News Items

  • news

    Visible to the public "Microsoft Reclassifies Windows Flaw After IBM Researcher Proves Remote Code Execution"

    Microsoft has recently reclassified a Windows vulnerability after an IBM security researcher demonstrated that it can be exploited for remote code execution. In September, Microsoft announced that Windows and Windows Server updates patched CVE-2022-37958, an issue related to the SPNEGO Extended Negotiation (NEGOEX) security mechanism, which is used by clients and servers to negotiate the authentication protocol. The vulnerability was reported by an anonymous researcher, and the flaw appeared to lead to information disclosure. The tech giant assigned it an "important" rating. However, when it released its December 2022 Patch Tuesday updates, Microsoft also announced an update to the advisory for CVE-2022-37958, changing its rating to "critical" and warning that it can be exploited for remote code execution. Microsoft noted that the advisory and the vulnerability's rating were updated after IBM Security X-Force Red researcher Valentina Palmiotti showed that the flaw is, in fact, critical as it can be exploited by an unauthenticated attacker for remote code execution, it impacts a wide range of protocols, it does not require user interaction, and it's potentially wormable. IBM stated that the vulnerability could allow attackers to remotely execute arbitrary code by accessing the NEGOEX protocol via any Windows application protocol that authenticates, such as Server Message Block (SMB) or Remote Desktop Protocol (RDP), by default. IBM noted that this list of affected protocols is not complete and may exist wherever SPNEGO is in use, including in Simple Message Transport Protocol (SMTP) and Hyper Text Transfer Protocol (HTTP) when SPNEGO authentication negotiation is enabled, such as for use with Kerberos or Net-NTLM authentication. IBM compared CVE-2022-37958 to CVE-2017-0144, the vulnerability exploited by the NSA-linked EternalBlue exploit, but said the new flaw has a broader scope, and it could impact a wider range of systems due to the bigger attack surface of services exposed on internal networks or the internet. IBM noted that exploitation may require multiple attempts. Microsoft also noted in its advisory that "the successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability."

    SecurityWeek reports: "Microsoft Reclassifies Windows Flaw After IBM Researcher Proves Remote Code Execution"

  • news

    Visible to the public "OECD Signs Landmark Privacy Agreement"

    The OECD recently published a new transnational agreement that it claims will help to safeguard user privacy when data is accessed for national security and law enforcement purposes. The "OECD Declaration on Government Access to Personal Data Held by Private Sector Entities" clarifies how member countries' security and policing agencies can access this data under existing legal frameworks. It is designed to improve trust in cross-border data flows, which are key to driving global economic growth. OECD secretary-general Mathis Cormann stated that being able to transfer data across borders is fundamental in this digital era for everything from social media use to international trade and cooperation on global health issues. Yet, without common principles and safeguards, the sharing of personal data across jurisdictions raises privacy concerns, particularly in sensitive areas like national security. Cormann noted that the landmark agreement formally recognizes that OECD countries uphold common standards and safeguards. He stated that it will help to enable flows of data between rule-of-law democracies, with the safeguards needed for individuals' trust in the digital economy and mutual trust among governments regarding the personal data of their citizens. The agreement was signed by the 38 OECD countries, including the US and UK, as well as the EU, and is open to others to join. It is currently unclear whether it will help to smooth the increasingly fraught relationship between the EU and US over cross-border data transfers. European courts have thrown out previous agreements between the two on concerns that EU citizens' privacy can't be guaranteed given intrusive US state surveillance.

    Infosecurity reports: "OECD Signs Landmark Privacy Agreement"

  • news

    Visible to the public "IMDEA Software Creates a Tool Capable of Tracking Cybercrime Financial Transactions in Bitcoin"

    Researchers at IMDEA Software, Gibran Gomez, Pedro Moreno-Sanchez, and Juan Caballero, have developed an open-source automated tool to track the financial links of malicious entities abusing Bitcoin technology, which has been tested on 30 malware families. They presented their research in "Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration." The digital environment is plagued by cybercrime. Scams, phishing, identity theft, personal data theft, phishing, and computer fraud are only a few types of illegal network activities. Blockchain technology and cryptocurrencies, such as Bitcoin, have piqued the interest of cybercriminals, who have used them as a means of payment and even storage for unlawful reasons. The researchers, aware of this issue, have examined over 7,500 Bitcoin addresses belonging to 30 malware families, including ransomware families, clippers, sextortionists, and information stealers. The primary advantage of the back-and-forth exploration strategy employed in the study is that it enables recursive tracking of all transactions produced by a Bitcoin address. This means that if a Bitcoin address receives cryptocurrencies from another address, and that address then transmits them to a third address, the entire path of the cryptocurrency may be traced, beginning with either the first or the last address. According to Gomez, one of the primary benefits of the tool is that the user could transparently reproduce the entire process, allowing the results to be verified. In addition to serving Bitcoin users, the tool could be particularly useful for law enforcement agencies, as it would enable them to identify routes between malicious addresses and deposit addresses belonging to financial entities regulated by KYC policies. For example, the National Police could use such routes as evidence to secure a court order requiring from an exchange the personal identifying data associated with the addresses involved, and thus learn who the ultimate recipients of the unlawfully obtained funds are. This article continues to discuss the open-source automated tool developed by IMDEA Software researchers to track the financial relationships of malicious entities that abuse Bitcoin technology.

    IMDEA reports "IMDEA Software Creates a Tool Capable of Tracking Cybercrime Financial Transactions in Bitcoin"

  • news

    Visible to the public "Two-Thirds of Security Pros Have Burnt Out in Past Year"

    Security researchers at Promon have discovered that two-thirds of cybersecurity professionals have suffered burnout over the past year due to work-related stress. The researchers polled over 300 information security pros at this year's Black Hat Europe expo in London to better understand the mental health of those working in the industry. The researchers noted that of those who reported burnout, the largest group (50%) cited workload as their biggest source of stress. The researchers found that 51% of responding cybersecurity professionals are working more than four hours per week over their contracted hours, with nearly a fifth working more than 10 hours over. The researchers noted that the next biggest sources of stress cited by respondents were management issues (19%), difficult relationships with colleagues (12%), inadequate access to the required tools (11%), and being underpaid (7%). The researchers stated that although mental health is becoming less taboo, it remains off-limits for many professionals. Nearly two-fifths (37%) of respondents said they didn't feel comfortable talking about it with their employer, while a quarter (26%) claimed their workplace does not offer sufficient mental health support. A further 21% said they don't even know if their employer offers any support. The researchers noted that over two-fifths (41%) of those polled said they have considered moving jobs in the past year as a result of burnout. That's bad news for an industry already struggling with skills shortages.

    Infosecurity reports: "Two-Thirds of Security Pros Have Burnt Out in Past Year"

  • news

    Visible to the public "Hackers Leak Personal Info Allegedly Stolen From 5.7M Gemini Users"

    Customers of the Gemini cryptocurrency exchange have been targeted in phishing operations after a threat actor obtained their personal information from a third-party vendor. The news comes after various posts on hacker sites attempted to sell a database allegedly from Gemini, which includes phone numbers and email addresses belonging to 5.7 million of the exchange's members. The Gemini product security team issued an alert stating that an unknown third-party vendor experienced an incident that allowed an unauthorized actor to gather email addresses and partial phone numbers belonging to some Gemini customers. The cryptocurrency exchange's customers received phishing emails because of the incident. The attacker's goal has not been revealed, although such access to accounts and financial information is normally what threat actors seek. Gemini emphasizes that account information and systems have not been compromised, and that funds and customer accounts "remain secure." In September, there was an early attempt to monetize the database. The author did not specify how current the information was, but they did request 30 bitcoins. Another post was made in October under a different alias, stating that the data was from September. In mid-November, another post under a different account surfaced, offering databases from various cryptocurrency exchanges, including one from Gemini that allegedly had the same type of information for millions of customers. This article continues to discuss the exposure of 5.7 million Gemini users' personal information due to the third-party incident.

    Bleeping Computer reports "Hackers Leak Personal Info Allegedly Stolen From 5.7M Gemini Users"

  • news

    Visible to the public "GitHub Brings Free Secret Scanning to All Public Repos"

    Developers know that hardcoding security credentials into source code is a poor idea, but it still happens, and the repercussions can be disastrous. Previously, GitHub only made its secret scanning service available to paying enterprise users who purchased GitHub Advanced Security, but the company is now making its secrets scanning service free for all public GitHub repositories. In 2022, GitHub informed partners in its secret scanning partner program about over 1.7 million potential secrets exposed in public repositories. The service searches repositories for more than 200 known token formats, alerting partners to suspected leaks. Users can also define their own regex patterns. If the code is hosted on GitHub, the company will immediately alert users when secrets in their source code are exposed. In order to use the service, it must be activated in GitHub security settings. However, the service will be rolled out and will not be available to all users until the end of January 2023. This article continues to discuss GitHub making its secret scanning service available to all public repositories on the code hosting platform for free.

