News Items

  • news

    Visible to the public "Almost 2,000 Citrix NetScaler Servers Backdoored in Hacking Campaign"

    Nearly 2,000 Citrix NetScaler servers have been compromised in a massive campaign exploiting the critical Remote Code Execution (RCE) flaw, tracked as CVE-2023-3519. According to researchers, over 1,200 servers were backdoored before administrators installed the patch for the vulnerability, and they remain compromised because they have not been inspected for signs of successful exploitation. Researchers from the cybersecurity company Fox-IT (part of the NCC Group) and the Dutch Institute of Vulnerability Disclosure (DIVD) uncovered the large-scale campaign planting webshells on vulnerable Citrix NetScaler servers. This article continues to discuss the hacking campaign that has compromised almost 2,000 Citrix NetScaler servers.

    Bleeping Computer reports "Almost 2,000 Citrix NetScaler Servers Backdoored in Hacking Campaign"

  • news

    Visible to the public "QR Code Phishing Campaign Targets Top US Energy Company"

    A major US energy company was the target of a phishing campaign that sent more than 1,000 emails containing malicious QR codes designed to steal Microsoft credentials. The campaign, which Cofense discovered in May, used both PNG image attachments and redirect links associated with Microsoft Bing and well-known business applications, such as Salesforce and CloudFlare's Web3 services, with embedded QR codes. The fake Microsoft security alerts claimed that recipients were required to update their account's security settings for two-factor authentication (2FA), multi-factor authentication (MFA), and more. The images and links within the messages led recipients to a phishing page aimed at stealing Microsoft credentials. Although the campaign impacted multiple industries, a leading energy company in the US received the lion's share of the phishing emails, with its employees receiving over 29 percent of the more than 1,000 emails containing malicious QR codes. This article continues to discuss findings regarding the QR code phishing campaign.

    Dark Reading reports "QR Code Phishing Campaign Targets Top US Energy Company"

  • news

    Visible to the public "LinkedIn Users Targeted in Account Hijacking Campaign"

    LinkedIn users are the target of an ongoing account hijacking campaign. They are getting locked out of their accounts. The threat actors behind the malicious campaign are holding the compromised accounts for ransom. The Cyberint research team has observed a significant increase in online conversations on various social media platforms about LinkedIn accounts being compromised. Google Trends reveals that searches for "LinkedIn account hacked 2023" and "LinkedIn account recovery appeal" have increased by over 5,000 percent. The researchers hypothesize that the attackers are either attempting to brute-force account passwords or are using stolen login credentials from a prior, unidentified LinkedIn data breach. When they access the targeted account, they change the email address to one opened with the Russian web service rambler[.]ru and the account's password. This article continues to discuss the account hijacking campaign targeting LinkedIn users.

    Help Net Security reports "LinkedIn Users Targeted in Account Hijacking Campaign"

  • news

    Visible to the public "Cleaning Products Giant Clorox Takes Systems Offline Following Cyberattack"

    Cleaning products manufacturer and marketer Clorox recently announced that it has taken certain systems offline in response to a cyberattack. In a statement, the organization said it recently identified unusual activity on its IT systems. Upon detection, they immediately took steps to stop the activity and took certain systems offline. The affected systems remain offline as it is working on adding more "protections and hardening measures to further secure them." Clorox noted that, as a result, some operations are temporarily impaired. In a Form 8-K filing with the Securities and Exchange Commission (SEC), the company said it has implemented workarounds to enable offline operations and continue servicing customers, but disruptions are expected to continue. Clorox also told the SEC that it has informed law enforcement of the incident and that it is working with third-party cybersecurity experts to investigate the attack and restore its operations. Clorox did not provide additional information on the type of cyberattack it has fallen victim to. Clorox did not say whether any data was stolen from its systems nor how long it might take to restore the impacted systems. Clorox noted that the investigation into the nature and scope of the incident remains ongoing and is in its very early stages. Based in Oakland, California, Clorox makes and sells consumer and professional cleaning products, including Brita, Glad, Green Works Cleaning Products, Kingsford, Liquid-Plumr, Pine-Sol, and Tilex. The company has locations in 25 countries and territories worldwide and a market presence in over 100 countries.

    SecurityWeek reports: "Cleaning Products Giant Clorox Takes Systems Offline Following Cyberattack"

  • news

    Visible to the public "ASU Experts Explore National Security Risks of ChatGPT"

    Experts from Arizona State University (ASU) are bringing further attention to how ChatGPT and other Artificial Intelligence (AI)-driven chatbots threaten national security. According to Nadya Bliss, executive director of ASU's Global Security Initiative and chair of the Defense Advanced Research Projects Agency's (DARPA) Information Science and Technology Study Group, ChatGPT could be used to craft phishing emails and messages that target unsuspecting victims and trick them into revealing sensitive information or installing malware. This technology can generate a large number of emails that are difficult to detect. She emphasizes the possibility of accelerating sophisticated phishing attacks while reducing their cost. ChatGPT poses a cybersecurity threat due to its ability to rapidly generate malicious code, allowing attackers to create and deploy new threats quicker than security countermeasures can be developed. Malicious code generated by ChatGPT could be quickly updated to evade detection by traditional antivirus software and signature-based detection mechanisms. This article continues to discuss the ways in which ChatGPT and other AI chatbots pose national security risks and efforts to address these risks.

    Arizona State University reports "ASU Experts Explore National Security Risks of ChatGPT"

  • news

    Visible to the public "'DoubleDrive' Attack Turns Microsoft OneDrive Into Ransomware"

    According to SafeBreach researcher Or Yair, Microsoft's OneDrive file-sharing program can be used as ransomware to encrypt most files on a target machine beyond recovery, partly because Windows and Endpoint Detection and Response (EDR) programs inherently trust the program. Microsoft has patched OneDrive so that this vulnerability no longer affects client versions 23.061.0319.0003, 23.101.0514.0001, and later. Yair has packaged his OneDrive attack process into an automated tool called DoubleDrive, which is available on GitHub and compatible with older OneDrive versions. This article continues to discuss the DoubleDrive attack.

