"CISA Publishes Guide to Support University Cybersecurity Clinics"

"CISA Publishes Guide to Support University Cybersecurity Clinics"

According to Clayton Romans, US Cybersecurity and Infrastructure Security Agency (CISA) Associate Director of the Joint Cyber Defense Collaborative (JCDC), small and local organizations face a unique cybersecurity challenge. They have been hit with ransomware attacks and other cyberattacks, but they often have no way of getting the cybersecurity resources required to defend themselves.

Submitted by Gregory Rigby on

"State-Sponsored Hackers Know Enterprise VPN Appliances Inside Out"

"State-Sponsored Hackers Know Enterprise VPN Appliances Inside Out"

According to Mandiant incident responders and threat hunters, suspected Chinese state-sponsored hackers who exploited Ivanti Connect Secure VPN flaws to breach a number of organizations have showed "a nuanced understanding of the appliance." They were able to make several changes to the device as well as install specialized malware and plugins to ensure persistence across system upgrades, patches, and factory resets.

Submitted by Gregory Rigby on

"US Bans Trading With Canadian Network Intelligence Firm Sandvine"

"US Bans Trading With Canadian Network Intelligence Firm Sandvine"

The US government recently added Canadian network intelligence firm Sandvine to its Entity List, effectively banning organizations from trading with it.  The Waterloo, Ontario-based company provides network policy control products that support networking policies to enable congestion management, security, and censorship.  The US Department of Commerce announced that Sandvine was added to its trade restrictions list for providing the Egyptian government with the technology needed for mass surveillance and censorship.

Submitted by Adam Ekwall on

"'Savvy Seahorse' Hackers Debut Novel DNS CNAME Trick"

"'Savvy Seahorse' Hackers Debut Novel DNS CNAME Trick"

A threat actor is conducting an investment scam using a Traffic Distribution System (TDS) that leverages the Domain Name System (DNS) to keep its malicious domains changing and resistant to takedowns. The "Savvy Seahorse" threat actor impersonates well-known brand names and uses Facebook ads in nine languages to trick victims into creating accounts on a fraudulent investing platform. Once victims add money to their accounts, the funds are transferred to what is believed to be an attacker-controlled account at a Russian state-owned bank.

Submitted by Gregory Rigby on

AI Risk Summit

"The AI Risk Summit will bring together security and risk management executives, AI researchers, policy makers, software developers and other business and government stakeholders to delve into the risks of deploying generative and predictive AI tools in the enterprise, the threat from adversarial use of AI technology and deep fakes, and preparation for the inevitable compliance and regulations from policy makers.

"Lazarus Hackers Exploited Windows Zero-Day to Gain Kernel Privileges"

"Lazarus Hackers Exploited Windows Zero-Day to Gain Kernel Privileges"

Lazarus Group, the North Korean state-sponsored cyber threat group, exploited a flaw in the Windows AppLocker driver to gain kernel-level access and disable security tools, bypassing Bring Your Own Vulnerable Driver (BYOVD) techniques. The activity was detected by Avast analysts, who reported it to Microsoft, resulting in a fix for the flaw, now tracked as CVE-2024-21338. According to Avast, Lazarus Group exploited the vulnerability to create a read/write kernel primitive in an updated version of its FudModule rootkit, which previously abused a Dell driver for BYOVD attacks.

Submitted by Gregory Rigby on

"Epic Games: "Zero Evidence" We Were Hacked by Mogilevich Gang"

"Epic Games: "Zero Evidence" We Were Hacked by Mogilevich Gang"

Epic Games recently announced that it found zero evidence of a cyberattack or data theft after the Mogilevich extortion group claimed to have breached the company's servers.  Epic Games noted that they immediately began investigating the incident after seeing a screenshot of the dark web page promoting the breach and attempted to contact the threat actor.  However, the company said they have not received a response from Mogilevich.

Submitted by Adam Ekwall on

"Hackers Steal Personal Information From Pharma Giant Cencora"

"Hackers Steal Personal Information From Pharma Giant Cencora"

Global pharmaceutical solutions provider Cencora recently announced that it fell victim to a cyberattack that resulted in personal information being stolen from its systems.  The data breach was identified on February 21.  It is currently unclear exactly what type of data has been exfiltrated and who it belongs to, whether it’s employees or customers.  The company noted that it has taken steps to contain the incident, and an investigation has been launched with the assistance of law enforcement and external cybersecurity experts, but it provided no further details.

Submitted by Adam Ekwall on

"Open-Source Xeno RAT Trojan Emerges as a Potent Threat on GitHub"

"Open-Source Xeno RAT Trojan Emerges as a Potent Threat on GitHub"

Xeno RAT has been made available on GitHub, allowing other threat actors to use it. According to its developer, the open-source Remote Access Trojan (RAT), written in C# and compatible with Windows 10 and Windows 11 operating systems, includes a comprehensive set of features for remote system management. It has a SOCKS5 reverse proxy and real-time audio recording capability, as well as a Hidden Virtual Network Computing (HVNC) module. The developer says Xeno RAT was made from scratch, resulting in a one-of-a-kind and customized approach to remote access tools.

Submitted by Gregory Rigby on

"Scientists Develop A Technique To Protect A Quantum-Era Metaverse"

"Scientists Develop A Technique To Protect A Quantum-Era Metaverse"

A team of scientists in China has introduced a quantum communication technique that could help protect Web 3.0 from the threat of quantum computing. According to the team, their approach, Long-Distance Free-Space Quantum Secure Direct Communication (LF QSDC), improves data security by allowing encrypted direct messaging without needing key exchange, which is traditionally vulnerable to quantum attacks. They add that the approach bolsters security and adheres to the decentralized ethos of Web 3.0, providing a strong defense in the digital landscape.

Submitted by Gregory Rigby on
Subscribe to