"Cybercriminals Exploit Gaza Crisis With Fake Charity"

"Cybercriminals Exploit Gaza Crisis With Fake Charity"

Cybersecurity researchers at Abnormal Security have uncovered a charity attack exploiting the ongoing events in Gaza and Israel.  The researchers noted that cybercriminals targeted 212 individuals across 88 organizations, attempting to manipulate sympathy for children in Palestine to solicit fraudulent donations.  The attackers, posing as a group from “help-palestine.com,” urged recipients to contribute to a campaign supposedly providing vital support to families in Palestine.

Submitted by Adam Ekwall on

"Shadowy Hack-for-Hire Group Behind Sprawling Web of Global Cyberattacks"

"Shadowy Hack-for-Hire Group Behind Sprawling Web of Global Cyberattacks"

A months-long review of non-public data gathered by investigative journalists at Reuters has confirmed previous reports linking an Indian hack-for-hire group to numerous and sometimes disruptive cyber espionage and surveillance incidents against individuals and entities around the world. The New Delhi-based group known as Appin does not exist anymore, at least in its original form or branding. The group's operatives hacked into computers belonging to business executives, politicians, military officials, and other high-value individuals for several years, starting around 2009.

Submitted by Gregory Rigby on

"Smaller Businesses Embrace GenAI, Overlook Security Measures"

"Smaller Businesses Embrace GenAI, Overlook Security Measures"

According to Zscaler, despite significant security concerns, organizations feel pressured to use generative Artificial Intelligence (AI) tools. Based on a survey of over 900 global Information Technology (IT) decision makers, while 89 percent of organizations view generative AI tools such as ChatGPT as a potential security risk, 95 percent already use them in some form within their businesses.

Submitted by Gregory Rigby on

"Yamaha Motor Confirms Data Breach Following Ransomware Attack"

"Yamaha Motor Confirms Data Breach Following Ransomware Attack"

Employees' personal information was recently stolen in a ransomware attack targeting a Philippines subsidiary of Yamaha Motor.  The incident, the Japanese mobility and industrial giant says, occurred on October 25 and only impacted one server managed by Yamaha Motor Philippines, the company's motorcycle manufacturing and sales subsidiary in the country.  The company noted that the server was accessed without authorization by a third party and hit by a ransomware attack.

Submitted by Adam Ekwall on

"Researchers Extract RSA Keys from SSH Server Signing Errors"

"Researchers Extract RSA Keys from SSH Server Signing Errors"

A team of researchers demonstrated that under certain conditions, passive network attackers can recover secret RSA keys from naturally occurring errors resulting in failed SSH connection attempts. SSH is a cryptographic network protocol for secure communication used in remote system access, file transfers, and system administration tasks. RSA is a public-key cryptosystem used in SSH for user authentication, and it involves a private, secret key to decrypt communication encrypted with a public, shareable key.

Submitted by Gregory Rigby on

"Reversible Data Hiding Algorithm in Encrypted Images Using Adaptive Total Variation and Cross-Cyclic Shift"

"Reversible Data Hiding Algorithm in Encrypted Images Using Adaptive Total Variation and Cross-Cyclic Shift"

Mingfang Jiang of the School of Computer Science at the Hunan First Normal University in Changsha, China, has introduced a new algorithm that can improve covert communication without compromising data integrity. The innovative algorithm called RDHEIAC (Reversible Data Hiding for Encrypted Images Algorithm with Adaptive Total Variation and Cross-Cyclic Shift) represents a significant advancement in information security and covert communication.

Submitted by Gregory Rigby on

"Securing Space: NASA Funds Innovative AI, Blockchain Project at University of Miami for Nanosatellite Cybersecurity"

"Securing Space: NASA Funds Innovative AI, Blockchain Project at University of Miami for Nanosatellite Cybersecurity"

NASA is leading a project through the University of Miami's Frost Institute for Data Science and Computing (IDSC) that seeks to improve the security of satellite communication in space. The project aims to integrate nanosatellites with traditional large satellites as well as address the cybersecurity challenges associated with their communication networks. NASA approached Dr. Yelena Yesha, the Knight Foundation Endowed Chair and Director of IDSC AI and Machine Learning at the University of Miami, to address the critical issue of cybersecurity in satellite communication.

Submitted by Gregory Rigby on

"27 Malicious PyPI Packages with Thousands of Downloads Found Targeting IT Experts"

"27 Malicious PyPI Packages with Thousands of Downloads Found Targeting IT Experts"

For nearly six months, an unknown threat actor has been publishing typosquat packages to the Python Package Index (PyPI) repository to deliver malware capable of gaining persistence, stealing sensitive data, and accessing cryptocurrency wallets. According to Checkmarx, the 27 packages, which posed as popular legitimate Python libraries, were downloaded thousands of times. Most downloads came from the US, China, France, Hong Kong, Germany, Russia, Ireland, Singapore, the UK, and Japan.

Submitted by Gregory Rigby on

"Russian Cozy Bear Strikes European Embassies With WinRAR Bug"

"Russian Cozy Bear Strikes European Embassies With WinRAR Bug"

According to Ukrainian government cybersecurity researchers, Russian state hackers exploited a recently patched vulnerability in a popular Windows tool for archiving files to target European embassies and international organizations in espionage attacks. Ukraine's National Cyber Security Coordination Center says hackers from Russia's Foreign Intelligence Service, known as Cozy Bear or APT29, launched attacks against the embassies of several countries, including Azerbaijan, Greece, Romania, and Italy.

Submitted by Gregory Rigby on

"A Critical OS Command Injection Flaw Affects Fortinet FortiSIEM"

"A Critical OS Command Injection Flaw Affects Fortinet FortiSIEM"

Fortinet is warning customers about a critical operating system command injection vulnerability, tracked as CVE-2023-36553 with a CVSS score of 9.3, in the FortiSIEM report server. A remote, unauthenticated attacker can use the flaw to execute commands by sending specially crafted Application Programming Interface (API) requests. FortiSIEM is Fortinet's Security Information and Event Management (SIEM) solution that collects, aggregates, and correlates log data from various sources within a network.

Submitted by Gregory Rigby on
Subscribe to