    TechCrunch reports "GitHub Brings Free Secret Scanning to All Public Repos"

  • news

    Visible to the public "Minecraft Servers Under Attack: Microsoft Warns About Cross-Platform DDoS Botnet"

    Microsoft has identified a cross-platform botnet aimed primarily at performing Distributed Denial-of-Service (DDoS) attacks against private Minecraft servers. The MCCrash botnet is distinguished by a novel spreading method that allows it to spread to Linux-based devices despite coming from malicious software downloads on Windows hosts. According to the company, the botnet grows by enumerating default credentials on Internet-exposed Secure Shell (SSH)-enabled devices. Since Internet of Things (IoT) devices are typically enabled for remote setup with potentially insecure settings, they could be vulnerable to botnet attacks such as this. The malware may persist on IoT devices after being removed from the infected source PC. Microsoft's cybersecurity branch is following the activity cluster tracked as DEV-1028. Most of the infections have been reported in Russia, with a smaller number being reported in Kazakhstan, Uzbekistan, Ukraine, Belarus, Czechia, Italy, India, Indonesia, Nigeria, Cameroon, Mexico, and Columbia. The company did not specify the scale of the campaign. The botnet's initial infection point is a pool of machines compromised by installing cracking programs claiming to provide illegal Windows licenses. The software then functions as a conduit to execute a Python payload containing the botnet's key features, such as scanning for SSH-enabled Linux devices to initiate a dictionary attack. When the propagation technique is used to breach a Linux host, the same Python payload is deployed to launch DDoS commands, one of which is designed to break Minecraft servers. Microsoft called the approach "highly efficient," and speculated that it might be sold as a service on underground forums. This article continues to discuss the MCCrash botnet launching DDoS attacks against private Minecraft servers.

    THN reports "Minecraft Servers Under Attack: Microsoft Warns About Cross-Platform DDoS Botnet"

  • news

    Visible to the public "NIST Retires SHA-1 Cryptographic Algorithm"

    According to security specialists at the National Institute of Standards and Technology (NIST), the SHA-1 algorithm, one of the first widely used techniques for securing electronic information, has reached the end of its useful life. The agency is now advising that Information Technology (IT) workers replace SHA-1 with more secure algorithms in the few cases where it is still utilized. Since 1995, SHA-1 has been used as part of the Federal Information Processing Standard (FIPS) 180-1. It is a modified version of SHA, the first hash function standardized for broad usage by the federal government in 1993. Since today's increasingly powerful computers can attack the algorithm, NIST has announced that SHA-1 should be phased out by December 31, 2030, in favor of the more secure SHA-2 and SHA-3 algorithms. SHA-1 has been used as a part of the foundation for numerous security applications, including website validation. It protects data by executing a complex math operation on the characters of a message, resulting in a short string of characters known as a hash. It is impossible to reconstruct the original message from the hash alone, but knowing the hash allows a recipient to determine whether the original message has been compromised. Little changes to the content drastically modify the resulting hash. Today's more powerful computers can create fake messages resulting in the same hash as the original, possibly jeopardizing the authenticity of the communication. In recent years, "collision" attacks have been launched to compromise SHA-1. NIST previously stated that federal agencies should avoid using SHA-1 in cases when collision attacks are a serious threat, such as when creating digital signatures. This article continues to discuss the retirement of the SHA-1 cryptographic algorithm.

    NIST reports "NIST Retires SHA-1 Cryptographic Algorithm"

  • news

    Visible to the public "Executives Take More Cybersecurity Risks Than Office Workers"

    Ivanti collaborated with cybersecurity experts and polled 6,500 executive leaders, cybersecurity professionals, and office workers to better understand current cybersecurity threat perception and how businesses are preparing for future threats. According to the survey, despite 97 percent of leaders and security experts saying that their firm is as prepared or more prepared to defend against cybersecurity attacks than it was a year ago, one in five do not believe their organization could prevent a damaging breach. The report indicates that firms are racing to strengthen against cyber threats, yet the industry still struggles with a reactive, checklist attitude. This is particularly seen in how security teams prioritize patches. While 92 percent of security experts said they have a process for prioritizing patches, they also said all types of patches rank high, meaning that none do. About half of respondents said they are "very prepared" to deal with the growing threat landscape, which includes ransomware, poor encryption, and malicious employees. Still, expected safeguards such as deprovisioning credentials are ignored one-third of the time. Nearly half of those surveyed believe a former employee or contractor still has active access to company systems and files. Leaders were found to engage in more risky behavior and are four times more likely to be phishing victims than office workers. This article continues to discuss key findings from the survey to understand the perception of cybersecurity threats and how companies are preparing for future threats.

    Help Net Security reports "Executives Take More Cybersecurity Risks Than Office Workers"

  • news

    Visible to the public  "Blackmailing MoneyMonger Malware Hides in Flutter Mobile Apps"

    MoneyMonger, an Android malware campaign, was discovered hidden in money-lending apps created with Flutter. According to research conducted by the Zimperium zLabs team, the malware leverages multiple levels of social engineering to exploit its victims and enables bad actors to steal private data from personal devices and use it to blackmail individuals. Zimperium experts say the MoneyMonger malware, spread through third-party app stores and sideloaded onto victims' Android devices, was designed to target those who need quick cash. It employs different levels of social engineering to exploit its victims, beginning with a predatory loan scheme and the promise of rapid cash for those who follow a few basic instructions. During the installation process, the victim is informed that certain permissions are required on the mobile device to verify their eligibility for a loan. These permissions are then used to capture and exfiltrate information, including the contact list, GPS location data, a list of installed applications, sound recordings, call logs, SMS lists, and storage and file lists. It also acquires access to cameras. This stolen information could be used to blackmail and intimidate people into paying high interest rates. If the victim fails to pay on time, and in some situations even after the loan has been repaid, the malicious actors threaten to disclose information, call individuals from the contact list, and transfer images from the device. One of the novel characteristics of this malware is its use of the Flutter Software Development Kit (SDK) to hide malicious code. While the open-source User Interface (UI) software kit Flutter has been a game-changer for application developers, bad actors have leveraged its capabilities and structure to launch apps with severe security and privacy risk to victims. MoneyMonger takes advantage of Flutter's framework to hide features and make the detection of malicious behavior via static analysis difficult. According to Richard Melick, director of mobile threat intelligence at Zimperium, consumers who use money lending apps are most at risk, but due to the nature of this threat and the manner in which attackers steal sensitive information for blackmail, they also put their employers or other organizations at risk. This article continues to discuss findings regarding the MoneyMonger Android malware campaign, the resurgence of banking Trojans, and the expected rise in blackmail threats in 2023.

    Dark Reading reports "Blackmailing MoneyMonger Malware Hides in Flutter Mobile Apps"

  • news

    Visible to the public "Rust Software Security: A Current State Assessment"

    Rust is an increasingly popular programming language. Although its user base remains small, it is considered a good language. For seven consecutive years, according to the Stack Overflow Developer Survey 2022, Rust has been the most-loved programming language. Rust possesses a distinctive security model that guarantees memory safety and concurrent safety while delivering the performance of C and C++. Due to Rust being relatively new, it has not been exposed to the same level of examination as older languages, such as Java. Therefore, Joseph Sible and David Svoboda, researchers at the Carnegie Mellon University (CMU) Software Engineering Institute (SEI), have released a blog assessing Rust's security promises. Rust's security model consists of its ownership idea and type system. The Rust compiler's borrow checker enforces a significant portion of its security paradigm. The borrow checker ensures memory safety and the absence of data races in Rust code. Java also enforces memory safety, but does so by introducing performance-degrading runtime garbage collection and runtime checks. Theoretically, the borrow checker ensures that Rust imposes nearly no performance penalty with memory checks at runtime. This excludes checks done explicitly by the source code. Therefore, the performance of compiled Rust code appears comparable to that of C and C++ code, and faster than that of Java code. Memory safety is lacking in traditional programming languages such as C and C++. As a result, programming errors can cause memory corruption, which often leads to security vulnerabilities. OpenSSL's Heartbleed vulnerability would not have occurred if the code had been written in a memory-safe language. The most significant advantage of Rust is that it detects errors at compile time that might otherwise result in memory corruption and other undefined behaviors at runtime in C or C++, without losing efficiency or low-level control. This article continues to discuss findings from the assessment of Rust software security.

    CMU reports "Rust Software Security: A Current State Assessment"

  • news

    Visible to the public "How ChatGPT Can Turn Anyone Into a Ransomware and Malware Threat Actor"

    Since OpenAI's launch of ChatGPT, commentators have expressed concern about the impact Artificial Intelligence (AI)-driven content creation will have on cybersecurity. Many researchers are concerned that generative AI solutions will make cybercrime more accessible. For example, without any technical or coding knowledge, any user can enter a query to generate malicious code and convincing phishing emails using ChatGPT. Security teams can use ChatGPT for defensive purposes such as code testing. However, the solution has significantly complicated the threat landscape by lowering the entry barrier for cyberattacks. The central challenge created by OpenAI's creation from a cybersecurity standpoint is that anyone, regardless of technical expertise, can create code to generate malware and ransomware on-demand. While ChatGPT can be used to help developers write good code, it can also and has already been used for malicious purposes, according to Matt Psencik, Director and Endpoint Security Specialist at Tanium. Psencik has already seen the bot be asked to assist in reverse engineering code to find zero-day exploits that could be used maliciously. ChatGPT has built-in safeguards to prevent the system from being used for illegal activity. For example, it will refuse to generate shellcode or provide specific instructions on how to generate shellcode or establish a reverse shell, and it will flag malicious keywords such as phishing in order to block the requests. The difficulty with these measures is that they rely on the AI identifying that the user is attempting to create malicious code, which users might obfuscate by rephrasing searches. In addition, there is no immediate penalty for breaching OpenAI's content policy. Security researchers have already started to test ChatGPT's potential to write malicious code. For instance, security researcher and co-founder of Picus Security, Dr. Suleyman Ozarslan, recently used ChatGPT to launch a phishing campaign and create ransomware for MacOS. This article continues to discuss how ChatGPT and other AI-driven content-creation platforms could impact cybercrime and cybersecurity.