    SC Media reports "'DoubleDrive' Attack Turns Microsoft OneDrive Into Ransomware"

  • news

    Visible to the public "Most DDoS Attacks Tied to Gaming, Business Disputes, FBI and Prosecutors Say"

    According to federal officials investigating Distributed Denial-of-Service (DDoS) incidents, most attacks stem from business or gaming disputes. In recent years, much media coverage of DDoS attacks has centered on groups affiliated with or supporting nation-states, such as Russia, that launch them against the websites of rival governments. FBI special agent, Elliott Peterson, and Cameron Schroeder, chief of the cyber and IP crimes Section division at the US Justice Department, noted that most DDoS attacks resulted from petty disputes between children or business attempts to siphon customers. They gave a presentation about their work convicting 33-year-old Illinois native Matthew Gatrel, who was sentenced to two years in federal prison last year for operating a service that helped people launch over 200,000 DDoS attacks. Although they acknowledge a significant increase in geopolitically motivated DDoS attacks in 2021 and 2022, their investigation of Gatrel and other providers of DDoS-for-hire services revealed that the majority merely desired a gaming advantage. This article continues to discuss DDoS attacks associated with gaming and business disputes.

    The Record reports "Most DDoS Attacks Tied to Gaming, Business Disputes, FBI and Prosecutors Say"

  • news

    Visible to the public "Colorado Health Agency Says 4 Million Impacted by MOVEit Hack"

    The Colorado Department of Health Care Policy and Financing (HCPF) has recently revealed that the personal information of millions of individuals was compromised in a data breach resulting from the recent MOVEit cyberattack. The HCPF informed the Maine Attorney General's office that it has started informing close to 4.1 million individuals that their personal information might have been compromised in the incident. HCPF revealed that, on May 28, an unauthorized party accessed certain HCPF files that IBM, which is providing certain services to the organization, was transferring using MOVEit. Those files contained the personal information of both Health First Colorado (Medicaid) and Child Health Plan Plus members. The exposed information, the organization says, includes names, addresses, birth dates, Social Security numbers, demographic or income information, medical information, treatment information, and health insurance information. On August 11, the agency started notifying the potentially impacted individuals of the data breach, offering free credit monitoring and identity restoration services.

    SecurityWeek reports: "Colorado Health Agency Says 4 Million Impacted by MOVEit Hack"

  • news

    Visible to the public "Ongoing Xurum Attacks Target Magento 2 E-stores"

    Researchers at Akamai warn of ongoing attacks, dubbed Xurum, against e-commerce websites using the Magento 2 Content Management System (CMS). Attackers are exploiting a server-side template injection vulnerability, tracked as CVE-2022-24086, with a CVSS score of 9.8 in Adobe Commerce and Magento Open Source. The name Xurum derives from the domain name of the attacker's command-and-control (C2) server. The campaign has been active since at least January 2023, and the threat actors appear to be interested in payment stats for orders placed in the victim's Magento store during the past ten days. Sometimes, the attackers also used a software skimmer to steal credit card information and transmit it to a remote server. The evidence gathered by the researchers suggests that a Russian threat actor is responsible for the attacks. This article continues to discuss findings regarding the ongoing Xurum attacks targeting Magento 2 e-stores.

    Security Affairs reports "Ongoing Xurum Attacks Target Magento 2 E-stores"

  • news

    Visible to the public "New QwixxRAT Trojan Spreads Through Messaging Apps"

    A new cybersecurity threat known as QwixxRAT, a Remote Access Trojan (RAT), was recently discovered by the Uptycs Threat Research team in early August 2023. According to the researchers, QwixxRAT has caught attention due to its unusual distribution method. The threat actor behind it is spreading the malicious tool through popular communication platforms, Telegram and Discord. The researchers noted that once it gains access to a victim's Windows-based machine, QwixxRAT discreetly collects sensitive data, sending it to the attacker's Telegram bot. The researchers stated that beyond mere data theft, QwixxRAT wields formidable remote administrative tools, enabling attackers to control victim devices, launch commands, and even destabilize systems. To evade detection, the RAT employs a Telegram bot for command-and-control functionalities. This also allows the attacker to remotely manage the RAT and execute operations without triggering antivirus alarms. The researchers noted that QwixxRAT's impact is global, as its reach has been observed in evaluations of compromised systems worldwide. The researchers noted that from a technical standpoint, the RAT file is a C# compiled binary, functioning as a 32-bit executable file designed for CPU operations. The researchers revealed that the threat actor employed two distinct names for the same Remote Access Trojan (RAT). One alias used was "Qwixx Rat," while the other was identified as "TelegramRAT." The main function consists of a total of 19 individual functions, each serving a unique purpose.

    Infosecurity reports: "New QwixxRAT Trojan Spreads Through Messaging Apps"

  • news

    Visible to the public "North Korean Hackers Suspected in New Wave of Malicious npm Packages"

    The npm package registry has been hit in yet another highly targeted attack campaign aimed at luring developers to download malicious modules. According to the software supply chain security company Phylum, the activity resembles a previous attack wave discovered in June, which has since been attributed to North Korean threat actors. Nine packages have been identified as uploaded to npm between August 9 and 12, 2023. Due to the sophistication of the attack and the small number of affected packages, it is suspected that this is yet another highly targeted attack, likely involving social engineering to convince targets to install these packages, according to Phylum. This article continues to discuss the new attack campaign targeting the npm package registry.

    THN reports "North Korean Hackers Suspected in New Wave of Malicious npm Packages"

  • news

    Visible to the public "What's New in the NIST Cybersecurity Framework 2.0"

    The National Institute of Standards and Technology's (NIST) Cybersecurity Framework (CSF) has been updated, and is now aimed at organizations of all sizes. The framework was introduced nearly a decade ago as technical cybersecurity guidance for critical infrastructure interests such as energy, banking, and hospitals. Version 2.0 of the widely used NIST CSF has added a sixth function, govern, to the original framework's five (identify, protect, detect, respond, and recover) for an effective cybersecurity program. Viakoo's CEO, Bud Broomhead, explained that the new NIST update does not just help organizations with basic cybersecurity functions as it extends to other enterprise areas. Expanding the scope of the NIST framework to include all types of organizations acknowledges that all organizations face cyber threats and must have a plan to manage cyber hygiene and incident response. This article continues to discuss the updates and business benefits of CSF 2.0.

    Dark Reading reports "What's New in the NIST Cybersecurity Framework 2.0"

  • news

    Visible to the public "Threat Actors Use Beta Apps to Bypass Mobile App Store Security"

    The FBI has issued a warning about a new tactic used by cybercriminals to steal cryptocurrency. The tactic involves the promotion of malicious "beta" versions of cryptocurrency investment apps on mobile app stores. The threat actors submit the apps to mobile app stores as "betas," meaning they are in the early stages of development. They are meant to be used by tech enthusiasts or fans to test and provide feedback to developers before the software is officially released. The advantage of this method is that beta apps are not subjected to a standard, comprehensive code review process but are instead superficially inspected for safety. This less rigorous code review process is not enough to unearth the hidden malicious code that is activated post-installation to carry out a variety of hostile actions. This article continues to discuss threat actors using beta apps to bypass mobile app store security.

