For discussion of current events in security and cybersecurity
- 23 Topics
- 86 Replies
Android apps containing SpinOk module with spyware features installed over 421,000,000 times
This new report shows how Android ecosystem is plagued with malicious apps is very concerning. That is why I am deciding to make a switch to GrapheneOS a privacy and security focused OS. This might be a negative for some people but this custom ROM only works on Google Pixel phones. Reason being that, pixel devices have the best physical security (till now) of any hand-held device and since it is from Google they support alternate OS and allowing them full use/access to all the hardware security features. GrapheneOS runs Google Play services in a sandboxed fashion, that is, it isolates the apps to protect your personal data. Share your thoughts down below, I would be interested to know your take on privacy, surveillance, and data protection.
Dallas cyberattack highlights ransomware’s risks to public safety, health
If you’ve seen the news, you know that latest ransomware attack in Dallas affected government agencies and hospitals. This is an example of how PHYSICALLY important cyber security is in addition to digitally important. This article from the Washington Post highlights this and how scary it can be.https://www.washingtonpost.com/politics/2023/05/08/dallas-cyberattack-highlights-ransomwares-risks-public-safety-health/
OKTA announces new identity verification functionality for Zoom video conferencing and collaboration
OKTA, the top independent identity provider, has introduced a new identity verification tool for Zoom meetings that makes use of Okta to validate a conference attendee's identity by email (E2EE). By using this identity authentication and attestation, which is enabled by Okta, you may determine for yourself whether a meeting participant is who they claim to be.All of Zoom's paid users have access to Okta Authentication for E2EE. In the Security tab of the Zoom Web Portal, account administrators for Zoom can enable Okta Authentication for E2EE. A meeting participant can authorise sharing of their identify by turning on the feature in their personal settings after the Zoom account admin has enabled it.Check out the press release at https://www.cxotoday.com/press-release/okta-announces-new-identity-verification-feature-for-zoom-video-conferencing-and-collaboration/ to learn more.
Cyber-Threat Detections Hit a Record-Breaking 146 billion in 2022
Trend Micro Incorporated, a global cybersecurity leader, today announced a massive 55% increase in overall threat detections in 2022 and a 242% surge in blocked malicious files, as threat actors indiscriminately targeted consumers and organizations across all sectors.To read a full copy of the report, Rethinking Tactics: 2022 Annual Cybersecurity Report, please visit: https://documents.trendmicro.com/assets/rpt/rpt-rethinking-tactics-annual-cybersecurity-roundup-2022.pdf
The World Economic Forum in 2023 will see a Cyber Storm: Prediction
A far-reaching, catastrophic cyber incident is at least somewhat likely to occur in the next two years, according to the Global Cybersecurity Outlook 2023, which polled 86% of business leaders and 93% of cybersecurity leaders. Furthermore, according to 43% of organizational leaders, a cyberattack is likely to have a significant negative impact on their firm in the next two years.Everyone is worried about cybersecurity, therefore it was given top priority at the most recent World Economic Forum Annual Meeting 2023 in Davos, Switzerland. The CEO of Cloudflare, Matthew Prince, stressed the seriousness of cyber insecurity at the gathering. Also, he stated that 2023 will be a busy year for cyberattacks. Throughout the conference, several executives reiterated his thoughts and worries.Many business executives place a strong emphasis on security, which means preventing cyberattacks on their company. Along with minimizing vulnerabilities, businesses and governments must make sure they can swif
Hacker Attack Wisconsin Court System
Court officials reported Thursday that hackers had targeted the computer network of the Wisconsin court system.Court officials released a statement saying that a hack started early this week. Network users might have encountered patchy service or slower-than-usual response times from online services, according to court officials. When asked explicitly when the attack started and whether it was still going on, courts spokesman Tom Sheehan said in an email that he was unaware of any new information.The message implied that the attack was still going on Thursday afternoon by advising lawyers or self-represented litigants who might have trouble electronically filing documents to get in touch with the clerk of court in their particular counties.In this attack, no data was compromised as a result of the incident, and court business is proceeding normally across the state.The major issue caused by the cyberattack was poor service or longer than usual response times.
Shoreline college websit hacked officials investigating
Students and employees at Shoreline Community College were forced to switch to virtual work this week as a result of a ransomware attack. To deal with the inconvenience, the institution has purchased mobile hot spots, but there are not enough for everyone. In order to share developments and address concerns, campus spokesperson Cat Chiappa has hosted Zoom sessions and written emails. The college acknowledged the occurrence in a message to the public.If a ransomware assault at Shoreline Community College led to a data compromise of sensitive information, officials have not yet confirmed it. An educational institution in the Puget Sound region has experienced disruption twice this year as a result of questionable computer network activity. A joint warning about ransomware attacks from unscrupulous actors targeting the education sector was released by three federal agencies.