    VB reports "How ChatGPT Can Turn Anyone Into a Ransomware and Malware Threat Actor"

  • news

    Visible to the public "Spafford wins ACSAC Cybersecurity Artifacts Competition and Impact Award"

    Professor Eugene H. Spafford earned the Annual Computer Security Applications Conference (ACSAC) 2022 Cybersecurity Artifacts Competition Impactful System Award for his artifact Tripwire: Integrity Scanning as Intrusion Detection. The selection of Spafford's work was based on its major contributions to cybersecurity research and practice. Tripwire was a UNIX environment integrity-checking program that enabled system administrators to keep track of newly added, deleted, and updated files and directories in file systems. The original tool was designed to be compatible with different versions of UNIX. Tripwire's architecture prioritized program and database portability due to the diverse nature of computer hardware at the majority of sites. Tripwire, designed to improve intrusion detection, was released on November 2, 1992, to beta test sites worldwide. Several issues were discovered, and four upgrades were issued in 1993. Tripwire's first official release was in December 1993. Gene Kim, a Purdue University undergraduate computer science major at the time, helped with coding and testing the system. Tripwire is still commonly employed. As the first free, publicly accessible intrusion detection tool and the first integrity monitoring tool, it was met with considerable success and attention. In the first year after its release, there were thousands of downloads, and based on sharing on other platforms, it was likely utilized by tens of thousands. Adoption of subsequent releases increased even further. For years, it was recommended by major Computer and Incident Response Teams (CIRTs) and numerous suppliers, and it was available in all the commonly used repositories. This article continues to discuss the Tripwire tool that earned Professor Eugene H. Spafford the ACSAC 2022 Cybersecurity Artifacts Competition Impactful System Award.

    Purdue University reports "Spafford wins ACSAC Cybersecurity Artifacts Competition and Impact Award"

  • news

    Visible to the public "Phishing Scams Are Coming to Town"

    The Christmas season is a busy time for phishers. According to Check Point research, 17 percent of all malicious files distributed via email in November were related to orders and shipping during the Black Friday holiday season, which is expected to worsen in December as attackers attempt to exploit shipping, package notifications, and more. In addition, researchers at the email security firm Avanan have discovered an increase in phishing campaigns involving direct deposits. The scammer will pose as an employee, requesting that the Human Resources department or a manager change their direct deposit information. Emails impersonating delivery companies such as UPS, DHL, and FedEx are also popular. These impersonation attacks attempt to obtain credentials, often in the form of a delivery charge or a compensation claim for a lost package. People are more likely to fall for these scams at this time of year because they are expecting packages. There is also the age-old scam of sending malware in the form of an attachment disguised as an invoice or delivery notification. This article continues to discuss the rise in phishing attacks this holiday season and how people can avoid falling victim to such attacks.

    BetaNews reports "Phishing Scams Are Coming to Town"

  • news

    Visible to the public "CISA Warns Veeam Backup & Replication Vulnerabilities Exploited in Attacks"

    The US Cybersecurity and Infrastructure Security Agency (CISA) has recently added two flaws affecting Veeam's Backup & Replication product to its Known Exploited Vulnerabilities Catalog. CISA added five flaws to its catalog on Tuesday, including ones affecting Veeam, Fortinet, Microsoft, and Citrix products. Veeam's Backup & Replication product is designed for automating workload backups and discovery across cloud, virtual, physical, and NAS environments. CISA noted that the vulnerabilities, tracked as CVE-2022-26500 and CVE-2022-26501, have been rated "critical," and they can be exploited by a remote, unauthenticated attacker for arbitrary code execution, which can lead to the hacker taking control of the targeted system. The security vulnerabilities were patched back in March. Veeam products can be a tempting target for malicious actors. The vendor says the impacted product is used by 70% of Fortune 2000 companies, including major firms such as Volkswagen, Siemens, Deloitte, Shell, Fujitsu, Airbus, and Puma. Companies are urged to patch the product as soon as possible.

    SecurityWeek reports: "CISA Warns Veeam Backup & Replication Vulnerabilities Exploited in Attacks"

  • news

    Visible to the public "Unsecure Bricks: API Vulnerabilities Found in Lego BrickLink Marketplace"

    Most people associate Lego with toy bricks and childhood imagination, but the Lego company has now entered the digital age by offering a service called BrickLink, which has been discovered to be insecure. A new report from Salt Security reveals the discovery of Application Programming Interface (API) security vulnerabilities in BrickLink, an online marketplace for buying and selling used Legos. The API security flaws can lead to a large-scale takeover of customers' accounts and server compromise. The API flows could have allowed threat actors to manipulate platform users and gain access to Personally Identifiable Information (PII) stored internally by the platform. Furthermore, an attacker could have gained access to internal production data, leading to a complete compromise of the company's internal servers. The flaws were discovered by inspecting areas of the website that support user input fields. Researchers discovered a Cross-Site Scripting (XSS) vulnerability in the coupon search functionality's "Find Username" dialog box, which allowed them to inject and execute code on an end user's machine via a crafted link. The Salt Security team chained the XSS vulnerability with a Session ID exposed on another page, hijacked the session, and took over the account. The second flaw was discovered on the "Upload to Wanted List" page. The endpoint allows users to upload an XML list of Lego parts and sets. The researchers used this feature to launch an XML External Entity (XXE) injection attack. Researchers were able to read files on the web server and execute a Server-Side Request Forgery (SSRF) attack by leveraging the XXE injection attack. It has the potential to be abused in a variety of ways, including stealing Amazon Elastic Compute Cloud (EC2) tokens from the server. This article continues to discuss the potential exploitation and impact of API vulnerabilities found in the Lego BrickLink marketplace.

    SiliconANGLE reports "Unsecure Bricks: API Vulnerabilities Found in Lego BrickLink Marketplace"

  • news

    Visible to the public "GAO Highlights Interoperability Challenges With Zero Trust"

    According to a Government Accountability Office (GAO) briefing document aimed at lawmakers, many federal agencies will find it difficult to design zero trust systems because the various products required to fully realize the strategy do not always function well together. Under guidance issued by the Office of Management and Budget (OMB) to comply with a May 2021 cybersecurity executive order, federal agencies are required to implement Zero Trust Architectures (ZTA) by the end of fiscal year 2024. President Joe Biden issued the order in response to the SolarWinds hack, which also involved Microsoft's Active Directory Federation System and the use of legitimate credentials to move laterally within victim networks. A ZTA requires authorization from a central point, also known as a trust algorithm, for individuals or devices attempting to access specific resources in a network. According to GAO's spotlight document, implementing a zero trust system to make such permitting decisions may involve technology to manage credentials, analyze threat intelligence and activity logs for unusual activity, monitor endpoints for malware, and encrypt data. Since there is no single ZTA solution, ZTA implementation calls for the integration of existing technologies as well as newer technologies. These technologies may not be designed to work together, especially in organizations with significant investments in traditional technologies. In order to emphasize the challenge, the GAO document cited work from the National Institute of Standards and Technology (NIST). GAO reported that organizations attempting to implement ZTA have encountered difficulties. A NIST project aimed at building and showing examples of ZTA using products and technologies from various vendors found that many Identity, Credential, and Access Management (ICAM) and endpoint protection technologies could not be integrated into a functional ZTA. This article continues to discuss the interoperability challenges with zero trust highlighted by a new GAO spotlight document.

    NextGov reports "GAO Highlights Interoperability Challenges With Zero Trust"

  • news

    Visible to the public "Social Blade Admits to Being Hacked"

    The popular data analytics company Social Blade has admitted to being hacked. Social Blade offers a data analytics tool based in the US that tracks social media platforms such as YouTube, Facebook, Twitter, and TikTok. The company claims to have seven million unique visitors to its website each month. Social Blade stated that it had been notified of a systems breach on December 14, while insisting no credit card data had been leaked. Other Personally Identifiable Information (PII), such as email addresses, Internet protocol (IP) addresses, hashes used to conceal passwords, client IDs, and authentication tokens for connected accounts, were among the data offered for sale on a dark web forum by the hacker behind the incident. Based on a cursory examination of the hacker's breach notification, a Cybernews researcher believes the threat actor may have performed a SQL injection attack. The hacker, who claims to have breached Social Blade in September, also stated that they intended to make only a few sales before deleting the thread advertising the data, but no price was listed. This article continues to discuss the Social Blade hack.

    Cybernews reports "Social Blade Admits to Being Hacked"

  • news

    Visible to the public "Distractions at Work Can Have Serious Cybersecurity Implications"

    According to new research by 1Password, distracted employees are twice as likely to do the bare minimum for security at work. The researchers found that 4 in 5 employees (79%) feel distracted on a typical workday, with 1 in 3 employees (32%) saying they're the most stressed they've ever been in their lives. The researchers noted that the top distractions include the Covid-19 pandemic (44%), recession/inflation (42%), economic uncertainty (38%), gas prices (34%), and personal relationships (29%). More than 1 in 4 employees (26%) say that distractions from world events make it hard to care about their job. The researchers stated that this has major repercussions for enterprise security, with distracted workers more than twice as likely as others to do only the bare minimum for security at work (24% vs. 10%). The researchers found that 3 in 4 employees (76%) are aware their individual actions have an impact on their company's overall security, and 82% would care if they caused a security breach. Nearly 9 in 10 employees (89%) now use authentication products or services such as two-factor (2FA) or multi-factor authentication (MFA), biometrics, password managers, and single sign-on. The researchers noted that there is a misperception that if security is too easy, it's not safe. The researchers stated that employees are three times as likely to trust two-factor or multi-factor authentication as they are to trust single sign-on (65% vs. 19%). During the study, the researchers also found that poor password hygiene is notably worse among employees at the level of director and above, with 49% using personal identifiers in their passwords. Despite knowing the risks associated, 1 in 3 employees reuse passwords. The researchers noted that one in 10 workers (10%) have used their work computers or devices for a side gig or another job, and tech workers are even worse (19%). This makes companies increasingly vulnerable to security risks.