    Bleeping Computer reports "Threat Actors Use Beta Apps to Bypass Mobile App Store Security"

  • news

    Visible to the public "Navigating Generative AI Risks and Regulatory Challenges"

    In the second quarter of 2023, according to Gartner, the availability of generative Artificial Intelligence (AI), such as OpenAI's ChatGPT and Google Bard, became a top concern for enterprise risk executives. Generative AI was the second most frequently cited risk in Gartner's second quarter survey, making its debut in the top ten. This reflects the rapid rise in public awareness and usage of generative AI tools, as well as the scope of potential use cases. Gartner surveyed 249 senior enterprise risk executives in May 2023 to provide a benchmarked view of 20 emerging risks to business leaders. The report contains comprehensive information on the potential impact, time frame, level of attention, and perceived opportunities associated with these risks. This article continues to discuss key findings and observations regarding generative AI risks and regulatory challenges.

    Help Net Security reports "Navigating Generative AI Risks and Regulatory Challenges"

  • news

    Visible to the public "Over 100,000 Users of Hacking Forums Infected With Malware"

    Security researchers at Hudson Rock have recently discovered over 140,000 breached passwords associated with accounts on hacking forums after their owners were infected with info-stealing malware. The researchers searched their cybercrime intelligence database for infected computers with credentials associated with the top 100 cybercrime sites. The researchers found 120,000 such computers, claiming many of these belonged to hackers. The researchers noted that when a machine is infected with info-stealing malware, a "substantial" amount of data can be retrieved, which helps to unmask the owner, including emails and account usernames, auto-fill data containing personal information like addresses and phone numbers, and system information like IP addresses. The researchers stated that info-stealer infections as a cybercrime trend surged by an incredible 6000% since 2018, positioning them as the primary initial attack vector used by threat actors to infiltrate organizations and execute cyberattacks, including ransomware, data breaches, account overtakes, and corporate espionage. The researchers noted that most of the info-stealer malware found during the research was Redline, followed by Raccoon and Azorult. Those exposed in the research mainly hailed from Tunisia, followed by Malaysia, Belgium, the Netherlands, and Israel. The cybercrime forum with the most exposed infected users was "Nulled[.]to," followed by "Cracked[.]io" and "Hackforums[.]net." Interestingly, the researchers discovered that most of the credentials used on the hacking sites were stronger than those used even on government and military sites.

    Infosecurity reports: "Over 100,000 Users of Hacking Forums Infected With Malware"

  • news

    Visible to the public "UK Police Data Breach Exposes Victim Information"

    The Norfolk and Suffolk police in the UK have recently confirmed the accidental exposure of personal data belonging to more than 1000 individuals, including crime victims. The disclosure occurred within Freedom of Information (FOI) responses issued by law enforcement agencies. According to a joint statement from the East Anglian constabularies, a "technical issue" resulted in the inclusion of raw crime report data in a "very small percentage" of FOI responses distributed between April 2021 and March 2022. The compromised data in the Norfolk and Suffolk breach encompassed information stored within a dedicated police system, including data on crime reports, details regarding victims, witnesses, and suspects, and descriptions of the criminal acts. The spectrum of offenses encompassed domestic incidents, sexual offenses, assaults, thefts, and instances of hate crime.

    Infosecurity reports: "UK Police Data Breach Exposes Victim Information"

  • news

    Visible to the public "Study: A Social Workplace Keeps Scammers at Bay"

    A group of professors from the University of Virginia's McIntire School of Commerce recently published an article titled "Phishing Susceptibility in Context: A Multilevel Information Processing Perspective on Deception Detection," which delves into why employees fall victim to phishing email scams that compromise their organizations' security, despite heightened security awareness. It is estimated that between 70 and 90 percent of all cybersecurity breaches begin with phishing emails. To verify their hypotheses, they conducted an experiment in which finance division employees at a large university encountered simulated phishing attempts via email as part of their normal work routine. In addition to investing in phishing training, companies are encouraged to establish collaborations and connections among employees. According to the researchers, it is important to approach the prevention of phishing attacks as a "team sport." This article continues to discuss the importance of creating collaborations and connections between employees in the fight against phishing attacks.

    The University of Virginia reports "Study: A Social Workplace Keeps Scammers at Bay"

  • news

    Visible to the public "Netflow in the Era of EDR and Cloud: Helicopter Parenting for Your Network"

    As opportunities for network data collection increase and usage patterns change, "network parenting" methods must evolve. People continue to make mistakes despite well-defined security policies, technical safeguards, and extensive user education, and adversaries continue to be successful. According to Daniel Ruef, a researcher with Carnegie Mellon Software Engineering Institute's (SEI) Computer Emergency Response Team (CERT) Division, using the perspective of a Security Operations Center (SOC) treating their network as children for which they are responsible, aspects of parenting can be applied to determine uses of monitored data to build greater situational awareness. This article continues to discuss the importance of listening to one's network, the role of Endpoint Detection and Response (EDR) data, tailoring analytics to the cloud, and the need for real-time streaming data analysis.

    Carnegie Mellon University Software Engineering Institute reports "Netflow in the Era of EDR and Cloud: Helicopter Parenting for Your Network"

  • news

    Visible to the public "Intel Insiders Go Undercover Revealing Fresh Details Into NoName Hacktivist Operations"

    In an exclusive Black Hat interview with Cybernews, two Radware threat researchers posing as pro-Russian sympathizers disclose new information about the inner workings of the cyberterrorist group NoName057(16). These security gurus have proven firsthand that the gang's crowdsourced "DDoSia" platform provides a steady stream of cryptocurrency payouts to otherwise ordinary citizens who despise Ukraine and its Western supporters. According to the duo, there is no stop in sight. Research conducted by Radware shows that NoName dominated the pro-Russian hacktivist landscape in the first half of 2023, launching 1,174 attacks in 32 Western countries in just 176 days. Out of the 15 hacktivist groups identified, NoName is responsible for over 31 percent of all attacks. This article continues to discuss the undercover hacktivists' findings regarding the cyberterrorist gang NoName057(16).

