"Major Security Flaws in Java Applications – European Researchers Warn"

"Major Security Flaws in Java Applications – European Researchers Warn"

A team of researchers from Umeå University, Paderborn University, Université du Luxembourg, and INRIA analyzed vulnerabilities in software written in Java, one of most widely used programming languages, in a study titled "An In-Depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities." They examined Java products that use deserialization, which is the process of restoring packaged information to its last state, such as user settings, game functions, shopping carts, or banking applications, and conducted a thorough analysis of vulnerabilities and attacks.

Submitted by Gregory Rigby on

"New Study Links OpenAI's GPT-3.5 Turbo To Alarming Privacy Threats"

"New Study Links OpenAI's GPT-3.5 Turbo To Alarming Privacy Threats"

A recent study conducted by Rui Zhu, a Ph.D. candidate at Indiana University Bloomington, discovered a potential privacy threat posed by OpenAI's Large Language Model (LLM), GPT-3.5 Turbo.  As part of the experiment, Zhu used a GPT-3.5 Turbo feature that allows the model to recall personal data and successfully avoided the model's privacy safeguards. Although there were flaws, the model correctly provided the work addresses of 80 percent of Times employees tested.

Submitted by Gregory Rigby on

"This Clever New Idea Could Fix AirTag Stalking While Maximizing Privacy"

"This Clever New Idea Could Fix AirTag Stalking While Maximizing Privacy"

Apple's AirTags help users find their keys or track their luggage, but AirTag features have also allowed them to be used as a tracking tool for domestic abusers and criminals in stalking targets. Apple has implemented measures to notify iPhone and Android users if an AirTag is in their vicinity for an extended period without the presence of its owner's iPhone, which could mean that an AirTag has been planted to track their location secretly.

Submitted by Gregory Rigby on

"NASA Launches Cybersecurity Guide for Space Industry"

"NASA Launches Cybersecurity Guide for Space Industry"

NASA has released its first Space Security Best Practices Guide (BPG), a document aimed at improving cybersecurity for future space missions. Concerns regarding the threats that hackers pose to satellite networks and other space initiatives have grown. In August, the FBI, the National Counterintelligence and Security Center (NCSC), and the Air Force Office of Special Investigations (AFOSI) warned that foreign intelligence entities were infiltrating and subverting space industry through various means, including hacking campaigns.

Submitted by Gregory Rigby on

Palmetto Cyber Summit 2024

"The CyberSC Board of Governors and the Summit Planning Committee invite you to the 2024 Palmetto Cyber Summit.  The event is scheduled for Wednesday and Thursday, February 21-22, 2024, and will be taking place in-person at the Cooperative Conference Center in Columbia, South Carolina. The event, in its 2nd year, will bring together experts to provide timely content and address a variety of cybersecurity issues impacting South Carolinians.

IntelliC0N

"Introducing IntelliC0N, a platform inspired by esteemed and reliable cybersecurity leaders who are eager to disseminate the latest emerging threat intelligence.  We've collaborated with some of the most brilliant minds in cybersecurity, including inventors, founders, and top-level security executives.  Together, we aim to empower the cybersecurity community with game-changing solutions to outpace evolving threats."

"ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware's Prevalence"

"ESET Threat Report: ChatGPT Name Abuses, Lumma Stealer Malware Increases, Android SpinOk SDK Spyware's Prevalence"

ESET has released its H2 2023 threat report, which highlights cybercriminals' use of the ChatGPT name, the rise of the Lumma Stealer malware, the Android SpinOk Software Development Kit (SDK) spyware, and other issues. In the second half of 2023, ESET blocked 650,000 attempts to access malicious domains with "chatgpt" or a similar string in the name. Lumma Stealer, also known as LummaC2 Stealer, is a Malware-as-a-Service (MaaS) threat that targets multiple cryptocurrency wallets, user credentials, and Two-Factor Authentication (2FA) browser extensions.

Submitted by Gregory Rigby on

SANS Cyber Threat Intelligence Summit & Training 2024

Join us in Washington, DC or Free Live Online and walk away from Cyber Threat Intelligence Summit with new perspectives and learn from case studies that challenge CTI assumptions and result in a shift in your understanding.  No matter your background or skill level, you’ll have the chance to learn, connect, and share with thousands of cybersecurity professionals in attendance from around the globe.

"security.txt: A Simple File with Big Value"

"security.txt: A Simple File with Big Value"

The US Cybersecurity and Infrastructure Security Agency (CISA) included creating a "security.txt" file as one of the priority Cybersecurity Performance Goals (CPGs). When security researchers and bug hunters find flaws in an organization's ecosystem, they must know who to contact. Researchers may be unable to quickly determine where to report vulnerabilities if there are no clear reporting channels in place, leaving the organization vulnerable to attackers. However, all organizations can overcome this challenge using a simple security.txt file.

Submitted by Gregory Rigby on

"New Sneaky Xamalicious Android Malware Hits Over 327,000 Devices"

"New Sneaky Xamalicious Android Malware Hits Over 327,000 Devices"

Xamalicious is a new Android backdoor that can perform various malicious actions on infected devices. The malware discovered by the McAfee Mobile Research Team was created using an open-source mobile app framework called Xamarin. It exploits the operating system's accessibility permissions to achieve its goals. It can also gather metadata about the compromised device and contact a command-and-control (C2) server to retrieve a second-stage payload, but only after determining whether it meets the criteria.

Submitted by Gregory Rigby on
Subscribe to