"Too Many ICS Assets Are Exposed to the Public Internet"

"Too Many ICS Assets Are Exposed to the Public Internet"

RunZero has highlighted gaps and trends in enterprise infrastructure, including network segmentation decay, attack surface management issues, and increasing dark matter on modern networks.

Submitted by Gregory Rigby on

"China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT"

"China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT"

A Remote Access Trojan (RAT) called "Deuterbear" has been used by the China-linked "BlackTech" hacking group in a cyber espionage campaign targeting the Asia-Pacific region this year. Trend Micro researchers found that Deuterbear supports shellcode plugins, avoids handshakes for the RAT operation, and uses HTTPS for Command-and-Control (C2) communication. This article continues to discuss findings regarding BlackTech and its use of the Deuterbear RAT. 

Submitted by Gregory Rigby on

"Two Students Uncover Security Bug That Could Let Millions Do Their Laundry for Free"

"Two Students Uncover Security Bug That Could Let Millions Do Their Laundry for Free"

A team of UC Santa Cruz students found a security flaw impacting Internet-connected laundry machines provided by CSC ServiceWorks. The students found a vulnerability that allows anyone to remotely send commands to CSC ServiceWorks laundry machines and run cycles for free. This article continues to discuss the discovery of a security vulnerability affecting laundry machines from CSC ServiceWorks. 

Submitted by Gregory Rigby on

"Norway Recommends Replacing SSL VPN to Prevent Breaches"

"Norway Recommends Replacing SSL VPN to Prevent Breaches"

The Norwegian National Cyber Security Centre (NCSC) recommends replacing Secure Socket Layer Virtual Private Network (SSL VPN)/WebVPN solutions with alternatives as related vulnerabilities in edge network devices repeatedly get exploited to breach corporate networks. Organizations subject to the "Safety Act" or in critical infrastructure should adopt safer alternatives by the end of 2024. SSL VPN/WebVPN users are urged to switch to Internet Protocol Security (IPsec) with Internet Key Exchange (IKEv2).

Submitted by Gregory Rigby on

"CISA Publishes Encrypted DNS Implementation Guidance to Federal Agencies"

"CISA Publishes Encrypted DNS Implementation Guidance to Federal Agencies"

The US Cybersecurity and Infrastructure Security Agency (CISA) has released "Encrypted Domain Name System (DNS) Implementation Guidance" for federal civilian agencies to meet requirements regarding the encryption of DNS traffic and improve the cybersecurity of their Information Technology (IT) networks. This guide will help agencies implement feasible technical capabilities for agency networks, DNS infrastructure, on-premises endpoints, cloud deployments, and more. This article continues to discuss the new guidance on encrypted DNS implementation.

Submitted by Gregory Rigby on

"AI-Generated Code Top Cloud Security Concern Amid 100% Use Rate in Survey"

"AI-Generated Code Top Cloud Security Concern Amid 100% Use Rate in Survey"

Palo Alto Networks' 2024 State of Cloud-Native Security report found that security vulnerabilities in Artificial Intelligence (AI)-generated code are the top cloud security concern for 2024. One hundred percent of survey respondents said their organization uses AI to help in coding. The report focused on AI fears, conflicts between developers and security teams, rushed cloud migration, and fragmentation across multiple cloud tools. This article continues to discuss key findings from Palo Alto Networks' 2024 State of Cloud-Native Security report. 

Submitted by Gregory Rigby on

"US Arrests Suspects Behind $73M Pig Butchering Laundering Scheme"

"US Arrests Suspects Behind $73M Pig Butchering Laundering Scheme"

​The Department of Justice (DoJ) recently charged two suspects for allegedly leading a crime ring that laundered at least $73 million from cryptocurrency investment scams, also known as "pig butchering." In pig butchering scams, criminals approach targets using various messaging apps, dating platforms, or social media platforms to build trust and introduce them to investment schemes that help them drain the victims' cryptocurrency wallets.

Submitted by Adam Ekwall on

"Windows Quick Assist Anchors Black Basta Ransomware Gambit"

"Windows Quick Assist Anchors Black Basta Ransomware Gambit"

Microsoft Threat Intelligence noted that "Storm-1811," a financially motivated threat actor tracked since mid-April, has been following the same playbook as the recent Black Basta ransomware vishing campaign. The threat group's social engineering campaign tries to trick victims into allowing them to use Windows Quick Assist to access their machines remotely.

Submitted by Gregory Rigby on

"New Android Banking Trojan Mimics Google Play Update App"

"New Android Banking Trojan Mimics Google Play Update App"

Cyble Research and Intelligence Labs (CRIL) discovered a new Android banking Trojan dubbed "Antidot." According to researchers, the malware is sophisticated as it includes overlay attacks, keylogging, and obfuscation capabilities. Antidot presents itself as a Google Play update application. The fake update page displayed upon installation is in various languages, including German, French, Spanish, English, and more, suggesting that the malware targets Android users in different regions.

Submitted by Gregory Rigby on

"Critical Flaw in AI Python Package Can Lead to System and Data Compromise"

"Critical Flaw in AI Python Package Can Lead to System and Data Compromise"

A critical vulnerability in a Python package used by Artificial Intelligence (AI) application developers enables arbitrary code execution. The flaw, dubbed "Llama Drama," was discovered by researcher Patrick Peng. It relates to the Jinja2 template rendering Python tool, which generates HTML, and the llama_cpp_python package that integrates AI models with Python. This article continues to discuss the potential exploitation and impact of the Llama Drama vulnerability. 

Submitted by Gregory Rigby on
Subscribe to