    Cybernews reports "Intel Insiders Go Undercover Revealing Fresh Details Into NoName Hacktivist Operations"

  • news

    Visible to the public "US Cyber Safety Board to Review Cloud Attacks"

    The US government recently announced that the DHS's Cyber Safety Review Board (CSRB) is going to conduct a review on malicious attacks targeting cloud environments. The initiative will focus on providing recommendations for government, industry, and cloud services providers to improve identity management and authentication in the cloud. The DHS noted that initially, the review will focus on the recent Microsoft cloud hack but will then expand to issues relating to cloud-based identity and authentication infrastructure affecting applicable CSPs and their customers. The CSRB was established in February 2022 and is an initiative tasked with reviewing major cyber events, including their root cause, mitigations, and response.

    SecurityWeek reports: "US Cyber Safety Board to Review Cloud Attacks"

  • news

    Visible to the public "Google Chrome to Shield Encryption Keys From Promised Quantum Computers"

    Google has deployed a hybrid Key Encapsulation Mechanism (KEM) to protect symmetric encryption secret sharing while establishing secure Transport Layer Security (TLS) network connections. Devon O'Brien, the technical program manager for Chrome security, explained that starting with Chrome 116, Google's browser will support X25519Kyber768. The term is a combination of X25519, an elliptic curve algorithm currently used in the key agreement process for establishing a secure TLS connection, and Kyber-768, a quantum-resistant KEM that received NIST's approval for post-quantum cryptography last year. A KEM is a method for establishing a shared secret value between two parties in order for them to communicate in confidence using symmetric key encryption. It is a precursor to the secure exchange of information over a network. Google is deploying a hybrid version of the two algorithms in Chrome so that the web giant, users of its technology, and other network providers such as Cloudflare can test quantum-resistant algorithms while maintaining current security measures. This article continues to discuss Google's effort to protect encryption keys from quantum computers.

    The Register reports "Google Chrome to Shield Encryption Keys From Promised Quantum Computers"

  • news

    Visible to the public "Iagona ScrutisWeb Vulnerabilities Could Expose ATMs to Remote Hacking"

    Synack Red Team Members discovered several vulnerabilities in the ScrutisWeb ATM fleet monitoring software made by French company Iagona that could be exploited to remotely hack ATMs. The vendor patched the vulnerabilities in July 2023 with the release of ScrutisWeb version 2.1.38. ScrutisWeb allows organizations to monitor banking or retail ATM fleets from a web browser, enabling them to quickly respond to problems. The solution can be used to monitor hardware, reboot or shut down a terminal, send and receive files, and modify data remotely. It's worth noting that ATM fleets can include check deposit machines and payment terminals in a restaurant chain. The four types of vulnerabilities found by the researchers include CVE-2023-33871, CVE-2023-38257, CVE-2023-35763, and CVE-2023-35189. The flaws include path traversal, authorization bypass, hardcoded cryptographic key, and arbitrary file upload issues that can be exploited by remote, unauthenticated attackers. The researchers noted that threat actors could exploit the flaws to obtain data from the server (configurations, logs, and databases), execute arbitrary commands, obtain encrypted administrator passwords, and decrypt them using a hardcoded key. The researchers said an attacker can leverage the flaws to log into the ScrutisWeb management console as an admin and monitor the activities of connected ATMs, enable management mode on the devices, upload files, and reboot or power them off. Hackers could also exploit the remote command execution vulnerability to hide their tracks by deleting relevant files. The researchers noted that additional exploitation from this foothold in the client's infrastructure could occur, making this an internet-facing pivot point for a malicious actor.

    SecurityWeek reports: "Iagona ScrutisWeb Vulnerabilities Could Expose ATMs to Remote Hacking"

  • news

    Visible to the public "Hackers Rig Casino Card-Shuffling Machines for 'Full Control' Cheating"

    Joseph Tartaro, a researcher and consultant for the security company IOActive, along with IOActive colleagues Enrique Nissim and Ethan Shackelford, presented the findings of their months-long investigation into the Deckmate, the most widely used automated shuffling machine in casinos today. They found that if a small hacking device is plugged into an exposed USB port on the Deckmate 2, the latest version of the Deckmate, the shuffler's code could be altered to completely hijack the machine and tamper with its shuffling mechanism. According to the team, the Deckmate 2 has an internal camera to ensure every card is present in the deck. They could gain access to this camera to learn the entire order of the deck in real time, sending the information from their small hacking device via Bluetooth to a nearby phone held by a partner who could then send coded signals to the cheating player. Their shuffler hacking technique grants a cheater "100 percent full control," according to Tartaro. This article continues to discuss the possibility of hackers rigging the Deckmate 2 shuffler for full control cheating.

    Wired reports "Hackers Rig Casino Card-Shuffling Machines for 'Full Control' Cheating"

  • news

    Visible to the public "Alberta Dental Services Security Breach Exposes 1.47M Records"

    Alberta Dental Service Corporation (ADSC) has recently revealed that nearly 1.47 million individuals have been affected by a data breach that occurred between May 7 and July 9, 2023. ADSC administers dental benefits through various programs, and the incident has raised concerns over compromised personal information. The company stated that the breach was discovered on July 9, 2023, when an unauthorized third party gained access to a portion of ADSC's IT infrastructure and deployed malware, temporarily encrypting specific systems and data. ADSC didn't reveal how they were compromised. The breach impacted three groups in particular. Dental Assistance for Seniors Plan clients enrolled between July 1, 2015, and July 9, 2023, may have had their personal information compromised, including name, address, personal health number, date of birth, and dental benefits details. Low-Income Health Benefits Plan clients enrolled from January 1, 2006, to July 9, 2023, may have had their name, date of birth, dental benefits details, and government-issued identification number compromised. Dental Services Providers enrolled for direct payment of eligible health claims between January 1, 2010, and July 9, 2023, may have had their corporate details and license numbers exposed.

    Infosecurity reports: "Alberta Dental Services Security Breach Exposes 1.47M Records"

  • news

    Visible to the public "Nine Flaws in CyberPower and Dataprobe Solutions Expose Data Centers to Hacking"

    Multiple vulnerabilities affecting CyberPower's PowerPanel Enterprise Data Center Infrastructure Management (DCIM) platform and Dataprobe's iBoot Power Distribution Unit (PDU) were discovered by researchers at the Trellix Advanced Research Center. An attacker could exploit the vulnerabilities to gain unauthenticated access to these systems and conduct various malicious activities. CyberPower is a leading provider of data center hardware and infrastructure solutions, specializing in innovative power protection technologies and power management systems. The PowerPanel Enterprise DCIM platform enables Information Technology (IT) teams to configure, manage, and monitor the infrastructure of a data center via cloud connectivity. This platform functions as an integrated hub of information and control for all interconnected devices. These solutions are widely adopted by enterprises overseeing on-site server installations and expansive co-located data centers, including industry giants such as AWS, Google Cloud, Microsoft Azure, and more. This article continues to discuss the vulnerabilities in CyberPower's PowerPanel Enterprise DCIM platform and Dataprobe's iBoot PDU that could expose data centers to hacking.

