"82% of Attacks Show Cybercriminals Targeting Telemetry Data"

"82% of Attacks Show Cybercriminals Targeting Telemetry Data"

According to security researchers at Sophos, cybercriminals have been observed disabling or wiping out logs in 82% of incidents.  The researchers stated that time is critical when responding to an active threat.  The time between spotting the initial access event and full threat mitigation should be as short as possible.  The researchers noted that the farther along in the attack chain an attacker makes it, the bigger the headache for responders.  The researchers added that missing telemetry only adds time to remediations that most organizations can’t afford.

Submitted by Adam Ekwall on

"82% of Attacks Show Cybercriminals Targeting Telemetry Data"

According to security researchers at Sophos, cybercriminals have been observed disabling or wiping out logs in 82% of incidents.  The researchers stated that time is critical when responding to an active threat.  The time between spotting the initial access event and full threat mitigation should be as short as possible.  The researchers noted that the farther along in the attack chain an attacker makes it, the bigger the headache for responders.  The researchers added that missing telemetry only adds time to remediations that most organizations can’t afford.

IEEE 42nd International Conference on Consumer Electronics

"The 42nd IEEE International Conference on Consumer Electronics (ICCE 2024) is the IEEE Consumer Technology Society’s annual flagship conference that will take place in conjunction with CES. ICCE 2024 will bring together top professionals from industry, government, and academia from around the world. The theme of the conference is Creating Our Future with Consumer Technology. The conference will provide networking opportunities for participants to share ideas, designs, and experiences on the state-of-the-art and future direction of consumer technologies.

2024 Conference on Innovative Smart Grid Technologies

"ISGT NA 2024 is a forum to discuss the latest issues, trends, and innovative technologies for the decarbonized resilient grid of the future. The Conference will feature keynote and plenary sessions, panel sessions, and technical papers presented in poster sessions, as well as pre-conference tutorials."

Topics of interest include, but are not limited to cybersecurity.

"CacheWarp: CISPA Researchers Discover New Security Vulnerability in AMD SEV Technology"

"CacheWarp: CISPA Researchers Discover New Security Vulnerability in AMD SEV Technology"

AMD developed Secure Encrypted Virtualization (SEV) to make its cloud services more secure, but even the latest versions of the security feature, SEV-ES (Encrypted State) and SEV-SNP (Secure Nested Paging), were vulnerable to a software-based attack. This discovery was made by CISPA researcher Ruiyi Zhang, who devised a type of attack called CacheWarp, which, in the worst-case scenario, allows attackers to gain in-depth access to data and even manipulate it. This was not possible with previous attack techniques. According to AMD, the vulnerability has been addressed with an update.

Submitted by Gregory Rigby on

2024 IEEE 3rd International Conference on AI in Cybersecurity (ICAIC)

"This conference provides a platform for researchers and scientists across the world to exchange and share their experiences and research results about all aspects of AI in Healthcare, Business, Management, Environmental, and Cyber Security. This conference also provides an opportunity to interact and establish professional relations for future collaboration. The conference aims to promote innovations and work of researchers, engineers, students and scientists from across the world on Advancement in eBusiness, Management, Environmental, and Social Science.

"22 Energy Firms Hacked in Largest Coordinated Attack on Denmark’s Critical Infrastructure"

"22 Energy Firms Hacked in Largest Coordinated Attack on Denmark’s Critical Infrastructure"

Non-profit cybersecurity center for critical sectors SektorCERT recently revealed that hackers compromised 22 energy organizations in a coordinated attack against Denmark’s critical infrastructure.  SektorCERT noted that as part of the attack in May 2023, the hackers compromised the victim organizations within a few days, making this the largest attack against Danish critical infrastructure to date.  SektorCERT stated that Denmark is constantly under attack,  but it is unusual that one sees so many concurrent, successful attacks against the critical infrastructure.

Submitted by Adam Ekwall on

"DHS Cybersecurity and Infrastructure Security Agency Releases Roadmap for Artificial Intelligence"

"DHS Cybersecurity and Infrastructure Security Agency Releases Roadmap for Artificial Intelligence"

The US Cybersecurity and Infrastructure Security Agency (CISA) has released its first Roadmap for Artificial Intelligence (AI), adding to the Department of Homeland Security (DHS) and broader whole-of-government initiative to ensure the secure development and implementation of AI capabilities. CISA's Roadmap for AI outlines different lines of effort, which include responsibly using AI to support the agency's mission, assessing AI systems, protecting critical infrastructure from malicious AI use, and more.

Submitted by Gregory Rigby on

"Molerats Group Wields Custom Cybertool to Steal Secrets in the Middle East"

"Molerats Group Wields Custom Cybertool to Steal Secrets in the Middle East"

TA402, also known as Molerats and Frankenstein, a pro-Palestinian cyber espionage group focused on compromising government targets in the Middle East, is using a sophisticated initial access downloader. According to Proofpoint researchers, TA402, which has been active for over a decade, is now using a new tool called IronWind. The group used it in three campaigns targeting systems within government agencies throughout the Middle East and Northern Africa.

Submitted by Gregory Rigby on

"Juniper Networking Devices Under Attack"

"Juniper Networking Devices Under Attack"

The US Cybersecurity and Infrastructure Security Agency (CISA) requires US federal agencies to patch five vulnerabilities exploited by attackers to compromise Juniper networking devices. Most of these vulnerabilities are not particularly dangerous on their own, but they can and have been chained together by attackers to enable Remote Code Execution (RCE) on Internet-facing devices. Juniper Networks patched four flaws impacting the J-Web Graphical User Interface (GUI) of Junos OS-powered devices in late August 2023, and advised customers to update their SRX firewalls and EX switches.

Submitted by Gregory Rigby on
Subscribe to