    Help Net Security reports: "Distractions at Work Can Have Serious Cybersecurity Implications"

  • news

    Visible to the public "Over 85% of Attacks Hide in Encrypted Channels"

    Security researchers at Zscaler have found that the vast majority of cyberattacks over the past year have used TLS/SSL encryption to hide from security teams. The researchers analyzed 24 billion blocked threats during the period October 2021-September 2022 to compile their new "2022 State of Encrypted Attacks Report." The researchers found that over 85% of attacks are now HTTPS-based in a bid to stay hidden from security tools, a 20% increase on the previous year. The researchers argued that although legacy firewalls support packet filtering and stateful inspection, it's resource intensive to do this scale, meaning many encrypted threats go unchecked. The researchers noted that this is why certain sectors are more impacted than others, with manufacturing seeing a 239% increase in attacks over the period, followed by education (132%). The researchers stated that the US (155%), India (87%), and Japan (613%) recorded the biggest increases in encrypted attacks over the past 12 months. South Africa became a member of the top five list of countries most targeted by HTTPS-based attacks, alongside the US, India, the UK, and Australia. The researchers noted that malicious scripts and payloads, including ransomware, accounted for the vast majority (90%) of these attacks. On the positive side, The researchers noted that government organizations and retailers both saw the number of encrypted attacks fall by 40% and 63%, respectively.

    Infosecurity reports: "Over 85% of Attacks Hide in Encrypted Channels"

  • news

    Visible to the public "Hacker Claims Breach of FBI's Critical Infrastructure Portal"

    A hacker claims to have posed as the CEO of a financial institution and gained access to InfraGard's database of over 80,000 members. InfraGard is an outreach program run by the FBI that shares sensitive information on national security and cybersecurity threats with public officials and private sector actors operating critical infrastructure in the US. The hacker has posted samples allegedly from the database to an online forum popular with cybercriminals, claiming they were asking $50,000 for the entire database. The hacker also states that the data contains no Social Security numbers or birth dates. While the database has fields for that information, InfraGard's security-conscious users had left them blank. They claim to have been messaging InfraGard members as the CEO of the financial institution in order to obtain more personal information. The FBI has not explained how the hacker managed to get approved for the InfraGard membership. According to independent cybersecurity journalist Brian Krebs, who broke the story, when applying for InfraGard membership in November, the hacker included a contact email address that they controlled as well as the CEO's real mobile phone number. InfraGard consists of business leaders, Information Technology (IT) professionals, military, state and local law enforcement, and government officials who oversee the safety of the electrical grid, transportation, healthcare, pipelines, nuclear reactors, the defense industry, and more. This article continues to discuss a hacker claiming to have breached InfraGard's database.

    AP News reports "Hacker Claims Breach of FBI's Critical Infrastructure Portal"

  • news

    Visible to the public "Crooks Use HTML Smuggling to Spread QBot Malware via SVG Files"

    Talos researchers discovered a phishing campaign using Scalable Vector Graphics (SVG) images embedded in HTML email attachments to distribute the QBot malware. HTML smuggling is an evasive malware delivery method that involves using legitimate HTML5 and JavaScript features. Malicious payloads are delivered through encoded strings in an HTML attachment or webpage. The target device's browser, which is inside the security perimeter of the victim's network, generates the malicious HTML code. When the victim receives the email and opens the attachment, the browser decodes and runs the embedded script, which assembles a malicious payload directly on the victim's device. The embedded SVG files in the attack detailed by Talos contained JavaScript that reassembles a Base64 encoded QBot malware installer. The installer is then automatically downloaded through the victim's browser. The JavaScript embedded in the SVG image contains a malicious ZIP archive. Since the malware payload is assembled directly on the victim's machine rather than being transmitted over the network, this HTML smuggling technique can avoid detection by security devices. The QBot malware, which is spread through phishing messages, can hijack a victim's email and send itself out as a reply to an existing email thread. The smuggled JavaScript code inside the SVG image begins the attack when the recipient opens the HTML attachment. The script generates a password-protected malicious ZIP archive and then prompts the user to save the file. The password can be found in the HTML attachment. If the recipient enters the password provided by the attacker and opens the ZIP archive, an. ISO file can be extracted. The file allows the QBot malware to infect the victim. This article continues to discuss the new phishing campaign distributing the QBot malware to Windows systems using SVG files.

    Security Affairs reports "Crooks Use HTML Smuggling to Spread QBot Malware via SVG Files"

  • news

    Visible to the public "As Legislation Evolves, Businesses Need a Firm Understanding of Secure Payment Options"

    According to PCI Pal, despite the constant evolution of the financial landscape, consumers still want a smooth and secure payment journey above all else. Alessandro Dalla Volta, VP of Product at PCI Pal, says new technology and payment methods will be at the forefront of the industry in 2023. The payments landscape is expected to expand and evolve in the coming year, with customer service as a top priority for businesses and consumers open to new options. The proposed American Data Protection & Privacy Act (ADPPA) legislation is on the horizon, and the countdown to implementing PCI DSS version 4.0 continues. In regard to payment security in the future, the emphasis should be on improving existing measures in response to changing consumer and business landscapes. Companies in 2023 will need to understand secure payment methods and be prepared to pivot as the legislative landscape evolves over the next 12 months. The top payments trends and predictions for 2023 include the adoption of the latest open banking Application Programming Interfaces (APIs), increased use of Artificial Intelligence (AI), and more. This article continues to discuss the need for businesses to understand secure payment options as legislation changes and the top payments trends and predictions for 2023.

    Help Net Security reports "As Legislation Evolves, Businesses Need a Firm Understanding of Secure Payment Options"

  • news

    Visible to the public "Royal Ransomware Puts Novel Spin on Encryption Tactics"

    The Royal ransomware gang is demonstrating sophisticated tactics such as partial and rapid encryption, which researchers believe may reflect the years of experience its members gained as leaders of the now-defunct Conti Group. Royal ransomware appears to operate globally and independently. It does not appear that the group employs affiliates through Ransomware-as-a-Service (RaaS) or targets a specific sector or country. The group is known to demand up to $2 million in ransom and claims to have published 100 percent of the data extracted from its victims. Researchers from the Cybereason Security Research & Global SOC Team revealed that further analysis of how the Royal ransomware group works reveal an innovative group with varied ways to deploy ransomware and evade detection so it can do significant damage before victims can respond. The concept of partial encryption, which locks up only a predetermined portion of file content rather than all of it, is a key aspect of Royal's tactics. While partial encryption is not a new tactic, it is critical to Royal's strategy, with the group taking it to a new level not seen in ransomware activity before, according to the researchers. Royal has recently expanded the concept by basing the tactic on flexible-percentage encryption that can be tailored to the target, making detection more difficult, according to the Cybereason researchers. The group also uses multiple threads to accelerate the encryption process, giving victims less time to stop it once it begins, and the encryption starts and deploys in different ways, making detection difficult. This article continues to discuss new observations surrounding the Royal ransomware gang.

    Dark Reading reports "Royal Ransomware Puts Novel Spin on Encryption Tactics"

  • news

    Visible to the public "FBI Seized Domains Linked to 48 DDoS-For-Hire Service Platforms"

    The US Department of Justice (DOJ) has seized 48 Internet domains and charged six people in connection with the operation of booter or stresser platforms that allow anyone to easily conduct Distributed Denial-of-Service (DDoS) attacks. Booters are online platforms that allow threat actors to pay for DDoS attacks on websites and Internet-connected devices. They are essentially "booting" the target off the Internet. Stressers provide the same DDoS feature but claim to be used for legitimate testing of the dependability of web services and the servers that power them. Some websites use the term stresser to imply that the service can be used to assess the resilience of one's own infrastructure. However, this is a ruse, and these services exist to conduct DDoS attacks on victim computers not controlled by the attacker and without the victim's permission, according to an affidavit signed by FBI Special Agent Elliott Peterson of the Alaska field office. Threat actors create an account and deposit cryptocurrency, which is then used to pay for the services. This article continues to discuss the seizure of 48 Internet domains and charge of six suspects for their involvement in running booter or stresser platforms.


    Bleeping Computer reports "FBI Seized Domains Linked to 48 DDoS-For-Hire Service Platforms"

  • news

    Visible to the public "Senate Unanimously Passes Bill Banning TikTok From Government Devices"

    The Senate just passed a bill by unanimous consent that would ban the social media app TikTok from all government devices amid increased scrutiny over the app's perceived threats to national security. Lawmakers have been increasingly vocal about their concerns over the world's most popular app, owned by ByteDance, a Beijing-based company. Critics of the app worry that the company's connections to the Chinese Communist Party could lead to United States citizens' data being acquired by the U.S. adversary and used maliciously. Governors in some states have already issued bans or suggested bans of the app on state-issued or leased devices, including Nebraska, South Dakota, South Carolina, Maryland, Texas, Oklahoma, and Arkansas.