    Security Affairs reports "Nine Flaws in CyberPower and Dataprobe Solutions Expose Data Centers to Hacking"

  • news

    Visible to the public "As Phishing Gets Even Sneakier, Browser Security Needs to Step Up"

    Phishing attacks are becoming increasingly sophisticated, requiring more advanced detection methods. Din Serussi, manager of the incident response group at Perception Point, explained that this is because modern forms of phishing are more difficult to detect, especially when employees work remotely, and are more challenging to protect. According to Serussi, 91 percent of cyberattacks start with a phishing email. In the past, it required time for an attacker to create a phishing template, but Artificial Intelligence (AI) can now generate a phishing template with an embedded malicious URL and malicious file in 30 seconds. This article continues to discuss Serussi's insights on modern phishing tactics used by attackers and how to address them.

    Dark Reading reports "As Phishing Gets Even Sneakier, Browser Security Needs to Step Up"

  • news

    Visible to the public "Macs Are Getting Compromised to Act as Proxy Exit Nodes"

    AdLoad malware has been targeting macOS systems for over five years. It is now delivering a new payload that, unbeknown to the owners, enlisted their systems in a residential proxy botnet. Many devices are infected, according to threat intelligence researchers from AT&T Alien Labs, who analyzed over 150 samples of malware they discovered in the wild. They have identified more than 10,000 IPs reaching out to the proxy servers each week that could be proxy exit nodes. It is unknown if all of these systems have been infected or if they are offering their systems voluntarily as proxies, but this could be indicative of a larger global infection. This article continues to discuss findings regarding the AdLoad malware.

    Help Net Security reports "Macs Are Getting Compromised to Act as Proxy Exit Nodes"

  • news

    Visible to the public "Ford Says Cars With Wi-Fi Vulnerability Still Safe to Drive"

    Ford warns of a buffer overflow vulnerability in the SYNC3 infotainment system used in many Ford and Lincoln vehicles, which could enable Remote Code Execution (RCE), but claims that vehicle safety is unaffected. SYNC3 is a modern infotainment system that supports Wi-Fi hotspots, phone connectivity, voice commands, and third-party applications. The WL18xx MCP driver for the Wi-Fi subsystem of the car's infotainment system contains the vulnerability, tracked as CVE-2023-29468. It allows an attacker within Wi-Fi range to cause a buffer overflow using a specially crafted frame. This article continues to discuss the potential exploitation and impact of the vulnerability in the SYNC3 infotainment system.

    Bleeping Computer reports "Ford Says Cars With Wi-Fi Vulnerability Still Safe to Drive"

  • news

    Visible to the public "Next-Gen OSDP Was Supposed to Make It Harder to Break in to Secure Facilities. It Failed."

    Researchers have uncovered a set of vulnerabilities that compromise a next-generation protocol designed to prevent the hacking of access control systems used at secure facilities on US military bases and buildings owned by federal, state, and local governments as well as private entities. The next-generation mechanism, Secure Channel, was introduced to the open standard, Open Supervised Device Protocol (OSDP), about ten years ago. Similar to the Wiegand protocol, OSDP provides a framework for connecting card readers, fingerprint scanners, and other peripheral devices to control interfaces that compare the collected credentials with a database of valid personnel. When credentials match, the control panel sends a message to open a door, gate, or other entry system. This article continues to discuss the OSDP Secure Channel.

    Ars Technica reports "Next-Gen OSDP Was Supposed to Make It Harder to Break in to Secure Facilities. It Failed."

  • news

    Visible to the public "Zoom ZTP & AudioCodes Phones Flaws Uncovered, Exposing Users to Eavesdropping"

    Multiple security flaws in AudioCodes desk phones and Zoom's Zero Touch Provisioning (ZTP) could be exploited by an adversary to conduct remote attacks. Using the vulnerabilities discovered in AudioCodes desk phones and Zoom's ZTP feature, an external attacker can gain complete remote control of the devices, according to an analysis by a SySS security researcher. The unrestricted access could then be used to eavesdrop on rooms or phone conversations, pivot through the devices to attack corporate networks, and even assemble a botnet of infected devices. This article continues to discuss the potential exploitation and impact of the vulnerabilities in AudioCodes desk phones and Zoom's ZTP.

    THN reports "Zoom ZTP & AudioCodes Phones Flaws Uncovered, Exposing Users to Eavesdropping"

  • news

    Visible to the public "Authorities Take Down Lolek Bulletproof Hosting Provider"

    Police have recently taken down a Lolek bulletproof hosting service criminals used to launch cyberattacks worldwide. The takedown was part of a coordinated effort between the Polish Central Cybercrime Bureau and the US Department of Justice (DoJ), alongside support from Europol and the Federal Bureau of Investigation (FBI). Europol stated that five of its administrators were arrested, and all of its servers were seized, rendering LolekHosted[.]net no longer available. The DoJ confirmed that a Polish national has been charged with computer fraud conspiracy. Unsealed court documents name the suspect as Artur Karol Grabowski, aged 36. Grabowski faces a maximum penalty of 45 years in prison if convicted on all counts. SentinelOne defines bulletproof hosting as hosting services that are considerably lenient about the kinds of material they allow their customers to upload and distribute.

    Infosecurity reports: "Authorities Take Down Lolek Bulletproof Hosting Provider"

  • news

    Visible to the public "SwRI Micropatch Algorithm Improves Ground-To-Spacecraft Software Update Efficiency"

    Southwest Research Institute (SwRI) has developed an algorithm to remotely update and fix spacecraft software using less time and data than other techniques. Not only does the tool improve the overall efficiency of satellite software transmissions, but it can also recover data from unsuccessful over-the-air updates and malicious cyberattacks. It identifies missing bytes and other errors before applying a custom "micropatch" to missing or damaged software. Instead of updating an entire file or operating system, as is typically required with over-the-air satellite software updates, the tool can detect and fix smaller errors, according to Henry Haswell, a research engineer in SwRI's Intelligent Systems Division. Researchers deployed and tested the tool on the International Space Station (ISS). SwRI collaborated with Axiom Space Inc. and Amazon Web Services (AWS) to upload and assess the micropatch technology on an ISS computer operated by Axiom Space. This article continues to discuss the SwRI micropatch algorithm that improves ground-to-spacecraft software update efficiency.

