"White House to Release Memory-Safe Code Guidance in Coming Weeks"

"White House to Release Memory-Safe Code Guidance in Coming Weeks"

According to National Cyber Director Harry Coker, the White House's main cybersecurity directorate will release a paper on memory-safe software development to encourage public and private sector programmers to adopt practices that prevent hackers from infiltrating systems by exploiting code vulnerabilities. Coker pointed out that memory safety bugs are some of the most dangerous vulnerabilities criminals seek to exploit. He adds that memory-safe coding languages prevent those errors from making it into production, but developers have been slow to adopt them.

Submitted by Gregory Rigby on

"Deepfake Face Swap Attacks on ID Verification Systems up 704% in 2023"

"Deepfake Face Swap Attacks on ID Verification Systems up 704% in 2023"

Deepfake attacks that use "face swap" technology to evade remote identity verification increased by 704 percent in 2023, according to iProov's 2024 Threat Intelligence Report, "The Impact of Generative AI on Remote Identity Verification." Many deepfake-focused threat actors are increasing their sophistication with free and inexpensive face swap tools, virtual cameras, and mobile emulators. Generative AI has significantly improved threat actors' productivity levels.

Submitted by Gregory Rigby on

"Exploiting a Vulnerable Minifilter Driver to Create a Process Killer"

"Exploiting a Vulnerable Minifilter Driver to Create a Process Killer"

Antonio Parata, a CrowdStrike security researcher, demonstrated how to use a signed Minifilter Driver in a Bring Your Own Vulnerable Driver (BYOVD) attack to terminate a specific process from the kernel. The BYOVD technique is often used by malware to terminate processes associated with security tools such as an Endpoint Detection and Response (EDR) solution. BYOVD is gaining popularity as attackers realize that terminating the EDR process is a better strategy than using obfuscation techniques to avoid the EDR solution.

Submitted by Gregory Rigby on

"New RustDoor macOS Malware Impersonates Visual Studio Update"

"New RustDoor macOS Malware Impersonates Visual Studio Update"

RustDoor is a new Rust-based macOS malware distributed as a Visual Studio update. It provides backdoor access to compromised systems and uses infrastructure linked to the ALPHV/BlackCat ransomware group. The backdoor delivery campaign began in November 2023 and continues to distribute new variants of the malware. According to researchers at Bitdefender, the malware can run on Intel-based (x86_64) and ARM (Apple Silicon) architectures. This article continues to discuss findings regarding the new Rust-based macOS malware RustDoor.

Submitted by Gregory Rigby on

"The State of the Metaverse"

"The State of the Metaverse"

The metaverse raises significant concerns, including those about cybersecurity. The metaverse is a three-dimensional (3D) virtual immersive environment in which users interact as avatars. According to the 2023 report "Exploring the Industrial Metaverse in Manufacturing" from Deloitte and the Manufacturing Leadership Council, 72 percent of manufacturers are most concerned about the cybersecurity risks associated with implementing metaverse-enabling technologies.

Submitted by Gregory Rigby on

"Security Flaw in a Popular Smart Helmet Allowed Silent Location Tracking"

"Security Flaw in a Popular Smart Helmet Allowed Silent Location Tracking"

Livall, a smart ski and bike helmet maker, has fixed a security flaw that enabled easy real-time location tracking of a user wearing its helmets. The company makes Internet-connected helmets that allow groups of skiers or bike riders to communicate with one another via the helmet's built-in speaker and microphone, as well as share their real-time location in a friend group using Livall's smartphone apps.

Submitted by Gregory Rigby on

"Known Ransomware Attacks Increased 68% Last Year"

"Known Ransomware Attacks Increased 68% Last Year"

According to Malwarebytes' recent State of Malware report, the rise of Ransomware-as-a-Service (RaaS) gangs such as LockBit and ALPHV was accompanied by a 68 percent increase in known ransomware attacks in 2023, reaching a new high. The total number of known cyberattacks was 4,475 in 2023. The US made up nearly half of the ransomware attacks. The UK was second with 7 percent of costly incidents, followed by Canada, Italy, and Germany with 4 percent each. According to the report, the LockBit gang demanded the highest ransom of the year, $80 million, following an attack on Royal Mail.

Submitted by Gregory Rigby on

"New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack"

"New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack"

A new banking trojan called Coyote has targeted 61 banking institutions in Brazil. Researchers discovered that Coyote differs from other banking trojans of its kind because of its use of the open-source Squirrel framework for installing and updating Windows apps. Another differentiating factor is the shift from Delphi, which is popular among banking malware families targeting Latin America, to a relatively new multi-platform programming language called Nim. This article continues to discuss findings regarding the Coyote banking trojan.

Submitted by Gregory Rigby on

"Quishing Attacks Surge and Bypass Email Security"

"Quishing Attacks Surge and Bypass Email Security"

According to researchers at Abnormal Security, email attacks involving QR codes, also known as quishing attacks, increased significantly in the fourth quarter of 2023. Quishing attacks can evade email security solutions or spam filters. Abnormal Security discovered that quishing attacks increased by a factor of 42. These attacks primarily targeted C-level executives. About 90 percent of detected quishing attacks aimed to steal login credentials. This article continues to discuss the rise in quishing attacks.

Submitted by Gregory Rigby on

"Cybersecurity Teams Recognized as Key Enablers of Business Goals"

"Cybersecurity Teams Recognized as Key Enablers of Business Goals"

According to CybSafe, 97 percent of office employees in the UK and US trust that their cybersecurity team can prevent or mitigate the damage caused by cyberattacks. CybSafe examined attitudes toward cybersecurity teams within organizations and discovered that employees have high levels of trust and appreciation for such teams despite there being issues with communication and processes. Cybersecurity teams and professionals are increasingly regarded as a critical strategic function supporting individual and business success.

Submitted by Gregory Rigby on
Subscribe to