"Cyber Insurer Says Ransomware Attacks Drove a Spike in Claim Sizes"

"Cyber Insurer Says Ransomware Attacks Drove a Spike in Claim Sizes"

The cyber insurance provider Coalition reported that its customers made fewer claims in the first half of 2024 than in the same period in 2023, but their average loss increased by 14 percent to $122,000. According to the company, the rise in ransomware severity increased losses, and threat actors targeted larger businesses. This article continues to discuss findings regarding the rise in ransomware demands and claim sizes.

Submitted by Gregory Rigby on

"Pokémon Developer Game Freak Suffers Data Breach"

"Pokémon Developer Game Freak Suffers Data Breach"

Japanese game developer Game Freak, the firm behind the Pokémon franchise, has recently suffered a security breach exposing the data of 2606 employees and partners.  The leak first appeared on forum 4chan in early October and is now circulating on social media and online forums under the name "TeraLeak."  TeraLeak contains multiple gigabytes of information.

Submitted by Adam Ekwall on

"Casio Confirms Ransomware Outage and Data Breach"

"Casio Confirms Ransomware Outage and Data Breach"

Casio has recently revealed that some of its corporate systems and services are still damaged and personal information has been compromised, after a ransomware attack over a week ago.  The Japanese electronics giant said it was alerted to an unauthorized intrusion after a system failure on October 5 rendered several systems unusable.  The full extent of the damage is still under investigation, but the company has set up a task force and is currently working diligently to quickly restore internal systems and resume operations.

Submitted by Adam Ekwall on

"Penn State Leads $8.5M, Multi-Institution DARPA Project on Mixed-Reality Systems"

"Penn State Leads $8.5M, Multi-Institution DARPA Project on Mixed-Reality Systems"

Penn State researchers will lead a multi-institution project called "Verified Probabilistic Cognitive Reasoning for Tactical Mixed Reality Systems (VeriPro)" funded by the Defense Advanced Research Projects Agency (DARPA) to identify cognitive threats faced by Mixed Reality (MR) systems as part of the agency's "Intrinsic Cognitive Security" program. The project aims to model risks, human behaviors, and potential attacks and mitigations within MR systems.

Submitted by Gregory Rigby on

"Explore Cybersecurity Through Art at New Exhibition"

"Explore Cybersecurity Through Art at New Exhibition"

In a new art exhibition, Virginia researchers and artists challenge our cybersecurity perceptions. The Commonwealth Cyber Initiative (CCI)-funded "CyberArts 2024 Exhibit" includes projects from Blue Ridge Community College, George Mason University, James Madison University, Old Dominion University, Virginia Commonwealth University, and Virginia Tech. A project named "Hidden Within" delves into steganography, a practice that can be used in a cyberattack. It involves hiding a message within a digital picture or music.

Submitted by Gregory Rigby on

"Akira and Fog Ransomware Now Exploit Critical Veeam RCE Flaw"

"Akira and Fog Ransomware Now Exploit Critical Veeam RCE Flaw"

A critical security vulnerability allows ransomware gangs such as "Akira" and Fog" to conduct Remote Code Execution (RCE) on vulnerable Veeam Backup & Replication (VBR) servers. Florian Hauser, a security researcher at Code White, found that the flaw, stemming from a deserialization of untrusted data weakness, can be used in low-complexity attacks. This article continues to discuss the exploitation of a critical Veeam RCE flaw.

Submitted by Gregory Rigby on

"SANS Institute: Top 5 Dangerous Cyberattack Techniques in 2024"

"SANS Institute: Top 5 Dangerous Cyberattack Techniques in 2024"

The SANS Institute, a leading cybersecurity research, education, and certification authority, has released its annual "Top Attacks and Threats Report." This report delves into the changing threat landscape as it identifies the most common and dangerous cyberattack techniques organizations must be on the lookout for. It also focused on key takeaways from a presentation at SANS Institute's yearly RSA Conference. SANS members identified and discussed five new cyberattacks, as well as suggested responses to them.

Submitted by Gregory Rigby on

"Over 10M Conversations Exposed in AI Call Center Hack"

"Over 10M Conversations Exposed in AI Call Center Hack"

A data breach has exposed over 10 million conversations from an Artificial Intelligence (AI)-driven call center platform in the Middle East. According to researchers at Resecurity, the breach involved unauthorized access to the platform's management dashboard, which enabled attackers to collect millions of interactions between consumers, operators, and AI agents. The stolen data could be used for advanced fraud, phishing schemes, and other malicious activities involving AI. This article continues to discuss the AI call center hack.

Submitted by Gregory Rigby on

"Granted ACCESS: $125K Award Will Improve Cybersecurity in US Defense Supply Chain"

"Granted ACCESS: $125K Award Will Improve Cybersecurity in US Defense Supply Chain"

Through a 12-month award for 2025 from the US Department of Defense (DOD) Cyber Service Academy, a team of researchers at the University of Wisconsin-Stout will develop the "AI-Powered Cloud CMMC and Education Support System" (ACCESS). The Cybersecurity Maturity Model Certification (CMMC) is a DOD program aimed at helping businesses protect against cybersecurity threats. Defense supply chain partners handling sensitive unclassified data will have to meet strict cybersecurity standards. ACCESS will try to simplify CMMC compliance. This article continues to discuss the ACCESS project.

Submitted by Gregory Rigby on

"CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance"

"CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance"

The US Cybersecurity and Infrastructure Security Agency (CISA) warns that threat actors are using unencrypted persistent cookies managed by the F5 BIG-IP Local Traffic Manager (LTM) module to perform network reconnaissance. According to CISA, the module is being leveraged to enumerate other non-internet-facing devices on the target network. CISA warned that a malicious cyber actor could use unencrypted persistence cookies to infer or identify additional network resources and exploit vulnerabilities in other devices on the network.

Submitted by Gregory Rigby on
Subscribe to