    Southwest Research Institute reports "SwRI Micropatch Algorithm Improves Ground-To-Spacecraft Software Update Efficiency"

  • news

    Visible to the public "A Puzzling Approach to Encryption"

    An advancement in data security is discussed in the International Journal of Information and Computer Security. The Japanese puzzle known as Sudoku promises a cryptographic system for text information, which works even in situations where there is limited computational power. The approach could be applied to Radio Frequency Identification (RFID) devices, medical devices, remote sensing networks, smart cards, and more. A team of researchers from Isra University, Iraq University College, and Al-Maaqal University demonstrated how the dynamic nature of the Sudoku puzzle could be used as the foundation of a secret encryption key or cipher to unlock a new approach to securing sensitive information. According to the researchers, the approach's dynamic nature significantly improves the security of the system. The team's results show that this approach outperforms other experimental lightweight cryptography methods. This article continues to discuss the message encryption scheme inspired by the Sudoku puzzle.

    Inderscience reports "A Puzzling Approach to Encryption"

  • news

    Visible to the public "Gootloader SEO Watering Hole Malware Targets Law Firms"

    Gootloader, a Search Engine Optimization (SEO) watering hole technique, has been observed targeting legal-related search terms. It has been identified as a threat to law firms and individuals conducting research online for legal information. According to Trustwave's SpiderLabs, the Gootloader malware exploits compromised WordPress sites for malware distribution and uses SEO poisoning techniques to achieve high rankings in web search results. Through the manipulation of search engine results and luring of unsuspecting users to compromised websites, Gootloader exploits users' trust in search results to deliver malicious payloads. Researchers found that close to 50 percent of these cases target law firms. In addition to English, the Gootloader campaign also targets the French, Spanish, Portuguese, German, and South Korean languages. This article continues to discuss findings regarding the Gootloader campaign.

    SC Magazine reports "Gootloader SEO Watering Hole Malware Targets Law Firms"

  • news

    Visible to the public "Federated Learning: How Private Is It Really?"

    Federated Learning (FL) is a popular structure that enables one to learn a Machine Learning (ML) model collaboratively. The classical FL structure involves multiple clients, each with their own local data that they may want to keep private, and a server responsible for learning a global ML model. One of the main reasons for FL's popularity is that clients can keep their data private while still benefiting from combined learning across all of their data. Saurabh Bagchi, a Purdue University professor of Electrical and Computer Engineering and Computer Science, and Arash Nourian, General Manager/Director of Engineering at AWS AI, discuss the ongoing back and forth over protecting data privacy through FL. This article continues to discuss experts' insights on the concept of FL and potential data leakage attacks.

    CACM reports "Federated Learning: How Private Is It Really?"

  • news

    Visible to the public "Multiple Flaws Found in the Avada WordPress Theme and Plugin"

    Multiple vulnerabilities have recently been identified in the widely used Avada theme and its accompanying Avada Builder plugin. Security researchers at Patchstack discovered the flaws. The researchers noted the Avada Builder plugin exhibits two weaknesses. The first is an Authenticated SQL Injection (CVE-2023-39309). The researchers stated that by exploiting this vulnerability, attackers possessing authenticated access could breach sensitive data and potentially execute remote code. The second vulnerability is a Reflected Cross-Site Scripting (XSS) vulnerability (CVE-2023-39306), enabling unauthenticated attackers to pilfer sensitive information and potentially heighten their privileges on impacted WordPress sites. Patchstack also discovered various vulnerabilities in the Avada theme. First among them is a Contributor+ Arbitrary File Upload vulnerability (CVE-2023-39307). With this vulnerability, contributors gain the ability to upload arbitrary files, which may encompass detrimental PHP files, thereby enabling remote code execution and compromising site integrity. The researchers also found an Author+ flaw (CVE-2023-39312). Here, the researchers were able to attain the capability to upload malevolent zip files, thereby introducing the potential for remote code execution and vulnerabilities within the site. The researchers stated that the last vulnerability discovered is the Contributor+ Server-Side Request Forgery (SSRF) vulnerability (CVE-2023-39313). Through this loophole, Contributors can instigate requests to internal services on the WordPress server, thereby potentially initiating unauthorized actions or data access within the organizational framework. The researchers noted that the vulnerabilities were reported to the Avada vendor on July 6, 2023, leading to the release of patched versions on July 11, 2023. To address these vulnerabilities, users are urged to update the Avada Builder plugin to version 3.11.2 and the Avada theme to version 7.11.2. The researchers noted that ensuring prompt updates is crucial to maintain website security.

    Infosecurity reports: "Multiple Flaws Found in the Avada WordPress Theme and Plugin"

  • news

    Visible to the public "CISA Discovered a New Backdoor, Named Whirlpool, Used in Barracuda ESG Attacks"

    Whirlpool, a new backdoor discovered by the US Cybersecurity and Infrastructure Security Agency (CISA), was used in attacks against Barracuda Email Security Gateway (ESG) devices. Barracuda, a provider of network security solutions, warned customers at the end of May that some of its ESG appliances had been compromised by threat actors exploiting a now-patched zero-day vulnerability. The vulnerability, tracked as CVE-2023-2868, exists in the email attachment screening module. The issue was discovered on May 19, and the company issued two security patches to address it on May 20 and 21. The company's investigation revealed that the vulnerability was exploited to target a subset of email gateway devices. According to the vendor's statement, the vulnerability has been exploited in real-world scenarios since at least October 2022. The malware families involved in the attacks are SALTWATER, SEASPY, and SEASIDE. This article continues to discuss the new backdoor Whirpool used in attacks against Barracuda ESG appliances.