    Washington Examiner reports: "Senate Unanimously Passes Bill Banning TikTok From Government Devices"

  • news

    Visible to the public "Hackers Bombard Open-Source Repositories with Over 144,000 Malicious Packages"

    Unknown threat actors have published more than 144,000 packages in the NuGet, PyPI, and npm ecosystems as part of a new campaign. According to Checkmarx and Illustria researchers, the packages were part of a new attack vector in which attackers spammed the open-source ecosystem with packages containing links to phishing campaigns. Of the 144,294 malicious detected, 136,258 were published on NuGet, 7,824 on PyPI, and 212 on npm. The offending libraries have since been removed from the list or removed. Further investigation has shown that the entire process was automated, the packages were pushed quickly, and most usernames adhered to a specific convention. The fake packages themselves claimed to offer hacks, cheats, and free resources to trick users into downloading them. The package description contained links that led to the malicious phishing pages. The massive included over 65,000 unique URLs across 90 domains. According to the researchers, the threat actors behind this campaign likely wanted to improve the Search Engine Optimization (SEO) of their phishing sites by linking them to legitimate websites such as NuGet, emphasizing the importance of being cautious when downloading packages and only using trusted sources. These deceptive and well-designed pages promoted game hacks, "free money" for Cash App accounts, gift cards, and increased social media followers on platforms such as YouTube, TikTok, and Instagram. This article continues to discuss the targeting of NuGet, PyPI, and npm ecosystems in a new campaign that has led to over 144,000 malicious packages being published.

    THN reports "Hackers Bombard Open-Source Repositories with Over 144,000 Malicious Packages"

  • news

    Visible to the public "Iran-Linked Cyberspies Expand Targeting to Medical Researchers, Travel Agencies"

    Over the last two years, a cyberespionage group with ties to Iran's Islamic Revolutionary Guard Corps (IRGC) has been observed attacking new targets, including medical researchers, an aerospace engineer, and even a Florida-based realtor. TA453, also known as Phosphorus, Charming Kitten, and APT42, has a history of targeting Middle Eastern academics, policymakers, journalists, and dissidents. However, recent changes in their targeting and tactics suggest that the group has shifted its operations to support the IRGC's intelligence needs. According to Sherrod DeGrippo, Vice President of Threat Research and Detection at Proofpoint, they are going after new targets with new techniques and more hostile intent, providing insight into the goals of the IRGC and the flexible mandate under which TA453 operates. Proofpoint said it began to notice differences in TA453's targeting in late 2020, when the group was observed using credential harvesting attacks on senior professionals at various medical research organizations in the US and Israel. Most of the targets had genetics, oncology, and neurology backgrounds. Proofpoint researchers discovered spear phishing attacks targeting women's and gender studies scholars at different North American universities in July and August 2021. Around the same time, the group targeted multiple Iranian travel agencies operating out of Tehran with a credential harvesting operation, most likely to collect information about Iranians' movements outside of Iran. A February 2022 attack on a Florida-based realtor involved in the sale of multiple homes near the headquarters of US Central Command was another departure from the group's usual targets. CENTCOM is the US Combatant Command in charge of military operations in the Middle East. In addition to the shift in targeting, Proofpoint researchers stated that TA453 has recently adopted new techniques. For example, the group previously created email accounts and used them to send phishing emails to potential victims, but has recently begun targeting individuals using compromised accounts. This article continues to discuss changes in TA453's targets and tactics.

    The Record reports "Iran-Linked Cyberspies Expand Targeting to Medical Researchers, Travel Agencies"

  • news

    Visible to the public "ALMA Still Recovering From Devastating Cyberattack"

    The Atacama Large Millimeter/Submillimeter Array (ALMA) in Chile is still offline more than a month after a ransomware cyberattack on its computer systems. The disruption is interfering with astronomers' research projects worldwide and costs the observatory about a quarter-million dollars per day. When a number of ALMA users' computer tools stopped working on October 29, they realized the network had been attacked. Technicians isolated parts of their network that had been hacked, removing the need to pay a ransom. Although the attack did not reach the antennas or the correlator supporting observational data, ALMA has yet to resume operations. ALMA, which cost $1.4 billion to build, is one of the world's largest telescopes. It involves 66 large radio dishes in northern Chile's Atacama Desert. The dishes work as one telescope, observing at millimeter and submillimeter wavelengths. These wavelengths fall between radio and IR, making them particularly useful for studying star and galaxy formation. The European Southern Observatory (ESO), the National Science Foundation (NSF), and the National Institutes of Natural Sciences (NINS) operate the telescope in collaboration with the Republic of Chile. ALMA data is accessible to thousands of astronomers from around the world. The spread of the collaboration is one of the factors that allowed cybercriminals to gain a foothold in the organization. The hackers gained access to the system via a Virtual Private Network (VPN), most likely using stolen credentials. According to the ALMA director Sean Dougherty, the threat actors carried out a sophisticated attack that has been used to exploit more than 1,300 companies worldwide and extract approximately $100 million in ransom payments. While many science facilities around the world face attempted cyberattacks on a daily basis, ALMA is one of the first to suffer such a major breach. According to an NSF spokesperson, the agency is not aware of any significant cyberattacks against its facilities prior to the ALMA incident. This article continues to discuss the continued impact of the ransomware attack faced by ALMA.

    Physics Today reports "ALMA Still Recovering From Devastating Cyberattack"

  • news

    Visible to the public "Splunk Report Finds Public Sector Organizations Lack Cybersecurity Intelligence"

    According to new research from Splunk, public sector organizations lack the cybersecurity intelligence they require, and the problem is far worse than in the private sector. The Splunk 2022 Public Sector Survey reveals that nearly half of public sector agencies struggle to use data to detect and prevent cybersecurity threats, and 50 percent find it difficult to use data to inform cybersecurity decisions. It was discovered that 56 percent of public sector agencies have difficulty leveraging data to mitigate and recover from cybersecurity incidents. The report also looked into the data issues that directly affect public-private partnerships. According to the report, 44 percent of respondents in the public sector believe that the shared cybersecurity intelligence available to them should be improved for their needs, compared to 29 percent of respondents in the private sector. Despite a general trend toward sharing cybersecurity intelligence, the survey found that public and private sector organizations are less likely to share cybersecurity intelligence outside their sector. Only 42 percent of respondents in the public sector report regularly sharing data with the private sector, while 38 percent of private sector respondents report sharing data with government agencies. The report cites challenges and scarce resources in leveraging data as the leading causes behind the lack of data sharing. Although dealing with cybersecurity in the public sector may be more difficult, both the public and private sectors share similar cybersecurity priorities. Improving threat response and remediation ranked first in the public and private sectors. Both the public and private sectors are planning investments to address cybersecurity priorities, including monitoring, threat intelligence, and security assessments. However, the private sector is more likely to plan investments in security orchestration, automation and response, centralized log management, and observability. This article continues to discuss the data challenges weakening the cybersecurity posture of organizations.

    SiliconANGLE reports "Splunk Report Finds Public Sector Organizations Lack Cybersecurity Intelligence"

  • news

    Visible to the public "VMware Fixed Critical VM Escape Bug Demonstrated at GeekPwn Hacking Contest"

    VMware patched three vulnerabilities in various products, including a virtual machine escape flaw exploited at the GeekPwn 2022 hacking competition and tracked as CVE-2022-31705. Yuhao Jiang, an Ant Security researcher, demonstrated a working exploit for the vulnerability during the GeekPwn hacking competition hosted by the Tencent Keen Security Lab. The flaw is a heap out-of-bounds write vulnerability in the USB 2.0 controller Enhanced Host Controller Interface (EHCI) with a CVSSv3 base score of 9.3. A malicious actor with local administrative privileges on a virtual machine could take advantage of this flaw to execute code as the virtual machine's VMX process on the host. Exploitation on ESXi is contained within the VMX sandbox, whereas on Workstation and Fusion, this may result in code execution on the machine where they are installed. The company also addressed command injection and directory traversal security flaws affecting the VMware vRealize Network Insight (vRNI) solution. These vulnerabilities are tracked as CVE-2022-31702 and CVE-2022-31703, respectively. This article continues to discuss the flaws recently fixed by VMware.

    Security Affairs reports "VMware Fixed Critical VM Escape Bug Demonstrated at GeekPwn Hacking Contest"

  • news

    Visible to the public "The DOD Aims for Full Zero Trust Deployment by 2027"

    According to the Department of Defense (DOD) CIO John Sherman, the Pentagon plans to implement a zero trust architecture across its entire enterprise by 2027. The goal is to have zero trust deployed across most of the DOD's enterprise systems. Sherman stated that while that is an ambitious goal for those familiar with zero trust, the adversary capability forces them to move at that rate. Remote work and connected devices are common in today's world. A company's technology stack is constantly being supplemented with new tools and applications. Therefore, enterprises can no longer define a perimeter to protect themselves, no matter how hard they try. Security must now be validated for each app, user, software, and device. All requests are assumed to be unauthorized until proven otherwise, with zero trust. Instead of relying on a single technology, zero trust employs various strategies, including multi-factor authentication (MFA), micro-segmentation, and Artificial Intelligence (AI)-driven contextual analytics. Organizations that adopt the zero trust strategy incur 20.5 percent lower costs for a data breach than those that do not. Companies that use zero trust save nearly $1 million in average breach costs compared to those without it. This article continues to discuss the Pentagon's plans to implement a zero trust architecture across its entire enterprise by 2027.

