12th IEEE International Conference on Cloud Networking (IEEE CloudNet 2023)

"Cloud networking has emerged as a promising direction for cost‐efficient, reliable service and data delivery across wide-area backbones and data-center fabrics. The prominent penetration of virtualization technologies into computing and communication infrastructure has led to continuous innovation, with new network protocols, software platforms, and artificial intelligence-based techniques for their orchestration.

"Fake Browser Updates Used in Malware Distribution"

"Fake Browser Updates Used in Malware Distribution"

Cybersecurity researchers at Proofpoint have identified a rising trend in threat activity that employs fake browser updates to disseminate malware.  Fake browser updates are compromised websites that display fake notifications mimicking popular browsers like Chrome, Firefox, or Edge, luring users into downloading malicious software instead of legitimate updates.  The researchers stated that TA569, a threat actor, has been using fake browser updates for over five years to deliver SocGholish malware.  Recently, other threat actors have adopted this strategy.

Submitted by Adam Ekwall on

"Thousands of Cisco IOS XE Devices Hacked in Widespread Attacks"

"Thousands of Cisco IOS XE Devices Hacked in Widespread Attacks"

Attackers have exploited a recently disclosed critical zero-day vulnerability to infect thousands of Cisco IOS XE devices with malicious implants. According to the threat intelligence company VulnCheck, the maximum severity vulnerability, tracked as CVE-2023-20198, has been widely exploited in attacks against Cisco IOS XE routers and switches with the Web User Interface (Web UI) and HTTP or HTTPS Server feature enabled. VulnCheck scanned Internet-facing Cisco IOS XE web interfaces and found that there are thousands of compromised and infected hosts.

Submitted by grigby1 CPVI on

"Experts Warn of Severe Flaws Affecting Milesight Routers and Titan SFTP Servers"

"Experts Warn of Severe Flaws Affecting Milesight Routers and Titan SFTP Servers"

Milesight's industrial cellular routers may have been actively exploited in real-world attacks, according to new research from VulnCheck. The exploited vulnerability, tracked as CVE-2023-43261, has been described as a case of information disclosure that affects UR5X, UR32L, UR32, UR35, and UR41 routers before version 35.3.0.7. Remote and unauthenticated attackers could gain unauthorized access to the web interface, enabling them to configure Virtual Private Network (VPN) servers and disable firewall protections.

Submitted by grigby1 CPVI on

"NSA Publishes ICS/OT Intrusion Detection Signatures and Analytics"

"NSA Publishes ICS/OT Intrusion Detection Signatures and Analytics"

The National Security Agency (NSA) has recently published a repository of tools to help critical infrastructure entities hunt for malicious activity in ICS and other OT environments.  Named Elitewolf, the GitHub repository contains ICS/SCADA/OT-focused intrusion detection signatures and analytics that should enable defense industrial base (DIB), national security systems (NSS) and services, and other critical infrastructure owners and operators to implement continuous system monitoring.

Submitted by Adam Ekwall on

"NSA and Partners Issue Additional Guidance for Secure By Design Software"

"NSA and Partners Issue Additional Guidance for Secure By Design Software"

The Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), the FBI, and international partners have released a Cybersecurity Information Sheet (CSI) to provide guidance for technology manufacturers to ensure that their products are secure by design. The joint CSI supplements the April 2023 report "Shifting the Balance of Cybersecurity Risk: Principles and Approaches for Secure by Design Software" with additional guidance.

Submitted by grigby1 CPVI on

"Microsoft Defender Thwarted Akira Ransomware Attack on an Industrial Engineering Firm"

"Microsoft Defender Thwarted Akira Ransomware Attack on an Industrial Engineering Firm"

Microsoft announced that its Microsoft Defender for Endpoint solution helped thwart a large-scale hacking campaign conducted by Akira ransomware operators, which Microsoft tracks as Storm-1567. The attack occurred in early June 2023 and was aimed at an industrial engineering organization. According to the company, its cyber defense solution can automatically block human-operated attacks such as ransomware without the need for additional capabilities.

Submitted by grigby1 CPVI on

"US Gov Expects Widespread Exploitation of Atlassian Confluence Vulnerability"

"US Gov Expects Widespread Exploitation of Atlassian Confluence Vulnerability"

US cybersecurity agency CISA, the FBI, and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have warned organizations of potential widespread exploitation of a recent zero-day vulnerability in the Atlassian Confluence Data Center and Server.  Tracked as CVE-2023-22515 (CVSS score of 9.8), the bug has been exploited by a nation-state threat actor since September 14, roughly two weeks before Atlassian released patches for it.

Submitted by Adam Ekwall on

"Healthcare Workers Stop Active Hacker in Cybertruck"

"Healthcare Workers Stop Active Hacker in Cybertruck"

Researchers at the University of Twente looked at whether a simulation of a cyberattack in an escape room could contribute to a greater awareness of cybersecurity. Healthcare facility employees participated in the study. The escape room was found to increase cybersecurity awareness among healthcare employees. For example, participants reported being more alert regarding phishing, installing software updates, and using strong passwords. Acute Zorg Euregio (AZE), a regional network of organizations involved in acute care, arranged the escape room.

Submitted by grigby1 CPVI on
Subscribe to