    Security Affairs reports "CISA Discovered a New Backdoor, Named Whirlpool, Used in Barracuda ESG Attacks"

  • news

    Visible to the public "Most VPNs Can Be Tricked Into Leaking Traffic"

    According to university researchers, nearly 70 Virtual Private Network (VPN) clients and servers are vulnerable to an attack that can cause them to leak user traffic. The multi-campus collaboration named their attack TunnelCrack and has released proof-of-concept (POC) exploit code. TunnelCrack is a combination of two widespread security vulnerabilities in VPNs. According to the researchers, tests indicate that every VPN product is vulnerable on at least one device. The underlying cause of the vulnerabilities has been present in VPNs since their emergence in 1996. The researchers found that VPN clients enable traffic to be sent in the clear in two cases. In the first case, the traffic is being sent to their local network, meaning enabling the VPN does not disable access to the LAN. In the second case, the destination is the VPN server, a rule that eliminates routing loops. In these two cases, they discovered that routing exceptions could be manipulated to send arbitrary traffic outside of the VPN tunnel. This article continues to discuss TunnelCrack, a combination of two security vulnerabilities in VPNs.

    iTnews reports "Most VPNs Can Be Tricked Into Leaking Traffic"

  • news

    Visible to the public "How Sure Is Sure? Incorporating Human Error Into Machine Learning"

    Many Artificial Intelligence (AI) systems fail to grasp human error and uncertainty, especially in systems where a human provides the Machine Learning (ML) model with feedback. These systems are often programmed with the assumption that humans are always certain and correct, but in the real world, humans occasionally make errors and are uncertain. Therefore, researchers from the University of Cambridge, the Alan Turing Institute, Princeton, and Google DeepMind have been attempting to bridge the gap between human behavior and ML so that AI applications in which humans and machines collaborate can account for uncertainty more thoroughly. This could reduce risk and increase the trustworthiness and reliability of these applications. This article continues to discuss incorporating uncertainty into ML systems.

    The University of Cambridge reports "How Sure Is Sure? Incorporating Human Error Into Machine Learning"

  • news

    Visible to the public "Cybersecurity Project Plans to Connect Researchers Across the Country"

    As technology advances, the manufacturing industry increasingly adapts to digital instruction, from the production of fighter jets to cars. Mechanical parts can be designed on a computer and sent via the network to a manufacturing machine that follows digital instructions to create a part. The transition into the digital realm makes protecting online information a national interest. Recently, Dr. Narasimha Reddy, a professor in the Department of Electrical and Computer Engineering at Texas A&M University, received a grant from the National Science Foundation (NSF) to explore cybersecurity issues in digital manufacturing. He hopes that by getting ahead of the implementation of these digital manufacturing machines and addressing cybersecurity issues, manufacturing could be made more secure. Since these machines must receive instructions over the network, they could be sent malicious packets that cause damage. When a company uses modern manufacturing processes to produce parts for fighter jets, there is a risk that someone will compromise their network security. If these jets contain faulty equipment, there is a national security problem. This article continues to discuss the research aimed at making digital manufacturing more secure.

    Texas A&M University reports "Cybersecurity Project Plans to Connect Researchers Across the Country"

  • news

    Visible to the public "Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach"

    Northern Ireland's top police officer recently apologized for what he described as an "industrial scale" data breach in which the personal information of more than 10,000 officers and staff was released to the public. The incident is particularly sensitive given the delicate security situation in Northern Ireland, which is still trying to overcome decades of sectarian violence known as "The Troubles." The breach occurred Tuesday when the force responded to a Freedom of Information request seeking information about the number of officers and staff of all ranks and grades across the Police Service of Northern Ireland. The response accidentally included a table that contained the surnames, initials, locations, and departments for all employees, along with the information requested. A second breach that occurred in July was revealed Wednesday. That breach involved the theft of documents, including a spreadsheet containing the names of more than 200 serving officers and staff and a police-issued laptop and radio.

    SecurityWeek reports: "Northern Ireland's Top Police Officer Apologizes for 'Industrial Scale' Data Breach"

  • news

    Visible to the public "More Than 300K People Affected by Johns Hopkins Data Breach"

    In June, Johns Hopkins University and Johns Hopkins Health System learned that their systems were among those affected by a broad-based cybersecurity attack that targeted a widely used software platform for transferring data files called MOVEit. Initially, they believed 5,500 people were impacted at Johns Hopkins Health Care System and Johns Hopkins Howard County General Hospital. In a new update, now Johns Hopkins reveals that 310,405 people were affected by the hacking incident at Johns Hopkins Medicine. Hopkins noted that it has sent letters to those affected by the data breach, notifying them that they were eligible to sign up for two free years of credit monitoring. With such a large number of people affected, cybersecurity experts are warning that when unsecured protected health information is involved, that can mean things like Social Security numbers, medication information, and many other very personal and private information can be compromised.

    WBAL reports: "More Than 300K People Affected by Johns Hopkins Data Breach"

  • news

    Visible to the public "Computer Security Experts Offer Advice to Freeze Out Risk of Thermal Attacks"

    A team of computer security experts has devised a set of recommendations to defend against 'thermal attacks' that can steal personal information. Thermal attacks use heat-sensitive cameras to detect fingerprint traces left on surfaces such as smartphone screens, computer keyboards, and PIN pads. Hackers can reconstruct users' credentials using the relative intensity of heat traces across recently touched surfaces. Dr. Mohamed Khamis and his colleagues at the University of Glasgow set out to demonstrate the ease with which thermal images could be used to crack passwords. The team created ThermoSecure, a system that uses Artificial Intelligence (AI) to scan heat-trace images and correctly guess passwords in seconds. Dr. Khamis and his colleagues have now compiled the first comprehensive review of existing computer security strategies and surveyed users regarding their preferences for preventing thermal attacks on public payment devices such as ATMs and ticket dispensers. Their research also includes recommendations for manufacturers. This article continues to discuss the recommendations developed by a team of computer security experts to help defend against thermal attacks that can steal personal information.

    The University of Glasgow reports "Computer Security Experts Offer Advice to Freeze Out Risk of Thermal Attacks"

  • news

    Visible to the public "New Attack Alert: Freeze[.]rs Injector Weaponized for XWorm Malware Attacks"

    Malicious actors are using a legitimate Rust-based injector called Freeze[.]rs to launch the commodity malware XWorm. The attack chain, discovered by Fortinet FortiGuard Labs on July 13, 2023, begins with a phishing email containing a malicious PDF file. It has also been used to introduce the Remcos Remote Access Trojan (RAT) by means of the SYK Crypter cipher, which Morphisec first documented in May 2022. Cara Lin, a security researcher, noted that this file redirects to an HTML file and uses the 'search-ms' protocol to access an LNK file on a remote server. Once the LNK file is clicked, a PowerShell script executes Freeze[.]rs and SYK Crypter in order to carry out additional malicious actions. Freeze[.]rs is an open-source red teaming tool from Optiv that serves as a payload creation tool for bypassing security solutions and executing shellcode stealthily. This article continues to discuss the use of the Freeze[.]rs by malicious actors for XWorm malware attacks.