    Security Intelligence reports "The DOD Aims for Full Zero Trust Deployment by 2027"

  • news

    Visible to the public "Identifying Software Vulnerabilities Quickly and Efficiently"

    Fuzzware is a new system developed by researchers at Ruhr University Bochum's Horst Gortz Institute for Information Technology (IT) Security that specializes in analyzing embedded systems, which are minicomputers found in smart light bulbs, intelligent thermostats, Industrial Control Systems (ICS), and more. In order to detect errors in program code, the group employs fuzzing. Fuzzers are algorithms that feed random inputs into tested software to see if they can cause the application to crash. If there are programming errors, the software will crash. The fuzzer diversifies the input to explore as many program components as possible. Fuzzing is already used for testing operating systems such as Windows or Linux. However, it has not yet been widely used to test embedded systems because they present several challenges. The software, known as firmware, is embedded in the hardware with which it interacts. The systems often have limited memory and slow processors, thus presenting a problem if researchers want to perform direct fuzzing on the system. Testing all possible inputs and waiting for the system's response would take significant time, so the team does not examine the firmware in the industrial control unit or the light bulb directly. Instead, they virtually recreate the hardware in a process known as emulation. The emulator convinces the firmware that it is inside the real device by interacting with the program in the same way that the real hardware would. The researchers add another step to the fuzzing process to accelerate the procedure by narrowing down the possible inputs. They created a framework in which the inputs must be placed in order to be logical for the firmware. The Bochum team used Fuzzware to test 77 firmwares with colleagues from Santa Barbara and Amsterdam. In comparison to traditional fuzzing methods, they sorted out up to 95.5 percent of all possible inputs. This article continues to discuss the concept of fuzz testing and the development behind the new Fuzzware system.

    Ruhr University Bochum reports "Identifying Software Vulnerabilities Quickly and Efficiently"

  • news

    Visible to the public "HackerOne Surpasses $230 Million in Paid Bug Bounties"

    Bug bounty platform HackerOne recently found that ethical hackers have identified and reported more than 65,000 software vulnerabilities in 2022. The popular hacker-powered platform, which hosts bug bounty programs for both private and public organizations, including government agencies, has paid out a total of $230 million in bug bounties since its inception. HackerOne noted that to date, 22 hackers submitted vulnerability reports through their bug bounty program and have earned over $1 million in bounties, up from 12 in 2021. HackerOne stated that reports for vulnerability types typically introduced by digital transformation had seen the most significant growth, with misconfigurations growing by 150% and improper authorization by 45%. The overall time to remediation has also increased from 35 to 37 days. HackerOne found that aviation and aerospace companies were the slowest to patch, with a median time to remediate of 148.3 days, followed by medical technology organizations, at 73.9 days. Cryptocurrency and blockchain firms were the fastest, with 11.6 days to remediate. According to HackerOne, organizations need to implement effective vulnerability reporting means, as 50% of ethical hackers chose not to disclose the identified security issues because the impacted entities did not have a vulnerability disclosure program. Others (12%) were deterred by threatening legal language. HackerOne noted that cross-site scripting (XSS) vulnerabilities earned ethical hackers the largest amount of money in 2022, followed by improper access control bugs and information disclosure flaws. Insecure direct object reference (IDOR) and improper authorization rounded up the top five. HackerOne also found that 95% of ethical hackers focus on identifying vulnerabilities in websites, while 24% of them focus on cloud platforms. HackerOne observed an overall 45% increase in the use of vulnerability disclosure programs, with organizations in the pharmaceutical sector registering the highest increase, at 700%. The automotive, telecommunications, and cryptocurrency and blockchain industries also registered a rise in the use of vulnerability disclosure programs, at 400%, 156%, and 143% growth, respectively.

    SecurityWeek reports: "HackerOne Surpasses $230 Million in Paid Bug Bounties"

  • news

    Visible to the public "ESF Members NSA and CISA Provide Threat Assessment, Best Practices for 5G Network Slicing"

    Enduring Security Framework (ESF) partners, in collaboration with experts from the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA), published an assessment of potential threats associated with 5G network slicing, as well as strategies to help keep this emerging technology secure. The 5G technology standard for broadband cellular networks has the potential to increase data download and upload speeds, reduce latency, and enable more devices to connect to the Internet at the same time. Network slicing is a 5G network architecture that allows mobile service providers to divide their network into several independent "slices" in order to create specific virtual networks for different clients and use cases. The new report identifies management strategies to ensure each network slice's confidentiality, integrity, and availability. The Department of Defense (DOD) is integrating 5G technology into its enterprise. The ability to slice the network across the entire 5G system is a critical new capability that 5G provides over LTE. Therefore, the ability to use network slicing in a secure manner is required if the DOD is to use the feature, according to Andrew Thiessen, Chief Technologist of the DOD 5G Cross Functional Team. This assessment's threat and security considerations are aimed at mobile service providers, hardware manufacturers, software developers, and system integrators who design, deploy, operate, or maintain 5G networks. As new 5G policies and standards are released, there is still the possibility of end-user threats. There are risks associated with standard development, such as standard bodies developing optional controls that operators do not implement. Operators may introduce gaps in the network and invite malicious threat actors if these subjective security measures are not implemented. This article continues to discuss the 5G network slicing threat assessment and best practices published by the ESF, NSA, and CISA.

    NSA reports "ESF Members NSA and CISA Provide Threat Assessment, Best Practices for 5G Network Slicing"

  • news

    Visible to the public  "Unsafe on Any Site -- Over Three-Quarters of Americans Admit to Risky Online Behavior"

    According to the new Xfinity Cyber Health Report from Comcast, 78 percent of Americans engage in risky online behaviors that expose them to cyber threats, such as reusing or sharing passwords, skipping software updates, and more, which is a 14 percent increase from two years ago. Comcast's Xfinity Cyber Health Report combines data from a new Wakefield Research consumer survey of 1,000 US adults with national threat data collected by Xfinity's xFi Advanced Security platform. Among the findings is that Xfinity xFi homes have an average of 15 connected devices, a 25 percent increase from 2020. The average power user has 34 devices. In addition, 58 percent of consumers are planning to purchase at least one connected device this holiday season. Xfinity's xFi Advanced Security platform blocks an average of 23 unique threats per home each month, with the total number of attacks at least three-to-four times that number. According to the report, people continue to underestimate threats, with 74 percent of Americans believing their home network is attacked less than ten times per month. Sixty-one percent believe devices are secure right out of the box when purchased. Only 20 percent of those surveyed said they would immediately know if they fell victim to a cyberattack. Another 32 percent are unsure they would ever know if they were a cyberattack victim. Fifty-one percent of the respondents are unsure if they would know if a non-screen device, such as a robot vacuum or a smart plug, was hacked. This article continues to discuss key findings from Comcast's Xfinity Cyber Health Report.

    BetaNews reports "Unsafe on Any Site -- Over Three-Quarters of Americans Admit to Risky Online Behavior"

  • news

    Visible to the public "Cyber Attack on Australia's TPG Telecom Affects 15,000 Customers"

    TPG Telecom, an Australian telecommunications company, has been hit by a cyberattack that has put the data of 15,000 customers at risk. On December 13, Mandiant notified the company that it had discovered evidence of unauthorized access to a hosted exchange service. TPG Telecom then notified customers the following day, on December 14, that the affected service hosts email accounts for 15,000 iiNet and Westnet customers, both of which are owned by the telecommunications company. According to TPG Telecom, a preliminary analysis indicated that the attacker was looking for cryptocurrency and financial data. This is the third cyberattack on an Australian telecommunications company since October 2022. Telstra, the country's largest telecommunications company, was hit by a data breach in October 2022, affecting about 30,000 past and present employees. In October, Optus was hacked, resulting in a data breach affecting 10 million customers. In December 2022, Telstra disclosed that an internal Information Technology (IT) error resulted in a data leak that affected hundreds of thousands of customers. Due to the number of damaging cyberattacks targeting Australia in recent months, the government has decided to begin developing a new cybersecurity strategy in December 2022 in hopes of helping the nation strengthen its critical infrastructure and government networks, strengthening its cybersecurity capabilities.

    ITPro reports "Cyber Attack on Australia's TPG Telecom Affects 15,000 Customers"

  • news

    Visible to the public "SAP's December 2022 Security Updates Patch Critical Vulnerabilities"

    German software maker SAP recently announced the release of 14 new and five updated security notes as part of its December 2022 Security Patch Day, including four notes that address critical vulnerabilities in Business Client, BusinessObjects, NetWeaver, and Commerce. With a CVSS score of 10, the most severe of SAP's security notes updates a note released on April 2018 Patch Day, which deals with software updates for the Chrome-based browser in SAP Business Client. The second security note that SAP marked as hot news resolves a server-side request forgery (SSRF) in the BusinessObjects platform. Tracked as CVE-2022-41267 (CVSS score of 9.9), the vulnerability allows an attacker with "normal BI user privileges" to replace any file in the BusinessObjects server at the operating system level. SAP noted that this enables the attacker to take full control of the system and has a significant impact on the confidentiality, integrity, and availability of the application. The third hot news security note in SAP's December 2022 Security Patch Day resolves a critical improper access control flaw in NetWeaver's user defined search (CVE-2022-41272, CVSS score of 9.9) that could allow attackers to perform unauthorized operations. The last hot news note that SAP released this month deals with a remote command execution bug associated with Apache Commons Text in SAP Commerce (CVE-2022-42889, CVSS score of 9.8). SAP noted that the vulnerability was disclosed in October 2022 and has been compared to the notorious Log4Shell vulnerability, although it is not as widespread. This month, SAP also announced the release of five high-priority security notes that resolve vulnerabilities in BASIS, Business Planning and Consolidation, BusinessObjects, Commerce, and SAPUI5. Two of these are updates to notes released in October and November 2022. The remaining security notes that SAP announced on December 2022 Security Patch Day deal with medium-severity vulnerabilities in Disclosure Management, NetWeaver, Solutions Manager, BusinessObjects, Sourcing, and Contract Lifecycle Management.

