"Researchers Discover Exposed API Secrets, Impacting Major Tech Tokens"

"Researchers Discover Exposed API Secrets, Impacting Major Tech Tokens"

Escape's security research team conducted a scan of 189.5 million URLs and discovered the exposure of over 18,000 Application Programming Interface (API) secrets. Forty-one percent of the exposed secrets were highly critical, which could pose financial risks to organizations. Hundreds of Stripe, GitHub/GitLab tokens, RSA private keys, OpenAI keys, AWS tokens, Twitch secret keys, cryptocurrency exchange keys, X tokens, and Slack and Discord webhooks have all been exposed.

Submitted by Gregory Rigby on

"AnyDesk Incident: Customer Credentials Leaked and Published for Sale on the Dark Web"

"AnyDesk Incident: Customer Credentials Leaked and Published for Sale on the Dark Web"

Resecurity identified malicious actors selling a large number of AnyDesk customer credentials on the dark web. This credential leak is suspected to be the result of infostealer infections. The leaked information could be of significant value to both Initial Access Brokers (IABs) and ransomware groups familiar with AnyDesk, which is one of the tools often used after successful network intrusions.

Submitted by Gregory Rigby on

"How to Run a Password Update Campaign Efficiently and With Minimal IT Costs"

"How to Run a Password Update Campaign Efficiently and With Minimal IT Costs"

There has been little research on how to run a password update campaign efficiently and with minimal Information Technology (IT) costs. Therefore, a team of computer scientists at the University of California, San Diego, collaborated with the campus' IT Services to analyze the messaging for a campuswide mandatory password change that affected nearly 10,000 faculty and staff members. Email notifications to update passwords yielded diminishing returns after three messages.

Submitted by Gregory Rigby on

"Deepfakes Will Hurt 30% of Organizations' Trust in Biometrics by 2026"

"Deepfakes Will Hurt 30% of Organizations' Trust in Biometrics by 2026"

Gartner analysts predict that deepfakes, which are Artificial Intelligence (AI)-generated replicas of a person's likeness, will lower confidence in face biometric authentication solutions for 30 percent of companies by 2026. According to Akif Khan, VP analyst at Gartner, face-based identity verification and authentication systems will struggle to catch up with AI imitations as they become more realistic and easy to generate. Currently, most face biometric solutions rely on Presentation Attack Detection (PAD) to determine the "liveness" of a person trying to authenticate using their face.

Submitted by Gregory Rigby on

"UTEP, PNNL Partner to Train Cybersecurity Hydropower Experts"

"UTEP, PNNL Partner to Train Cybersecurity Hydropower Experts"

Hydropower, one of the oldest forms of energy generation in the US, makes up 6 percent of the country's electricity supply. However, as the country continues to modernize the electric grid, hydropower, like other technologies, is increasingly relying on digital control systems, thus calling for training and recruitment of the next generation of cybersecurity experts. Pacific Northwest National Laboratory (PNNL) has launched the Training Outreach and Recruitment for Cybersecurity in Hydropower (TORCH) program at the University of Texas at El Paso (UTEP).

Submitted by Gregory Rigby on

"DDoS Attack Power Skyrockets to 1.6 Tbps"

"DDoS Attack Power Skyrockets to 1.6 Tbps"

According to Gcore, Distributed Denial-of-Service (DDoS) attack trends for the second half of 2023 reveal alarming increases in scale and sophistication. The maximum attack power increased from 800 Gbps to 1.6 Tbps. User Datagram Protocol (UDP) floods dominate, making up 62 percent of DDoS attacks. Transmission Control Protocol (TCP) floods and Internet Control Message Protocol (ICMP) attacks continue to be popular, comprising 16 percent and 12 percent of total activity, respectively. All other DDoS attack types, including SYN, SYN+ACK flood, and RST Flood, made up for only 10 percent.

Submitted by Gregory Rigby on

"Russian APT28 Hackers Targeting High-Value Orgs with NTLM Relay Attacks"

"Russian APT28 Hackers Targeting High-Value Orgs with NTLM Relay Attacks"

From April 2022 to November 2023, the Russian state-sponsored hacking group APT28 conducted NT LAN Manager (NTLM) v2 hash relay attacks using various methods, focusing on high-value targets worldwide. The attacks targeted organizations involved in foreign affairs, energy, defense, transportation, and more. This article continues to discuss APT28's targeting of high-value organizations with NTLM v2 hash relay attacks.

Submitted by Gregory Rigby on

"Payment Fraud is Hitting Organizations Harder Than Ever Before"

"Payment Fraud is Hitting Organizations Harder Than Ever Before"

According to security researchers at Trustpair, 96% of US companies were targeted with at least one fraud attempt in the past year.  In the past year, many US companies (83%) saw an increase in cyber fraud attempts on their organization.  The researchers noted that Fraudsters primarily used text messages (50%), fake websites (48%), social media (37%), hacking (31%), BEC scams (31%) and deepfakes (11%) to dupe organizations.  CEO and CFO impersonations (44%) were the third most common type of fraud.

Submitted by Adam Ekwall on

"Lurie Children's Hospital Took Systems Offline After Cyberattack"

"Lurie Children's Hospital Took Systems Offline After Cyberattack"

Lurie Children's Hospital in Chicago was recently forced to take IT systems offline after a cyberattack, disrupting normal operations and delaying medical care in some instances.  Lurie Children's is a Chicago-based pediatric acute care hospital with 360 beds, 1,665 physicians covering 70 sub-specialties, and 4,000 medical staff and employees.  The hospital is providing care for over 200,000 children annually.

Submitted by Adam Ekwall on
Subscribe to