devices globally after an anonymous researcher disclosed the underlying vulnerability. The security defect exists in WebKit, the browser engine used by Safari, Mail, AppStore, and many other apps on iOS and macOS-powered devices. Apple noted that processing web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. The issue was addressed with improved checks. The vulnerability is CVE-2023-37450. So far, in 2023, there have been 41 publicly documented cases of zero-day attacks, with more than one-fifth (22 percent) affecting software code on Apple devices.

    SecurityWeek reports: "Apple Ships Urgent iOS Patch for WebKit Zero-Day"

  • news

    Visible to the public "Personal Information of 11 Million Patients Stolen in Data Breach at HCA Healthcare"

    HCA Healthcare recently announced that the personal information of roughly 11 million patients was stolen in a data breach. The incident was discovered on July 5 after a threat actor posted on an underground forum information allegedly stolen from HCA Healthcare. The threat actor posted a list containing names, addresses, birth dates, gender information, phone numbers, email addresses, service dates, and appointment dates, according to HCA Healthcare. The company is currently investigating the incident and cannot confirm the number of individuals whose information was impacted. HCA Healthcare believes that the list contains approximately 27 million rows of data that may include information for approximately 11 million HCA Healthcare patients. The company noted that the information was extracted from "an external storage location exclusively used to automate the formatting of email messages." According to the healthcare services provider, clinical information, payment information, or other sensitive information (such as passwords, Social Security numbers, and driver's license numbers) was not stolen in the attack. HCA Healthcare has informed law enforcement of the incident and plans to contact the impacted individuals but believes the incident will not have a material impact. One of the largest healthcare services providers in the US, HCA Healthcare operates 180 hospitals and more than 2,300 ambulatory sites of care across 20 states and the United Kingdom.

    SecurityWeek reports: "Personal Information of 11 Million Patients Stolen in Data Breach at HCA Healthcare"

  • news

    Visible to the public "Moroccan Charged With OpenSea NFT and Crypto Theft"

    A Moroccan man has recently been charged with four counts relating to a scheme to steal nearly half-a-million dollars' worth of cryptocurrency and non-fungible tokens (NFT) from a US victim. Soufiane Oulahyane, 25, allegedly operated a phishing website that spoofed NFT marketplace OpenSea to access victims' cryptocurrency wallets and steal their money and NFTs. The Department of Justice (DoJ) stated that around September 2021, Oulahyane used paid advertising to ensure his phishing website appeared first in search results for "OpenSea." Victims visited the lookalike site as normal, believing they were interacting with the real thing, and entered their logins, only for them to be transmitted directly to Oulahyane. A Manhattan-based victim did exactly this on September 26, 2021, entering their crypto wallet seed phrase, which ended up in the hands of Oulahyane. The DoJ noted that almost immediately, he allegedly used that seed phrase to obtain unauthorized access to the victim's cryptocurrency wallet, transferring funds to another wallet under his control and selling dozens of the victim's NFTs on the OpenSea marketplace. In total, he is alleged to have made $448,923 from the stolen crypto and NFTs. Oulahyane is charged with wire fraud, use of an unauthorized access device, affecting transactions with an access device to receive something of value that is equal to or greater than $1000, and aggravated identity theft. These carry a total maximum combined sentence of 47 years in prison.

    Infosecurity reports: "Moroccan Charged With OpenSea NFT and Crypto Theft"

  • news

    Visible to the public "Cybercriminals Evolve Anti-detect Tooling for Mobile OS-Based Fraud"

    Researchers at Resecurity have identified the emergence of mobile Android-based tools called "mobile anti-detects." Criminals involved in online banking theft use these tools to impersonate compromised account holders and circumvent anti-fraud controls. The tools are priced between $700 and $1,000 and are designed for Android-based devices. They contain software that enables device firmware updates and customizable features, including fingerprint impersonation, GPS spoofing, and network anonymization. In addition, they include a version of HuskyDG's Magisk Delta, a popular tool for rooting and customizing Android devices by installing modules containing the "magiskhide" module. This article continues to discuss the emergence of adversarial mobile Android-based anti-detect tooling for mobile OS-based fraud.

