"AI Abuse and Misinformation Campaigns Threaten Financial Institutions"

"AI Abuse and Misinformation Campaigns Threaten Financial Institutions"

According to the Financial Services Information Sharing and Analysis Center (FS-ISAC), generative Artificial Intelligence (AI) provides significant business and cybersecurity benefits to financial companies, but cyber threats related to the technology remain a concern. Threat actors can use generative AI to create malware. Skilled cybercriminals can exfiltrate information from or poison Large Language Models (LLMs) that train generative AI. Using corrupted outputs can have serious legal, reputational, and operational effects on financial institutions.

Submitted by Gregory Rigby on

"Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds"

"Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds"

Security flaws discovered in Dormakaba's Saflok electronic RFID locks used in hotels could be exploited by malicious actors to forge keycards and sneak into locked rooms. When combined, the vulnerabilities, collectively named "Unsaflok," enable an attacker to unlock all rooms in a hotel with a single pair of forged keycards. Full technical details about the vulnerabilities have not yet been shared due to their potential impact. The flaws affect over three million hotel locks across 13,000 properties in 131 countries.

Submitted by Gregory Rigby on

"Activision Investigating Password-Stealing Malware Targeting Game Players"

"Activision Investigating Password-Stealing Malware Targeting Game Players"

The video game company Activision is investigating a hacking campaign aimed at stealing players' credentials. Aside from stealing passwords for various types of accounts, it is unclear what the hackers' specific goals are. The malware campaign appears to have been discovered first by Zebleer, a developer and seller of cheating software. Zebleer described the effort as an "infostealer malware campaign," in which malware disguised as legitimate-looking software is unknowingly installed by the victim and steals their usernames and passwords.

Submitted by Gregory Rigby on

"US Treasury Urges Financial Sector to Address AI Cybersecurity Threats"

"US Treasury Urges Financial Sector to Address AI Cybersecurity Threats"

The US Department of the Treasury has issued a warning about the cybersecurity risks posed by Artificial Intelligence (AI) to the financial sector. The report, based on Presidential Executive Order 14110 on the "Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence," also makes a number of recommendations for financial institutions on how to mitigate these risks.

Submitted by Gregory Rigby on

"Cyber Espionage Campaign Targets Government, Energy Entities in India"

"Cyber Espionage Campaign Targets Government, Energy Entities in India"

A phishing campaign called "Operation FlightNight" involves phishing lures disguised as invitation letters from the Indian Air Force. The malicious campaign has targeted Indian government entities, including agencies for electronic communications, Information Technology (IT) governance, and national defense. The phishing emails carry an ISO file containing malware as well as a shortcut file (LNK) appearing to be the PDF invitation letter. When opened, it executes the hidden malware while displaying a decoy document that was most likely stolen in a previous intrusion and repurposed.

Submitted by Gregory Rigby on

"'TheMoon' Malware Shows Its Dark Side, Grows to 40,000 Bots From 88 Countries"

"'TheMoon' Malware Shows Its Dark Side, Grows to 40,000 Bots From 88 Countries"

A campaign involving an updated version of "TheMoon" malware has targeted End-of-Life (EoL) small business routers and Internet of Things (IoT) devices through a cybercriminal proxy service called "Faceless." Lumen Technologies' Black Lotus Labs team discovered that TheMoon malware, which first appeared in 2014, was working quietly while growing to over 40,000 bots from 88 countries by January and February this year. Black Lotus Labs first described the malware in 2019 and noted that it is in a new phase.

Submitted by Gregory Rigby on

19th Annual System of Systems Engineering Conference

"IEEE System, Man, and Cybernetics Society announces the 19th International Conference on System of Systems Engineering (SoSE) with its vast ramifications in numerous engineering fields such as control, computing, communication, information technology, artificial intelligence, and in applications such manufacturing, defense, national security, aerospace, aeronautics, energy, environment, healthcare, and transportation. The conference theme is 'AI Role in System of Systems Engineering.'"

Topics of interest include, but are not limited to cybersecurity.

"Retail Chain Hot Topic Hit by New Credential Stuffing Attacks"

"Retail Chain Hot Topic Hit by New Credential Stuffing Attacks"

Hot Topic recently announced that attackers targeted Hot Topic Rewards accounts in automated attacks using login information obtained from an unknown source.  The company said that it determined that unauthorized parties launched automated attacks against its website and mobile application on November 18-19 and November 25, 2023, using valid account credentials (e.g., email addresses and passwords) obtained from an unknown third-party source.

Submitted by Adam Ekwall on

"Massachusetts Health Insurer Data Breach Impacts 2.8 Million"

"Massachusetts Health Insurer Data Breach Impacts 2.8 Million"

Point32Health, the second-largest health insurer in Massachusetts, has recently revealed that the personal information of more than 2.8 million individuals was stolen in a ransomware attack in April 2023.

Submitted by Adam Ekwall on

"Energy Department Invests $15 Million in University Cybersecurity Centers"

"Energy Department Invests $15 Million in University Cybersecurity Centers"

The US Department of Energy (DOE) recently announced a $15 million investment in university-based electric power centers to bolster cybersecurity in the energy sector.  The DOE says the funding will go to six universities selected by the Office of Cybersecurity, Energy Security, and Emergency Response (CESER), which will partner with industry stakeholders and the DOE National Laboratories for cybersecurity research and training development.

Submitted by Adam Ekwall on
Subscribe to