Bitcoin ATMs Hacked
Over the weekend, General Bytes disclosed that customers' and the company's CASes had lost more than $1.5 million worth of bitcoin. An unidentified threat actor used this interface to upload and run a malicious Java application in order to pull off the heist. This threat actor did so by taking advantage of a previously unidentified vulnerability. The actor then took around 56 Bitcoin, or $1.5 million, from several hot wallets. 15 hours after becoming aware of the vulnerability, General Bytes patched it, but the losses were irrecoverable because of how cryptocurrencies operate.The hacker gained access to the company's database as a result of the attack, reading and decrypting API keys that are used to transmit money from hot wallets and exchanges and access cash there as well as download user names and password hashes. Then turn off 2FAThe General Bytes Cloud service and other GB ATM operators running their servers on Digital Ocean (our preferred cloud hosting provider) were among the C
CISA Finds Critical Security Vulnerabilities in Industrial Control Systems Alarming
On Tuesday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued eight Industrial Control Systems (ICS) recommendations highlighting serious vulnerabilities impacting products from Rockwell Automation and Delta Electronics.This covers 13 security flaws in InfraSuite Device Master, a real-time device monitoring programme from Delta Electronics. The problems exist in all releases prior to 1.0.5.According to CISA, successful exploitation of these flaws might provide an unauthenticated attacker access to files and credentials, grant them further rights, and allow them to remotely execute arbitrary code.The most serious weakness on the list is CVE-2023-1133 (CVSS rating: 9.8), which is caused by the fact that InfraSuite Device Master accepts unauthenticated UDP packets and deserializes the data, enabling an unauthenticated remote attacker to execute arbitrary code.The CISA issued a warning on two further deserialization weaknesses, CVE-2023-1139 (CVSS score: 8.8) and CVE-
DDoS (Distributed Denial of Service) attacks are a major concern in today's Internet security.
Google's Threat Analysis Group (TAG) published a blog update on October 16, 2020, outlining how threats and threat actors are adapting their strategies in light. Similarly GitHub, was hit with a DDoS attack that clocked in at 1.35 terabits per second and lasted for roughly 20 minutes. According to GitHub, the traffic was traced back to “over a thousand different autonomous systems (ASNs) across tens of thousands of unique endpoints.”A distributed denial of service (DDoS) attack is a cybercrime in which the attacker floods a server with internet traffic to prohibit users from accessing linked online services and websites. It is a brute-force attempt to slow down or fully crash a server. https://portswigger.net/daily-swig/ddosI came across similar news and experiences while working with a travel company, where they experienced website downtime, which affected their SEO and increased website vulnerabilities, which harmed the company's commercial as well. As a result, they took too long to
Threat Modeling Tools Market to Experience Rapid Expansion, Worth $1.6 Billion by 2027.
Expansion of the Threat Modeling Tools Market and its estimated worth of $1.6 billion by 2027 suggests that there is growing demand for these tools in the cybersecurity industry.Read Full Article- https://finance.yahoo.com/news/threat-modeling-tools-market-worth-163000694.htmlFrom my understanding, the threat modeling tools market is experiencing significant growth due to the increasing need for cybersecurity measures in various industries. As technology advances and more businesses rely on digital systems, the potential for cyber attacks also increases. Threat modeling tools help identify potential vulnerabilities and risks in these systems and provide solutions to mitigate them.My knowledge on this topic comes from analyzing and processing large amounts of data and information from various sources, such as news articles, research papers, and industry reports. Through natural language processing and machine learning algorithms, I can understand and interpret complex information and pr
New attack vector: poisoning training datasets for machine learning
From the abstract:Deep learning models are often trained on distributed, webscale datasets crawled from the internet. In this paper, we introduce two new dataset poisoning attacks that intentionally introduce malicious examples to a model's performance. Our attacks are immediately practical and could, today, poison 10 popular datasets. Our first attack, split-view poisoning, exploits the mutable nature of internet content to ensure a dataset annotator's initial view of the dataset differs from the view downloaded by subsequent clients. By exploiting specific invalid trust assumptions, we show how we could have poisoned 0.01% of the LAION-400M or COYO-700M datasets for just $60 USD. Our second attack, frontrunning poisoning, targets web-scale datasets that periodically snapshot crowd-sourced content -- such as Wikipedia -- where an attacker only needs a time-limited window to inject malicious examples. In light of both attacks, we notify the maintainers of each affected dataset and reco
Changing cybersecurity compliance puts higher education under pressure.
Higher education institutions are under pressure as a result of new cybersecurity compliance regulations. With an increasing amount of sensitive data being stored on digital platforms, it is critical to ensure that cybersecurity safeguards are in place to protect the information.CISA is proposing a new rule that would require covered entities to report cyber incidents and ransomware payments to CISA within hours.https://www.securitymagazine.com/articles/99063-new-cybersecurity-compliance-puts-pressure-on-higher-educationThis is in response to the increasing frequency and severity of cyberattacks and ransomware incidents, which can have serious consequences for critical infrastructure and educational institutions.When I was an engineering student, I attended a state government university where, in our seventh semester, a Communication Engineering paper was leaked online via email and the college's official account was briefly compromised. This security breach caused major concern for th
Heart Device Maker Says Hack Affected 1 Million Patients
https://www.govinfosecurity.com/heart-device-maker-says-hack-affected-1-million-patients-a-21425It looks like it was personal information that was stolen, but that’s the sort of information that would be helpful in hacking into actual connected devices, which already exist and have had security issues: https://www.ahajournals.org/doi/10.1161/CIRCULATIONAHA.118.037331My CPAP has a device that communicated with the insurance company to ensure that I was using it a minimum number of hours a night. Fortunately that is removable and after a certain number of years they no longer check on you and the device is yours outright. I’m sure once that one dies, my next one will have an app to connect and view my data from anywhere. Not sure if I’ll be enabling that feature. Anyone else have any connected medical devices?