    Security Affairs reports "Cybercriminals Evolve Anti-detect Tooling for Mobile OS-Based Fraud"

  • news

    Visible to the public "SCARLETEEL Cryptojacking Campaign Exploiting AWS Fargate in Ongoing Campaign"

    Threat actors are now targeting Amazon Web Services (AWS) Fargate as part of an ongoing attack campaign called SCARLETEEL. Alessandro Brucato, a security researcher at Sysdig, noted that cloud environments are still their primary target. However, tools and techniques have been adjusted to circumvent new security measures. There is also a more resilient and stealthy command-and-control (C2) architecture. The cybersecurity company first exposed SCARLETEEL in February 2023, detailing a sophisticated attack chain that resulted in the theft of proprietary data from AWS infrastructure and the launch of cryptocurrency miners. Cado Security's follow-up analysis uncovered possible ties to a prolific cryptojacking group known as TeamTNT, although Sysdig stated that it could be an imitator of TeamTNT's methods and attack patterns. The latest activity continues targeting AWS accounts by exploiting vulnerable public-facing web applications to gain persistence, steal intellectual property, and potentially generate $4,000 per day through cryptocurrency mining. This article continues to discuss the ongoing SCARLETEEL attack campaign exploiting AWS Fargate.

    THN reports "SCARLETEEL Cryptojacking Campaign Exploiting AWS Fargate in Ongoing Campaign"

  • news

    Visible to the public "10 Ways SecOps Can Strengthen Cybersecurity With ChatGPT"

    Security operations teams observe firsthand how quickly attackers reinvent their attack strategies, automate attacks on multiple endpoints, and do whatever it takes to evade cyber defenses. Attackers have shown themselves to be persistent. For example, they consider holidays opportunities to breach a company's cybersecurity defenses. Consequently, SecOps teams are on call 24 hours a day, seven days a week, including weekends and holidays, combating burnout, alert fatigue, and a lack of life balance. One of the most difficult aspects of leading a SecOps team is gaining scale from legacy systems that generate different types of alerts, alarms, and real-time data streams. The most troublesome and exploited gaps created by this lack of integration is not knowing whether a given identity has permission to use a particular endpoint and, if so, for how long. Systems unifying endpoints and identities help define the future of zero trust, and the Artificial Intelligence (AI)-driven chatbot ChatGPT demonstrates promise for addressing identity-endpoint gaps and other vulnerable threat surfaces. This article continues to discuss the potential use of ChatGPT to close the SecOps gap.

    VentureBeat reports "10 Ways SecOps Can Strengthen Cybersecurity With ChatGPT"

  • news

    Visible to the public "NIST Launches Generative AI Working Group"

    As security companies continue to release products and features that use advanced Artificial Intelligence (AI), researchers continue to warn of the security vulnerabilities and threats posed by this technology. The National Institute of Standards and Technology (NIST) has announced the formation of a new working group to help develop guidelines on how to implement generative AI more responsibly. Following the publication of the AI Risk Management Framework (AI RMF 1.0) in January and the debut of the Trustworthy and Responsible AI Resource Center in March, NIST launched the Public Working Group on Generative AI on June 22 to address the framework's application to new systems. The group will begin by developing a profile for AI use cases. The group will then test generative AI and conclude by evaluating how it can be used to address global issues in health, climate change, and more. This article continues to discuss the public working group that will develop guidance regarding the special risks of AI technologies that generate content.

    Dark Reading reports "NIST Launches Generative AI Working Group"

  • news

    Visible to the public "European Commission Adopts Adequacy Decision for Safe EU-US Data Flows"

    The European Commission has adopted its adequacy decision for the EU-US Data Privacy Framework. The decision is that under the new framework, the US will provide adequate protection comparable to that of the European Union for personal data transferred from the EU to US companies. Based on the new adequacy decision, personal data can transfer securely from the EU to US framework participants without the need for additional data protection safeguards. The EU-US Data Privacy Framework introduces new binding safeguards to address all the concerns raised by the European Court of Justice, such as limiting US intelligence services' access to EU data to what is necessary and proportionate, and establishing a Data Protection Review Court (DPRC) to which EU individuals will have access. This article continues to discuss the European Commission adopting its adequacy decision for the EU-US Data Privacy Framework.

    Help Net Security reports "European Commission Adopts Adequacy Decision for Safe EU-US Data Flows"