"Stop the Digital Criminals With Basic Cyber Hygiene Practices"

"Stop the Digital Criminals With Basic Cyber Hygiene Practices"

Cybersecurity experts call for a new, more collaborative, and transparent strategy to combat cyberattacks. Although 99 percent of attempted cyberattacks are thwarted, the remaining 1 percent cause economic harm and significant reputational, legal, and personal damages. Associate Professor Mamello Thinyane, the Optus Chair of Cybersecurity and Data Science at the University of South Australia, emphasizes that individuals, businesses, and governments must all share the responsibility.

Submitted by Gregory Rigby on

"Guyana Governmental Entity Hit by DinodasRAT in Cyber Espionage Attack"

"Guyana Governmental Entity Hit by DinodasRAT in Cyber Espionage Attack"

A government entity in Guyana has been targeted as part of Operation Jacana, a cyber espionage campaign. The activity, discovered by ESET in February 2023, involved a spear-phishing attack that resulted in the launch of a previously undocumented C++ implant called DinodasRAT. The cybersecurity company noted that it could link the intrusion to a known threat actor or group, but attributed with medium confidence to China-nexus adversary due to the use of PlugX, also known as Korplug, a Remote Access Trojan (RAT) commonly used by Chinese hacking groups.

Submitted by Gregory Rigby on

"LLMs Lower the Barrier for Entry Into Cybercrime"

"LLMs Lower the Barrier for Entry Into Cybercrime"

Jack Chapman, VP of Threat Intelligence at Egress, has emphasized that chatbots or Large Language Models (LLMs) have lowered the barrier for entry to cybercrime, making it possible for less-skilled threat actors to construct well-written phishing campaigns and generate malware. However, according to Chapman, one of LLMs' most concerning but least discussed applications is reconnaissance for highly targeted attacks. Within seconds, a chatbot can scrape the Internet for open-source information about a target. This information can then be used as a pretext for social engineering campaigns.

Submitted by Gregory Rigby on

"Scammers Impersonate Companies to Steal Cryptocurrency from Job Seekers"

"Scammers Impersonate Companies to Steal Cryptocurrency from Job Seekers"

Security researchers at CloudSEK have discovered a major new scam operation designed to trick job seekers into parting with cryptocurrency by getting them to complete meaningless tasks they believe will earn them money.  The researchers have dubbed the operation "WebWyrm," it has already targeted more than 100,000 individuals across over 50 countries by impersonating over 1000 companies across 10 industries.  The researchers noted that it has already potentially netted the scammers over $100m.

Submitted by Adam Ekwall on

"Joint Advisory on Top Cyber Misconfigurations Highlights Urgency for Software Manufacturers to Incorporate Secure by Design Principles"

"Joint Advisory on Top Cyber Misconfigurations Highlights Urgency for Software Manufacturers to Incorporate Secure by Design Principles"

Cyberattacks that cause damage to public and private organizations in every industry are all too common. Although some of these incidents involve using novel techniques to gain access to or move throughout a network, many abuse common misconfigurations. By ensuring secure configurations, the frequency and severity of cyberattacks can be significantly reduced.

Submitted by Gregory Rigby on

"Qakbot Hackers Now Pushing Cyclops/Ransom Knight Ransomware, Cisco Says"

"Qakbot Hackers Now Pushing Cyclops/Ransom Knight Ransomware, Cisco Says"

According to security researchers, the cybercriminals behind the Qakbot malware have shifted their focus to ransomware distribution. The report arrives weeks after law enforcement agencies from the US, France, Germany, the Netherlands, the UK, Romania, and Latvia collaborated to shut down one of the most prolific and longest-running botnets, Qakbot. Not only did the agencies close down Qakbot's computer infrastructure, but they also removed malware from infected devices.

Submitted by Gregory Rigby on

"Serious Flaws Found in Supermicro BMC Firmware"

"Serious Flaws Found in Supermicro BMC Firmware"

Multiple flaws in the Baseboard Management Controller (BMC) chip firmware of a wide variety of Supermicro motherboards, when combined, enable an attacker to take complete control of a vulnerable system. The flaws exist in the motherboards' BMC web server. The researchers at Binarly, who discovered the bugs, found that by combining any of three cross-site scripting vulnerabilities with a command-injection vulnerability, an attacker could gain arbitrary code execution and root privileges. Supermicro has released updated firmware for the affected 11, H11, B11, CMM, M11, and H12 motherboards.

Submitted by Gregory Rigby on

"Sony Confirms Data Stolen in Two Recent Hacker Attacks"

"Sony Confirms Data Stolen in Two Recent Hacker Attacks"

Sony just announced new information regarding the recent investigation it launched after a ransomware group named RansomedVC claimed to have compromised all of the company's systems and offered to sell stolen data.  Sony stated that during their investigation, it identified unauthorized activity on a single server located in Japan.  Sony noted that the hacked server has been used for internal testing for the company's Entertainment, Technology, and Services (ET&S) business.  Sony has taken this server offline while the investigation is ongoing.

Submitted by Adam Ekwall on

"Bing Chat LLM Tricked Into Circumventing CAPTCHA Filter"

"Bing Chat LLM Tricked Into Circumventing CAPTCHA Filter"

A user on the X platform (previously known as Twitter) recently devised and effectively carried out a plan that caused Bing Chat to bypass a CAPTCHA filter. CAPTCHA filters are visual puzzles that are easy for humans to solve but challenging for automated programs. Denis Shiryaev was feeding a CAPTCHA image to Bing Chat, a public Large Language Model (LLM) hosted by Microsoft that is similar to ChatGPT. This article continues to discuss how Shiryaev got the LLM model chatbot to be more willing to solve the visual puzzle and override its programming.

Submitted by Gregory Rigby on

"Researchers Warn of 100,000 Industrial Control Systems Exposed Online"

"Researchers Warn of 100,000 Industrial Control Systems Exposed Online"

About 100,000 Industrial Control Systems (ICSs) were discovered on the public web, leaving them vulnerable to attackers probing for vulnerabilities and at risk of unauthorized access. The affected ICSs are power grids, traffic light systems, and water systems. For critical infrastructure systems, exposed ICSs include sensors, actuators, switches, building management systems, and automatic tank gauges. The cybersecurity company BitSight issued a warning after identifying the threat in multiple industries, impacting many Fortune 1000 companies in 96 countries.

Submitted by Gregory Rigby on
Subscribe to