"NIST Offers Draft Guidance on Evaluating a Privacy Protection Technique for the AI Era"

"NIST Offers Draft Guidance on Evaluating a Privacy Protection Technique for the AI Era"

A new publication from the National Institute of Standards and Technology (NIST) offers guidance on using a type of mathematical algorithm known as differential privacy to help data-centric organizations strike a balance between privacy and accuracy. Using differential privacy, the data can be made public without revealing the identities of the individuals in the dataset.

Submitted by Gregory Rigby on

"Cold Storage Giant Americold Discloses Data Breach After April Malware Attack"

"Cold Storage Giant Americold Discloses Data Breach After April Malware Attack"

Cold storage and logistics giant Americold has recently confirmed that over 129,000 employees and their dependents had their personal information stolen in an April attack, later claimed by Cactus ransomware.  Americold employs 17,000 people worldwide and operates more than 24 temperature-controlled warehouses across North America, Europe, Asia-Pacific, and South America.

Submitted by Adam Ekwall on

"Toyota Warns Customers of Data Breach Exposing Personal, Financial Info"

"Toyota Warns Customers of Data Breach Exposing Personal, Financial Info"

Toyota Financial Services (TFS) is warning customers it suffered a data breach, stating that sensitive personal and financial data was exposed in the attack.  Toyota Financial Services, a subsidiary of Toyota Motor Corporation, is a global entity with a presence in 90% of the markets where Toyota sells its cars, providing auto financing to its customers.  Following a claim from the Medusa ransomware gang about successfully compromising the Japanese automaker's division, the company confirmed that it detected unauthorized access on some of its systems in Europe and Africa.

Submitted by Adam Ekwall on

"NSA and ESF Partners Release Recommended Practices for Managing Open Source Software and Software Bill of Materials"

"NSA and ESF Partners Release Recommended Practices for Managing Open Source Software and Software Bill of Materials"

The National Security Agency (NSA), the Office of the Director of National Intelligence (ODNI), the Cybersecurity and Infrastructure Security Agency (CISA), and industry partners have released a Cybersecurity Technical Report (CTR) titled "Securing the Software Supply Chain: Recommended Practices for Managing Open Source Software and Software Bill of Materials." The CTR expands on the "Enhancing the Security of the Software Supply Chain through Secure Software Development Practices" paper.

Submitted by Gregory Rigby on

"Cybercriminals Continue Targeting Open Remote Access Products"

"Cybercriminals Continue Targeting Open Remote Access Products"

According to WatchGuard, cybercriminals continue to prefer open remote access products or legitimate remote access tools for hiding their actions. Corey Nachreiner, CSO at WatchGuard, says threat actors are still using various tools and methods in their attack campaigns, thus making it essential for organizations to stay up to date on the latest tactics to strengthen their security strategy. Modern security platforms, which include firewalls and endpoint protection software, can provide improved network and device protection.

Submitted by Gregory Rigby on

"Lazarus Group Is Still Juicing Log4Shell, Using RATs Written in 'D'"

"Lazarus Group Is Still Juicing Log4Shell, Using RATs Written in 'D'"

North Korean hackers continue to exploit Log4Shell, recently using that access to launch one of three new Remote Access Trojans (RATs) written in the "D" (dlang) programming language. The group "Andariel," also known as Onyx Sleet and Plutonium, is one of many entities under Lazarus. Andariel specializes in gaining initial access and maintaining persistence for longer-term espionage campaigns in support of the Kim Jung Un regime. Cisco Talos has observed three notable Andariel attacks since March. One was against a South American agriculture organization.

Submitted by Gregory Rigby on

"Norton Healthcare Ransomware Hack: 2.5 Million Personal Records Stolen"

"Norton Healthcare Ransomware Hack: 2.5 Million Personal Records Stolen"

Kentucky healthcare organization Norton Healthcare started informing 2.5 million individuals that their personal information was compromised in a ransomware data extortion hack earlier this year. The company said the incident was identified on May 9, 2023, and involved unauthorized access to certain network storage systems for two days. Norton Healthcare runs 140 locations in Greater Louisville and Southern Indiana. The company determined that the attackers had exfiltrated files containing the personal information of current and former patients, employees, and dependents.

Submitted by Adam Ekwall on

"Over 30% Of Log4j Apps Use a Vulnerable Version of the Library"

"Over 30% Of Log4j Apps Use a Vulnerable Version of the Library"

About 38 percent of applications using the Apache Log4j library are still vulnerable to security issues, including Log4Shell, a critical vulnerability with the highest severity rating. Log4Shell is a Remote Code Execution (RCE) flaw that enables complete control of systems running Log4j 2.0-beta9 and up to 2.15.0. On December 10, 2021, the flaw was discovered as an actively exploited zero-day, and its widespread impact, ease of exploitation, and security implications served as an invitation to threat actors.

Submitted by Gregory Rigby on

"Cybersecurity Protects Food, Agriculture"

"Cybersecurity Protects Food, Agriculture"

The Pacific Northwest National Laboratory (PNNL) is working on the first US Department of Homeland Security (DHS)-sponsored effort to explore the cybersecurity vulnerabilities and potential impact of increasingly smart agriculture technologies on US society. The "Food and Agriculture Risk Modeling" (FARM) project will proactively identify vulnerabilities in today's digital agricultural software and equipment as well as calculate the consequences of potentially successful cyberattacks.

Submitted by Gregory Rigby on

"Saddling up Cryptosystems for a Quantum Showdown"

"Saddling up Cryptosystems for a Quantum Showdown"

A team of researchers may have discovered the key to tackling threats from a large-scale quantum attack in an algebraic structure known as a quadratic twist. According to Jason LeGrow, assistant professor of mathematics in the Virginia Tech College of Science and Commonwealth Cyber Initiative Fellow, the most promising class of efficient blind signatures known to withstand quantum attacks is based on certain mathematical protocols believed to be quantum-safe. Before a message is signed, a blind signature disguises its content.

Submitted by Gregory Rigby on
Subscribe to