"IMF Investigates Serious Cybersecurity Breach"

"IMF Investigates Serious Cybersecurity Breach"

The International Monetary Fund (IMF) recently announced that it is investigating a cybersecurity breach that led to the compromise of several internal email accounts.  The Washington-headquartered UN financial agency revealed in a brief statement on Friday that the incident was first detected on February 16.  The investigation determined that 11 IMF email accounts were compromised.  The IMF noted that the impacted email accounts were re-secured and that they have no indication of further compromise beyond these email accounts at this point in time.

Submitted by Adam Ekwall on

"New Acoustic Attack Determines Keystrokes From Typing Patterns"

"New Acoustic Attack Determines Keystrokes From Typing Patterns"

Researchers Alireza Taheritajar and Reza Rahaeimehr at Augusta University have published a technical paper detailing their acoustic side-channel attack method. They demonstrated a new acoustic side-channel attack on keyboards that can deduce user input from typing patterns, even in noisy environments. Although the method has an average success rate of 43 percent, which is significantly lower than previously presented techniques, it does not require controlled recording conditions or a specific typing platform.

Submitted by Gregory Rigby on

"Hackers Can Read Private AI-Assistant Chats Even Though They're Encrypted"

"Hackers Can Read Private AI-Assistant Chats Even Though They're Encrypted"

Researchers at Ben-Gurion University's Offensive AI Research Lab have presented an attack that can decipher AI assistant responses. The technique involves a side-channel found in all major Artificial Intelligence (AI) assistants except Google Gemini. It refines the fairly raw results through Large Language Models (LLMs) trained specifically for the task.

Submitted by Gregory Rigby on

"Satellites for Quantum Communications"

"Satellites for Quantum Communications"

Continued advancements in quantum computer development and performance will make it possible to crack current encryption processes. In an effort to address this challenge, researchers at the Technical University of Munich (TUM) are working to develop encryption methods that use physical laws to prevent message interception. Satellites will be launched as part of the QUICK³ space mission to protect communications over long distances. This article continues to discuss the effort to address the challenge regarding the transmission of data over long distances in quantum cryptography.

Submitted by Gregory Rigby on

"Ande Loader Malware Targets Manufacturing Sector in North America"

"Ande Loader Malware Targets Manufacturing Sector in North America"

A threat actor called "Blind Eagle," also known as APT-C-36, has been observed using a loader malware named "Ande Loader" to deliver Remote Access Trojans (RATs) such as Remcos RAT and NjRAT. According to eSentire, the attacks, launched through phishing emails, targeted Spanish-speaking users in the North American manufacturing industry. Blind Eagle is a financially motivated threat actor who has previously executed cyberattacks against entities in Colombia and Ecuador to deliver AsyncRAT, BitRAT, Lime RAT, NjRAT, Remcos RAT, and more.

Submitted by Gregory Rigby on

"MITRE-Harris Poll Finds US Public Is Worried about the Security of Our Critical Infrastructure"

"MITRE-Harris Poll Finds US Public Is Worried about the Security of Our Critical Infrastructure"

According to a new public opinion poll conducted by MITRE and The Harris Poll, the US public believes cyberattacks to be of the greatest risk to critical infrastructure. Seventy-eight percent are concerned about cyberattacks, and 51 percent are not confident that the US is prepared to recover from an attack.

Submitted by Gregory Rigby on

"As Attackers Refine Tactics, 'Speed Matters,' Experts Warn"

"As Attackers Refine Tactics, 'Speed Matters,' Experts Warn"

According to security researchers at Palo Alto's Unit 42 threat intelligence group, advanced attackers are increasingly seeking speed. The researchers analyzed hackers' preferred strategies for infiltrating organizations, exfiltrating data, crypto-locking systems with ransomware, and more in 2023. Wendi Whitmore, senior vice president at Unit 42, cautioned that the time between initial compromise and data exfiltration is shrinking. She goes on to say that attackers are sometimes beginning to exfiltrate data in hours rather than days, calling on defenders speed up their operations.

Submitted by Gregory Rigby on

"Moldovan National Sentenced in E-Root Cybercrime Marketplace Case"

"Moldovan National Sentenced in E-Root Cybercrime Marketplace Case"

According to the US Department of Justice (DOJ), a Moldovan national has been sentenced to 42 months in US federal prison for running a set of websites selling access to compromised computers worldwide. He was the administrator for the E-Root Marketplace, which listed over 350,000 compromised credentials for sale. E-Root operated on a widely distributed network and took steps to hide the identities of its administrators, buyers, and sellers.

Submitted by Gregory Rigby on

17th Cyber Security Experimentation and Test Workshop (CSET)

For 16 years, the Workshop on Cyber Security Experimentation and Test (CSET) has been an important and lively space for discussing all-encompassing or “meta” cybersecurity topics related to reliability, validity, reproducibility, transferability, ethics, and scalability — in practice, in research, and in education. Submissions are particularly encouraged to employ a scientific approach to cybersecurity and demonstrably grow community resources.

"Key MITRE ATT&CK Techniques Used by Cyber Attackers"

"Key MITRE ATT&CK Techniques Used by Cyber Attackers"

A Red Canary report tracked the MITRE ATT&CK techniques adversaries used the most throughout 2023, finding that two new and notable entries jumped to the top ten: email forwarding rules and cloud accounts. Cloud account compromises are becoming more common as organizations adopt Software-as-a-Service (SaaS) for critical productivity applications such as email, file storage, and messaging, resulting in a large volume of data being stored in the cloud. Adversaries see just as much value in compromising cloud identities as they do in traditional endpoints.

Submitted by Gregory Rigby on
Subscribe to