    SecurityWeek reports: "SAP's December 2022 Security Updates Patch Critical Vulnerabilities"

  • news

    Visible to the public "High-Severity Memory Safety Bugs Patched With Latest Chrome 108 Update"

    Google recently announced a Chrome update that resolves eight vulnerabilities in the popular browser, including five reported by external researchers. All five security defects are use-after-free flaws, a type of memory safety bug that has been prevalent in Chrome over the past years and which Google has long-battled to eliminate. According to Google, four of these issues are high-severity bugs, impacting components such as Blink Media, Mojo IPC, Blink Frames, and Aura. Google noted that the vulnerabilities have been issued CVE identifiers CVE-2022-4436 to CVE-2022-4439 and are accompanied by CVE-2022-4440, a medium-severity use-after-free. Google says it has paid $17,500 in bug bounties to the reporting researchers, but the final amount might be higher, as only four out of five rewards have been disclosed. The latest Chrome browser release is currently rolling out to Mac and Linux users as version 108.0.5359.124 and Windows users as version 108.0.5359.124/.125. Google has not mentioned whether or not any of these vulnerabilities are being exploited in malicious attacks. To date, there have been nine documented Chrome zero-day flaws in 2022.

    SecurityWeek reports: "High-Severity Memory Safety Bugs Patched With Latest Chrome 108 Update"

  • news

    Visible to the public "Loan Fee Fraud Surges by a Fifth as Christmas Approaches"

    The UK's financial regulator has recently warned of an increase in scams promising non-existent loans as fraudsters look to pressure consumers struggling to make ends meet before Christmas. The Financial Conduct Authority (FCA) polled 2000 UK consumers last month. The FCA found that loan fee fraud rose 21% year-on-year for the 12-month period November 2021-October 2022. This doesn't include those who reported to the FCA but managed to avoid being scammed out of money. The FCA noted that victims typically receive an unsolicited call, text, or email offering them a loan and are pressured into making an upfront payment as a "deposit" or "admin fee" in order to proceed. However, there is no loan, and the scammers pocket the cash. The FCA found that two-fifths of consumers feel pressured by family and friends to maintain their usual Christmas spending this year, while a third are concerned about how they will afford it. More than one in eight participants said they plan to take out a loan this year. Worryingly, the regulator claimed that nearly two-thirds (64%) of consumers don't know what loan fee fraud is, and only a fifth (22%) can identify its warning signs. The FCA noted that the average amount lost is 260 pounds ($322), more than half the amount UK consumers expect to spend on presents this Christmas. The FCA stated, "if you are considering taking out a loan, please pause and check the FCA's Register to make sure you are dealing with a legitimate lender. Don't let scammers be the ones enjoying your Christmas this year."

    Infosecurity reports: "Loan Fee Fraud Surges by a Fifth as Christmas Approaches"

  • news

    Visible to the public "3.5M IP Cameras Exposed, With US in the Lead"

    Businesses and homeowners are increasingly relying on Internet Protocol (IP) cameras for surveillance. However, this gives them a false sense of security because threat actors can access and monitor a user's camera feed and use the unsecured device to hack into their network. According to new Cybernews research, the use of Internet-facing cameras is increasing exponentially. The Cybernews research team discovered 3.5 million IP cameras exposed to the Internet after looking at 28 of the most popular manufacturers, representing an eightfold increase since April 2021. Although default security settings have improved over the course of the review, some popular brands still use default passwords or do not require authentication, allowing anyone to spy on users. Furthermore, Chinese companies manufacture most of the Internet-facing cameras. While cosmetic security measures have been implemented, security leaders have long warned that the Chinese government can exploit Chinese companies' technologies. Most of the analyzed brands (96.44 percent of the discovered cameras) require users to set passwords or generate unique default passwords on the most recent models and firmware versions. This is a positive trend, but it does not imply that all cameras are safe, as the vast majority of these cameras are likely to be running outdated firmware. Currently, 3.56 percent (127,000) of all analyzed cameras recommend but do not enforce changing the default password. Over 21,000 cameras lacked an authentication setup, allowing anyone to access them and putting owners at risk of cyberattack. According to the study, most public-facing cameras that may be using default credentials are used in the US, where the team discovered over 458,000 such devices. Vietnam is the second most affected country, with almost 365,000 cameras, followed by the UK, with nearly 250,000 cameras. This article continues to discuss the surge in IP cameras, Chinese companies manufacturing the majority of Internet-facing cameras, the brands found to be the most insecure, and how users can bolster the security of their IP cameras.

    Cybernews reports "3.5M IP Cameras Exposed, With US in the Lead"

  • news

    Visible to the public "Apple Fixes 'Actively Exploited' Zero-Day Security Vulnerability Affecting Most iPhones"

    Apple has confirmed that a two-week-old iPhone software update fixed a zero-day security vulnerability, which it now says was actively exploited. The update, iOS 16.1.2, was released on November 30 to all supported iPhones, including the iPhone 8 and later, and included unspecified important security updates. According to Apple's security updates page, the update fixed a flaw in WebKit, the browser engine that powering Safari and other apps. If exploited, the flaw could allow malicious code to run on the person's device. Apple stated that the WebKit bug was discovered and reported by security researchers at Google's Threat Analysis Group (TAG), which investigates nation-state-backed spyware, hacking, and cyberattacks. When a user visits a malicious domain in their browser or via the in-app browser, WebKit bugs are often exploited. It is not uncommon for threat actors to discover vulnerabilities in WebKit that can allow them to gain access to the device's operating system and the user's private data. In addition, WebKit flaws can be combined with other flaws to bypass multiple layers of a device's defenses. According to Apple, the vulnerability was exploited against iOS versions prior to iOS 15.1, which was released in October 2021. Apple has also released iOS and iPadOS 15.7.2 to address the WebKit vulnerability in iPhone 6s and later models, as well as some iPad models. This article continues to discuss the actively exploited WebKit vulnerability that Apple has fixed.

    TechCrunch reports "Apple Fixes 'Actively Exploited' Zero-Day Security Vulnerability Affecting Most iPhones"

  • news

    Visible to the public "Google Releases Vulnerability Scanner for Open-Source Software, Backed by Community-Editable Database"

    Google has announced the release of Open Source Vulnerability (OSV)-Scanner, a free vulnerability scanner for developers to have access to vulnerability information about open-source projects, which is said to be the largest community-editable database for open-source vulnerabilities. OSV-Scanner allows developers to match code and dependencies against lists of known vulnerabilities and determine whether patches or updates are available. It provides security teams with a tool for automating the discovery and patching of vulnerabilities throughout the software supply chain, allowing them to eliminate potential entry points before hackers can exploit them. Last year, Google released the OSV schema and OSV.dev vulnerability database service. The OSV-Scanner has been released at a time when many organizations struggle to manage vulnerabilities, with enterprises taking an average of 60 days to patch critical risk vulnerabilities. Goolge intends to expand the solution by providing greater integration with developer workflows through standalone CI actions to schedule and track new vulnerabilities, as well as by building a larger database of C/C++ vulnerabilities. This article continues to discuss the launch of Google's OSV-Scanner.

    VB reports "Google Releases Vulnerability Scanner for Open-Source Software, Backed by Community-Editable Database"

  • news

    Visible to the public "Microsoft Squashes Zero-Day, Actively Exploited Bugs in Dec. Update"

    Microsoft has patched 48 new vulnerabilities in its products, including one that attackers are actively exploiting and another that was publicly disclosed but is not currently being exploited. Six of the vulnerabilities addressed in the company's final monthly security update for the year are classified as critical. It assigned an important severity rating to 43 vulnerabilities and a moderate severity rating to three flaws. Microsoft's update includes patches for out-of-band CVEs addressed in the previous month, as well as 23 vulnerabilities in Google's Chromium browser technology. The flaw being actively exploited by attackers is not one of the more serious bugs patched. The flaw allows attackers to circumvent the Windows SmartScreen security feature, which protects users from malicious files downloaded from the Internet. According to Microsoft, an attacker can create a malicious file that can evade Mark of the Web (MOTW) defenses, resulting in a limited loss of integrity and availability of security features that rely on MOTW tagging, such as Protected View in Microsoft Office. According to Kevin Breen, Immersive Labs' director of cyber threat research, this flaw poses only a minor risk to organizations as it must be used together with an executable file or other malicious code, such as a document or script file. In these cases, this CVE bypasses some of Microsoft's built-in reputation scanning and detection, specifically SmartScreen, which would normally alert a user that the file may not be safe. However, users should not underestimate the threat and should patch the flaw as soon as possible. Another flaw, an elevation of privilege issue in the DirectX Graphics kernel, was described by Microsoft as a publicly known zero-day but not actively exploited. The vulnerability, labeled as important, would allow an attacker to gain system-level privileges if exploited. This article continues to discuss some of the vulnerabilities addressed in Microsoft's final Patch Tuesday of the year.