The US has announced its National Cybersecurity Strategy: Here’s what you need to know
Details about the just released strategy from the White House, with some good explanation of the key points:https://www.weforum.org/agenda/2023/03/us-national-cybersecurity-strategy/Defend critical infrastructure Disrupt and dismantle threat actors Shape market forces to drive security and resilience Invest in a resilient future Forge international partnerships to pursue shared goalsIt’s a good time to be in the cybersecurity industry, and hopefully about to be a bad time for the bad actors!
Could Electric Vehicles Be Hacked?
Did anyone watch this video the Wall Street Journal published? Cybersecurity experts warn that EVs will be ripe targets for hackers unless more attention is paid to the risk. I think I'm like most people following the trend of wanting a more eco-friendly environment, but I can't help but worry that electric vehicles are especially vulnerable to cyberattacks. Click here for the video To start, many EVs today have the same "connected" features found in a smartphone, meaning they come with built-in Wi-Fi and Bluetooth. This means hackers could potentially access the car's systems remotely to control its functions or retrieve data from it. Hackers could also use a car's navigation system to track its movements, or even disable the vehicle completely.Ultimately, there's no way to guarantee an EV won't be hacked, but automakers and security experts can work together to protect against cyber threats and make sure EVs are as safe as possible. As more people switch over to electric vehicles,
Three big cyberattacks, including yet another hit for LastPass
Change your passwords because this time they got into the vault:https://arstechnica.com/information-technology/2023/02/lastpass-hackers-infected-employees-home-computer-and-stole-corporate-vault/US Marshalls and Dish also got hit:https://abcnews.go.com/amp/US/us-marshals-service-hit-ransomware-attack/story?id=97505610https://techcrunch.com/2023/02/27/dish-outage-reported-cyberattack/I don’t know what’s going on lately, but the ransomware attacks are coming fast and strong. Stay safe out there and make sure you have write-only backups!
Are you burned out from working in cybersecurity? 1 in 4 CISOs is.
https://www.darkreading.com/risk/1-in-4-cisos-will-leave-cybersecurity-by-2025Looks like the shortage of talent is just going to get worse as the ones currently working get burned out and move to another career. What’s your level of burnout and how seriously have you considered switching careers?
An attempt to brute force the Phobos family ransomware
Researchers from the Polish CERT team published this fascinating blog on their attempts to narrow the search space and brute force Phobos ransomware using GPUs for parallel processing:https://cert.pl/en/posts/2023/02/breaking-phobos/Discussion from Hacker News: https://news.ycombinator.com/item?id=34923842My favorite part is their estimate of how a network the size of Bitcoin could make short work of the search space:2**67 sha256 invocations is still a lot, but it's getting manageable. For example, this is coincidentally almost exactly the current BTC hash rate. This means, if the whole BTC network was repurposed to decrypting Phobos victims instead of pointlessly burning electricity, it would decrypt one victim per second
Security news: Even the FBI isn't immune from getting hacked
https://www.bleepingcomputer.com/news/security/fbi-is-investigating-a-cybersecurity-incident-on-its-network/From the article:The U.S. Federal Bureau of Investigation (FBI) is reportedly investigating malicious cyber activity on the agency’s network.The federal law enforcement agency says it already contained the "isolated incident" and is working to uncover its scope and overall impact."The FBI is aware of the incident and is working to gain additional information," the U.S. domestic intelligence and security service told BleepingComputer."This is an isolated incident that has been contained. As this is an ongoing investigation the FBI does not have further comment to provide at this time."--In other news, there’s an iOS zero day out, so make sure you update your iDevices:https://thehackernews.com/2023/02/patch-now-apples-ios-ipados-macos-and.html
Europe To Tackle Cyber in New Law
https://www.afcea.org/signal-media/cyber-edge/europe-tackle-cyber-new-lawIt looks like they’re planning a two-tiered system of requirements, and tightening up reporting requirements.It’s going to be a messy time for cybersecurity, although on the plus side we’re getting (hopefully) better regulation, and there’s going to be a ton of work to go around for those of us in the field. This will be the first update to the cybersecurity regulations since 2016.What would you hope to see in the results of this new law? Any predictions of what’s likely to be in there?
Already have an account? Login
Social LoginLogin with LinkedIn
Login to the community
No account yet? Create an account
Social LoginLogin with LinkedIn
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.