"Kennesaw State Researcher Earns Grant to Explore Improved Data Security"

"Kennesaw State Researcher Earns Grant to Explore Improved Data Security"

Xinyue Zhang of Kennesaw State University is delving into the intersection of Artificial Intelligence (AI) and cybersecurity. She is working on developing secure AI models that protect personal information and reduce energy costs. Her research is focused on federated learning, which enables AI models to work across multiple devices without sharing data, and NextG networks, the next generation of wireless technology that provides faster and more reliable connections. She wants to develop a federated learning system that addresses specific vulnerabilities faced by current systems.

Submitted by Gregory Rigby on

"Distinguishing Real Sounds From Deepfakes"

"Distinguishing Real Sounds From Deepfakes"

In a study titled "Detection of Deepfake Environmental Audio," a team of researchers analyzed errors made by the first deep neural network detector developed to automatically classify environmental sounds as real or Artificial Intelligence (AI)-generated. AI-generated deepfakes are getting increasingly more difficult to spot as fake, thus calling for better detection solutions. This article continues to discuss the study "Detection of Deepfake Environmental Audio."

Submitted by Gregory Rigby on

"NVIDIA Container Toolkit Vulnerability Exposes AI Systems to Risk"

"NVIDIA Container Toolkit Vulnerability Exposes AI Systems to Risk"

A recently discovered vulnerability in the NVIDIA Container Toolkit could enable attackers to break out of containerized environments, access sensitive data, and compromise systems. According to Wiz researchers, the vulnerability impacts both cloud-based and on-premises Artificial Intelligence (AI) applications that use NVIDIA's toolkit. The toolkit is widely used for GPU support in containers. Researchers warn that this vulnerability puts organizations at risk of data breaches, customer information exposure, and more.

Submitted by Gregory Rigby on

"Organizations Warned of Exploited SAP, Gpac and D-Link Vulnerabilities"

"Organizations Warned of Exploited SAP, Gpac and D-Link Vulnerabilities"

The US Cybersecurity and Infrastructure Security Agency (CISA) reports that SAP Commerce, Gpac framework, and D-Link DIR-820 routers are being exploited using old vulnerabilities. The oldest flaw, tracked as CVE-2019-0344 with a CVSS score of 9.8, enables attackers to execute arbitrary code on a vulnerable system with Hybris user rights. It is an unsafe deserialization issue in SAP Commerce Cloud's "virtualjdbc" extension. Hybris is a Customer Relationship Management (CRM) tool deeply integrated into the SAP cloud ecosystem.

Submitted by Gregory Rigby on

"Sloppy Entra ID Credentials Attract Hybrid Cloud Ransomware"

"Sloppy Entra ID Credentials Attract Hybrid Cloud Ransomware"

The group, known as "Storm-0501," targets schools, hospitals, and other vulnerable organizations for financial gain. Microsoft Threat Intelligence reports that Storm-0501 has been affiliated with various Ransomware-as-a-Service (RaaS) strains such as "BlackCat/ALPHV," "LockBit," and "Embargo." The ransomware group has now changed tactics as it now exploits hybrid cloud environments with weak passwords and overprivileged accounts instead of just buying initial access from brokers.

Submitted by Gregory Rigby on

"Free Sniper Dz Phishing Tools Fuel 140,000+ Cyber Attacks Targeting User Credentials"

"Free Sniper Dz Phishing Tools Fuel 140,000+ Cyber Attacks Targeting User Credentials"

Over the past year, more than 140,000 phishing websites have been linked to the "Sniper Dz" Phishing-as-a-Service (PhaaS) platform. According to Palo Alto Networks' Unit 42 researchers, Sniper Dz has an online admin panel with phishing pages. Phishers can host these pages on Sniper Dz's infrastructure or download templates to host on their own servers. This article continues to discuss findings regarding the Sniper Dz PhaaS.

Submitted by Gregory Rigby on

"UMC Health System Diverts Patients Following Ransomware Attack"

"UMC Health System Diverts Patients Following Ransomware Attack"

Texas healthcare provider UMC Health System diverted patients for several days after taking IT systems offline following a ransomware attack.  UMC disclosed the incident on September 27, when it announced that emergency and non-emergency patients via ambulance were being diverted to nearby hospitals.  On Monday, the hospital announced that sustained efforts over the weekend allowed it to restore some of the affected services and that only a select number of patients were being diverted.

Submitted by Adam Ekwall on

"T-Mobile to Pay $15.75m Penalty for Multiple Data Breaches"

"T-Mobile to Pay $15.75m Penalty for Multiple Data Breaches"

T-Mobile has recently agreed to a $15.75m settlement with the US Federal Communications Commission (FCC) for multiple cybersecurity incidents that led to millions of customers’ data being breached.  The settlement relates to a series of data breaches that occurred in 2021, 2022, and 2023, which have all been subject to FCC investigations.  T-Mobile also agreed to invest the same amount to improve its cybersecurity posture.

Submitted by Adam Ekwall on

NSA Codebreaker Challenge 2024

NSA Codebreaker Challenge 2024

NSA is always recruiting bright determined individuals to help protect our country! Are you up to the challenge?
Nation-State Advanced Persistent Threats (APTs) are targeting our Defense Industrial Base (DIB) contractors.
Stop them from infiltrating and sabotaging U.S. military operations.

Submitted by Amy Karns on

"Companies Mentioned on the Dark Web at Higher Risk for Cyber Attacks"

"Companies Mentioned on the Dark Web at Higher Risk for Cyber Attacks"

Searchlight Cyber further highlighted that the availability of any data related to an organization on the dark web increases its vulnerability to cyberattacks. The Marsh McLennan Cyber Risk Intelligence Center analyzed a dark web dataset against a sample of 9,410 organizations with an overall breach rate of 3.7 percent from 2020 to 2023. They wanted to see if there was a correlation between data breaches and dark web findings in the year prior to the incident. This article continues to discuss dark web exposure being highly correlated with cyberattack risk.

Submitted by Gregory Rigby on
Subscribe to