    Dark Reading reports "Microsoft Squashes Zero-Day, Actively Exploited Bugs in Dec. Update"

  • news

    Visible to the public  "Nosey Parker: Find Sensitive Information in Textual Data and Git History"

    Praetorian has open-sourced the Nosey Parker secret scanning tool's regular expression-based (RegEx) scanning capabilities. One of the more common attack vectors for an organization is inadvertent secret disclosure. Nosey Parker addresses the pervasive problem of sensitive information such as passwords, Application Programming Interface (API) keys, access tokens, asymmetric private keys, client secrets, and credentials being exposed in source code and configuration files. If an attacker discovers these secrets, they could access keys to other systems. Application security engineers, cloud security engineers, site reliability engineers, and developers can use the open-source RegEx version to quickly find the number of security incidents and their location, preventing a manual, time-consuming process. According to Praetorian, the newly released version scan 100 gigabytes of Linux Kernel source history on a laptop in five minutes.

    Help Net Security reports "Nosey Parker: Find Sensitive Information in Textual Data and Git History"

  • news

    Visible to the public "Amazon ECR Public Gallery Flaw Could Have Wiped or Poisoned Any Image"

    A critical security flaw in the Amazon Elastic Container Registry (ECR) Public Gallery could have enabled attackers to delete any container image or inject malicious code into images from other Amazon Web Services (AWS) accounts. The Amazon ECR Public Gallery is a public repository of container images that are used to share ready-to-use applications and popular Linux distributions such as Nginx, EKS Distro, Amazon Linux, CloudWatch agent, and Datadog agent. A Lightspin security analyst discovered a new flaw in the ECR Public Gallery that allows users to modify other users' existing public images, layers, tags, registries, and repositories by abusing undocumented Application Programming Interface (API) actions. On November 15, 2022, the researcher reported the vulnerability to AWS Security, and Amazon fixed it in less than 24 hours. Although there is no evidence of this flaw being exploited in the wild, threat actors could have used it in large-scale supply chain attacks against many users. The top six most downloaded container images in ECR Public Gallery have had over 13 billion downloads, indicating that any malicious injection could have resulted in "out-of-control" infections. According to Lightspin, 26 percent of all Kubernetes clusters have at least one pod that pulls an image from the ECR Public Gallery. Therefore, the consequences could have been significant. This article continues to discuss the potential exploitation and impact of the severe security flaw discovered in the Amazon ECR Public Gallery.

    Bleeping Computer reports "Amazon ECR Public Gallery Flaw Could Have Wiped or Poisoned Any Image"

  • news

    Visible to the public "Ransomware Attackers Use Microsoft-Signed Drivers to Gain Access to Systems"

    Microsoft has revealed that it took action to suspend accounts used to publish malicious drivers certified by its Windows Hardware Developer Program, which were used to sign malware. The activity was limited to a number of developer program accounts, and no further compromise was discovered. Not only does cryptographically signing malware undermine a critical security mechanism, but it also allows threat actors to circumvent traditional detection methods and infiltrate target networks to perform highly privileged operations. On October 19, 2022, cybersecurity firms Mandiant, SentinelOne, and Sophos notified Redmond of rogue drivers being used in post-exploitation efforts, including the deployment of ransomware. One distinguishing feature of these attacks was that the adversary had already obtained administrative privileges on compromised systems before deploying the drivers. According to Microsoft, several developer accounts for the Microsoft Partner Center were involved in submitting malicious drivers in order to obtain a Microsoft signature. A new attempt to submit a malicious driver for signing on September 29, 2022, resulted in the sellers' accounts being suspended. Sophos discovered that the threat actors associated with the Cuba ransomware, also known as COLDDRAW, planted a malicious signed driver in a failed attempt to disable endpoint detection tools using a novel malware loader called BURNTCIGAR, which Mandiant first discovered in February 2022. The company also discovered three variants of the driver that were signed with code signing certificates belonging to two Chinese companies, Zhuhai Liancheng Technology and Beijing JoinHope Image Technology. This article continues to discuss ransomware attackers using malicious drivers certified by Microsoft.

    THN reports "Ransomware Attackers Use Microsoft-Signed Drivers to Gain Access to Systems"

  • news

    Visible to the public "Major Android Security Leak: Manufacturer Signing Keys Used To Validate Malware Apps"

    A security issue involving manufacturing keys from major device manufacturers such as LG and Samsung has opened the door for malware apps to infiltrate user devices as legitimate updates. These malware apps can grant an attacker complete system-level access to an Android device because the operating system trusts any app signed with this key. This attack would not necessarily need the end user to download a new app because it could be delivered as an update to an existing app on the device. Whether the app was installed through the Play Store, a manufacturer-specific outlet such as the Galaxy Store, or was sideloaded independently, makes no difference. Google disclosed the security leak but did not name the manufacturers involved. However, through subsequent listings on VirusTotal, independent researchers were able to learn the names of some of the companies that had keys stolen, which include Samsung, LG, Mediatek, RevoView, and SZROCO. Although Google only recently disclosed the security breach to the public, it claims that Samsung, LG, and all other known impacted companies had resolved the issue by May 2022. APKMirror, a third-party Android app archiving site, reports that malware apps using signed keys from Samsung were recently uploaded. VirusTotal reports exploits involving signed malware apps dating back to 2016. The manufacturers involved claim to have resolved the issue within their own environments, but it is impossible to know if other manufacturers were impacted and their current status. According to Ivan Wallis, Global Architect at Venafi, any manufacturer with these signing keys must act immediately. This situation illustrates the lack of proper security controls over code signing certificates, specifically signing keys for the Android platform. These certificate leaks are related to this, as these vendor certificates made their way into the wild, allowing for misuse and the potential to sign malicious Android applications masquerading as certain vendors. Bad actors can have access to the same permissions as the core service. Since there is a lack of information surrounding code signing, it is difficult to determine the impact of a breach because the private key could be anywhere. At this point, the code signing environment must be considered fully compromised, and key/certificate rotation must occur immediately. This article continues to discuss the potential impact of the Android security leak.

    CPO Magazine reports "Major Android Security Leak: Manufacturer Signing Keys Used To Validate Malware Apps"

  • news

    Visible to the public "Inside the Mind of a Cybercriminal: Do Digital Law Breakers Have a Personality Type?"

    Malicious hackers have long been stereotyped as antisocial, loners, and computer addicts by the general public. However, a scientific examination has revealed a more nuanced and complex picture of cybercriminals, with many threat actors showing skills and traits that would be considered positive or even admirable depending on context. A recent study led by Marleen Weulen Kranenbarg, assistant professor of criminology at Amsterdam's Vrije University, highlights the specific personal characteristics of digital offenders by comparing 261 cybercrime suspects to offline offenders. According to the study, cyber offenders have higher levels of diligence, conscientiousness, and self-regulation but low levels of modesty, fearfulness, flexibility, and aesthetic appreciation. Studying the specific mindsets and psychological proclivities of cybercriminals may be worthwhile in part because online crime is steadily increasing while other forms of offline crime are becoming less frequent. Furthermore, online and offline crime differ in significant ways that may influence the behavior of both cybercriminals and their victims. The researchers used the HEXACO personality inventory on 260 offline criminals and 261 online criminals who were formally suspected of committing either a cyber-dependent crime or an offline crime between 2000 and 2013. A community sample of 512 people who took the HEXACO test is also included in the study. Individuals are judged by HEXACO's model along six personality dimensions: honesty-humility, emotionality, extraversion, agreeableness, conscientiousness, and openness to experience. The findings show that the stereotype of the lone, socially awkward hacker is far from accurate. Many cybercriminals have a combination of positive skillsets and personality traits associated with the offline criminal community sample datasets. For example, cyber offenders' tendency to be thorough, detail-oriented, and cautious is advantageous when committing cybercrime. This article continues to discuss the study on the "cybercriminal personality" and how such insights into cybercriminals could help develop better defenses.

    SC Magazine reports "Inside the Mind of a Cybercriminal: Do Digital Law Breakers Have a Personality Type?"

  • news

    Visible to the public "ASU Researchers Collaborate Internationally to Secure Power Grid"

    Yang Weng, an assistant professor of electrical engineering at Arizona State University's Ira A. Fulton Schools of Engineering, is leading a cybersecurity collaboration that bridges American and Israeli organizations to improve both countries' capabilities to defend against cyberattacks on energy grid and water systems. The Israel-US Initiative on Cybersecurity Research and Development for Energy (ICRDE), came out of a proposal Weng sent to the Israel-US Binational Industrial Research and Development (BIRD) Foundation. The center was approved and officially opened in 2021. The collaboration's research is divided into three main themes: modeling and understanding physical processes in energy grid computer systems while developing a related knowledge database of cyberattack types; developing advanced monitoring tools to detect cyberattacks; and designing tools to increase system resilience and ensure reliability if the energy grid faces a cyberattack. As these are broad overarching themes, the researchers devised smaller projects to help the coalition achieve its goal of defeating cybersecurity threats. The first theme, database creation and cyber-physical interaction modeling, is represented by two projects. They will develop technology capable of understanding the physical processes in an energy system and modeling them in such a way that operators can recognize when a cyberattack is happening. These projects also aim to build a knowledge database of known energy grid cyberattack types. Another project focuses on developing advanced tools for detecting cyberattacks, with the goal of developing Artificial Intelligence (AI)-based detection methods that can detect new types of cyberattacks that have not yet been cataloged. One of the most important aspects of the project is ensuring that the Machine Learning (ML) models can be understood by humans performing actual cybersecurity actions. This ensures that users of ML tools can distinguish between actionable results and faulty AI-powered recommendations based on tampered data. This article continues to discuss the projects aimed at protecting energy grids from cyberattacks.

    ASU reports "ASU Researchers Collaborate Internationally to Secure Power Grid"