    THN reports "New Attack Alert: Freeze[.]rs Injector Weaponized for XWorm Malware Attacks"

  • news

    Visible to the public "Lapsus$ Hackers Took SIM Swapping Attacks to the Next Level"

    The US Department of Homeland Security (DHS) Cyber Safety Review Board (CSRB) released a report after analyzing the techniques, such as SIM swapping, used by the Lapsus$ extortion group to breach dozens of organizations with a strong security posture. In December 2022, a review of the group's operations began following a string of incidents attributed to or claimed by Lapsus$ after leaking proprietary data from alleged victims. Microsoft, Cisco, Okta, Nvidia, T-Mobile, Samsung, Uber, Vodafone, Ubisoft, and Globant are some organizations affected by the Lapsus$ group. Lapsus$ is a loosely organized group consisting primarily of teenagers from the UK and Brazil who acted between 2021 and 2022 for notoriety, financial gain, or fun. However, they also incorporated techniques of varying degrees of complexity with "flashes of creativity." This article continues to discuss the Lapsus$ hackers' SIM swapping attacks.

    Bleeping Computer reports "Lapsus$ Hackers Took SIM Swapping Attacks to the Next Level"

  • news

    Visible to the public "Threat Intelligence's Key Role in Mitigating Malware Threats"

    According to OPSWAT, malware, one of the most prevalent and pervasive initial threat vectors, continues to evolve and become more sophisticated. Using malware as a foothold, threat actors infiltrate targeted infrastructures and then move laterally to gain long-term access, cause damage, or exfiltrate data. Organizations rely on actionable threat intelligence garnered through sandboxes and advanced malware analysis technologies and processes to effectively combat these threats. This proactive approach enables organizations to strengthen infrastructure defenses, improve incident response capabilities, and customize security strategies based on the threats they likely face. Sixty-two percent of organizations recognize the need to increase their investments in threat intelligence tools and processes. Only 22 percent of organizations have fully matured threat intelligence programs, with most indicating that they are still in the early phases or need to invest in additional tools and processes. This article continues to discuss key findings from OPSWAT's survey on threat intelligence.

    Help Net Security reports "Threat Intelligence's Key Role in Mitigating Malware Threats"

  • news

    Visible to the public "Dell Credentials Bug Opens VMWare Environments to Takeover"

    Credentials hardcoded in the Dell Compellent storage array service could allow attackers to take control of enterprise VMware environments in organizations using both services. According to Enlyft, Dell Compellent reached its end of life in 2019. However, organizations that continue to use Dell storage integrated with VMWare environments must be aware of CVE-2023-39250, a "high" severity vulnerability that affects these systems. Tom Pohl, penetration testing team manager at LMG Security, demonstrates how an adversary within an enterprise network can identify and decode a private key associated with VMWare's centralized management utility via Dell Compellent, gaining complete control over a VMware environment. Since the key is the same for all Dell customers, a compromise at one organization could easily translate to a compromise at any other organization. According to Pohl, this is a real-world example of how a private key in software can lead to the complete compromise of an organization's network. This article continues to discuss the potential exploitation and impact of the Dell credentials bug.

    Dark Reading reports "Dell Credentials Bug Opens VMWare Environments to Takeover"

  • news

    Visible to the public "University of Michigan Researchers Create Screen Protection System to Fend Off Shoulder Surfers"

    Eye-Shield is an innovative screen protection system developed by researchers at the University of Michigan that obscures images and text on a user's phone and other devices when seen from a distance. According to the researchers, previous methods have been ineffective, inconvenient, or limited. Some involve applying a physical privacy film to the device, which cannot be turned off or easily removed, provides only limited protection, and in many cases, prevents screen protector usage. Other solutions have taken the form of apps focused on specific functions, such as obscuring numbers by overlaying low- and high-frequency images, and substituting text with difficult-to-read handwriting. Eye-Shield is designed to exist on a device as a free, built-in feature that the user can turn on and off as needed. The program takes advantage of the visual perception of contrast to blur text and images at a distance. This article continues to discuss the Eye-Shield solution that uses a pixelation scheme to obscure device screens when viewed from a distance, protecting against shoulder surfing attacks.

    The University of Michigan reports "University of Michigan Researchers Create Screen Protection System to Fend Off Shoulder Surfers"

  • news

    Visible to the public "Researchers Put LLMs to the Test in Phishing Email Experiment"

    A team of security researchers tested the performance of Large Language Models (LLMs) in composing convincing phishing emails and detecting them. The results showed that Artificial Intelligence (AI) technology could generate highly effective phishing lures, though not as convincing as emails created manually. Bruce Schneier, a security expert, Arun Vishwanath, chief technologist at Avant Research Group, and Jeremy Bernstein, a postdoctoral researcher at MIT, tested with four commercial LLMs in experimental phishing attacks against Harvard students. The four LLMs included ChatGPT from OpenAI, Bard from Google, Claude from Anthropic, and ChatLlama, an open-source chatbot based on Llama from Meta. The experiment sent 112 students phishing emails offering Starbucks gift cards. LLMs could still be used to create simple marketing emails that can be repurposed for attacks, even though generative AI vendors have implemented stricter safeguards and restrictions for LLMs to prevent prompts for phishing email creation. This article continues to discuss the experiment on LLMs to see how effective the technology can be in detecting and producing phishing emails.

    TechTarget reports "Researchers Put LLMs to the Test in Phishing Email Experiment"

  • news

    Visible to the public "New York Introduces First-Ever Statewide Cybersecurity Strategy"

    Governor Kathy Hochul has recently introduced New York's first-ever statewide cybersecurity strategy, reinforced by a $600m commitment. The initiative is designed to shield critical infrastructure, data, networks, and technology systems from malicious attacks. The strategy's primary pillars: unification, resilience, and preparedness, are designed to enable New York State to not only deter cyberattacks but also neutralize potential threats effectively. The commitment also includes allocating $90m to centralize cybersecurity, with $30m designated for shared services strengthening local governments' cybersecurity. An additional $500m will be invested in healthcare information technology cybersecurity infrastructure, and $7.4m will expand New York State Police's cyber units. The governor also signed legislation to boost New York's technology talent pool, providing necessary funding for employers to acquire and retain cybersecurity professionals.

    Infosecurity reports: "New York Introduces First-Ever Statewide Cybersecurity Strategy"