"NSA Issues Guidance for Maturing Data Security"

"NSA Issues Guidance for Maturing Data Security"

The National Security Agency (NSA) has published guidance on improving data security and protecting access to data at rest and in transit. The recommendations in the Cybersecurity Information Sheet (CSI) titled "Advancing Zero Trust Maturity Throughout the Data Pillar" aim to ensure that only authorized individuals have access to data. The capabilities described in the CSI are integrated into a comprehensive Zero Trust (ZT) framework.

Submitted by grigby1 CPVI on

"Two New Bugs Can Bypass Detection and Steal SharePoint Data"

"Two New Bugs Can Bypass Detection and Steal SharePoint Data"

Researchers have found two new Microsoft SharePoint flaws, posing a significant threat to businesses. These vulnerabilities could enable attackers to bypass audit logs, avoid triggering downloads, and exfiltrate SharePoint data. SharePoint is widely used in government and business, with an estimated 250,000 organizations relying on it for document and intranet management. The platform is particularly popular among Fortune 500 companies.

Submitted by grigby1 CPVI on

"How Can the Energy Sector Bolster Its Resilience to Ransomware Attacks?"

"How Can the Energy Sector Bolster Its Resilience to Ransomware Attacks?"

Cyber threats to the energy sector have increased significantly as geopolitical tensions continue to drive state-sponsored cyber espionage. According to a report from Rockwell Automation on Operational Technology (OT) and Industrial Control System (ICS) cybersecurity incidents, the energy sector was targeted in 39 percent of all attacks, with about 60 percent attributed to state-affiliated groups.

Submitted by grigby1 CPVI on

Pub Crawl - April 2024

Pub Crawl - April 2024

Selections by dgoff

Pub Crawl summarizes sets of publications that have been peer-reviewed and presented at Science of Security (SoS) conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view the corresponding list of publications. Submissions and suggestions are welcome.

Submitted by grigby1 CPVI on

"Microsoft Plugs Gaping Hole in Azure Kubernetes Service Confidential Containers"

"Microsoft Plugs Gaping Hole in Azure Kubernetes Service Confidential Containers"

Microsoft warns about a vulnerability that allows hackers to take complete control of Azure Kubernetes clusters. The vulnerability, tracked as CVE-2024-29990, enables unauthenticated hackers to steal credentials and affect resources outside the security scope managed by Azure Kubernetes Service Confidential Containers (AKSCC). The Azure Kubernetes Service bug has a CVSS severity score of 9/10 and could be used to take control of confidential guests and containers beyond the network stack to which it is bound.

Submitted by grigby1 CPVI on

"Researchers Discover New Ransomware Gang 'Muliaka' Attacking Russian Businesses"

"Researchers Discover New Ransomware Gang 'Muliaka' Attacking Russian Businesses"

A ransomware gang, dubbed "Muliaka" by the Moscow-based cybersecurity company F.A.C.C.T., has been targeting Russian businesses with malware developed from the Conti hacking group's leaked source code. The gang, also known as Muddy Water in English, has left few traces of its attacks, but it has likely been active since at least December 2023. In a January incident, the group attacked an unnamed Russian company by encrypting its Windows systems and VMware ESXi virtual infrastructure.

Submitted by grigby1 CPVI on

"Home Depot Hammered by Supply Chain Data Breach"

"Home Depot Hammered by Supply Chain Data Breach"

A hacking forum leak recently has led Home Depot to confirm that its employee data was compromised via a third-party software vendor.  Home Depot did not identify the breached software-as-a-service (SaaS) vendor but noted that an error exposed the names, corporate IDs, and email addresses of a "small sample" of its employees.  According to researchers, this type of data could be used to fuel targeted phishing cyberattacks.

Submitted by Adam Ekwall on

"Hackers Use Malware to Hunt Software Vulnerabilities"

"Hackers Use Malware to Hunt Software Vulnerabilities"

Many threat actors are using malware to scan software vulnerabilities that they can exploit in future cyberattacks. According to security researchers at Palo Alto Networks' Unit 42, there was a large number of malware-initiated scans among the scanning attacks they detected in 2023. Vulnerability scanning is a common reconnaissance step for malicious actors planning to launch cyberattacks. Similar to port scanning and Operating System (OS) fingerprinting, vulnerability scanning initiates network requests to exploit the target hosts' potential vulnerabilities.

Submitted by grigby1 CPVI on

"Vietnamese Cybercrime Group CoralRaider Nets Financial Data"

"Vietnamese Cybercrime Group CoralRaider Nets Financial Data"

A new Vietnam-connected cybercrime group called "CoralRaider" has targeted individuals and organizations in Asia, stealing social media account information and user data. CoralRaider, which first emerged in late 2023, mainly uses social engineering techniques and legitimate services to exfiltrate data. The group creates custom tools for loading malware onto victim systems. However, according to a new analysis by researchers with Cisco's Talos threat intelligence group, the group has made some mistakes, such as inadvertently infecting their own systems and exposing their activities.

Submitted by grigby1 CPVI on
Subscribe to