"NSA Releases Guidance on Acceptance Testing for Supply Chain Risk Management"

"NSA Releases Guidance on Acceptance Testing for Supply Chain Risk Management"

The National Security Agency's (NSA) Cybersecurity Information Sheet (CSI) titled "Procurement and Acceptance Testing Guide for Servers, Laptops, and Desktop Computers" encourages US Government departments and agencies operating National Security Systems (NSS) to implement an effective supply chain risk management strategy. NSA recommends that enterprise computing systems be procured with a robust set of security capabilities that are tested before acceptance.

Submitted by Gregory Rigby on

"Malicious Ads Creep Into Bing Chat Responses"

"Malicious Ads Creep Into Bing Chat Responses"

Users of Microsoft's Bing Chat, a GPT-4-powered search engine introduced this year, are being targeted with malicious ads. According to researchers at Malwarebytes, searching for Advanced IP Scanner (network-scanning software) or MyCase (legal case management software) could result in an infection.

Submitted by Gregory Rigby on

"Attacks on Azerbaijan Businesses Drop Malware via Fake Image Files"

"Attacks on Azerbaijan Businesses Drop Malware via Fake Image Files"

A spear-phishing email appearing to be a memo from the president of an Azerbaijan company hid malware behind images in order to infiltrate businesses affiliated with the company. According to researchers at Fortinet, the emails contained a zip file and referenced the conflict between Azerbaijan and Armenia. The images in that file had both legitimate and malicious content. The phishing campaign targeted management teams of businesses associated with the Azerbaijanian company.

Submitted by Gregory Rigby on

"Microsoft Breach Exposed 60,000 State Department Emails"

"Microsoft Breach Exposed 60,000 State Department Emails"

According to Microsoft, a sophisticated Chinese cyber-espionage campaign targeting Microsoft Outlook accounts gave Beijing access to tens of thousands of private US government emails.  The Storm-0558 group was able to steal 60,000 emails from 10 State Department accounts, nine of which were used by individuals working on East Asia and Pacific diplomacy.  According to a State Department briefing,  the hackers were also able to get hold of a list containing all of the department’s email accounts.

Submitted by Adam Ekwall on

"NIST Publishes Final Version of 800-82r3 OT Security Guide"

"NIST Publishes Final Version of 800-82r3 OT Security Guide"

NIST recently published the final version of its latest guide to operational technology (OT) security.  NIST published the first draft of Special Publication (SP) 800-82r3 (Revision 3) in April 2021, with a second draft being released one year later.  Now, Revision 3 of the OT security guide has been finalized.  The new 316-page document provides guidance on improving the security of OT systems while addressing their unique safety, reliability, and performance requirements.

Submitted by Adam Ekwall on

"ROBOT Crypto Attack on RSA Is Back as Marvin Arrives"

"ROBOT Crypto Attack on RSA Is Back as Marvin Arrives"

Hubert Kario, a senior quality engineer on the QE BaseOS Security team at Red Hat, has discovered flaws in a 25-year-old method for encrypting data using RSA public-key cryptography. According to Kario, in a paper titled "Everlasting ROBOT: the Marvin Attack," many software implementations of the PKCS#1 v1.5 padding scheme for RSA key exchange, which were previously thought to be immune to Daniel Bleichenbacher's well-known attack, are actually vulnerable.

Submitted by Gregory Rigby on

"Enhancing AI Robustness for More Secure and Reliable Systems"

"Enhancing AI Robustness for More Secure and Reliable Systems"

Reevaluating how most Artificial Intelligence (AI) systems protect against attacks helped researchers at EPFL's School of Engineering develop a new training approach to ensure Machine Learning (ML) models, particularly deep neural networks, always perform as intended. The new model effectively replaces a long-standing training approach based on a zero-sum game. It uses a continuously adaptive attack strategy to develop a more intelligent training scenario.

Submitted by Gregory Rigby on

"New Resource for Domestic Abuse Survivors Combines AI, Cybersecurity, and Psychology"

"New Resource for Domestic Abuse Survivors Combines AI, Cybersecurity, and Psychology"

Researchers at the Georgia Institute of Technology are developing a new software tool powered by Artificial Intelligence (AI) to address the understudied area of digital security and domestic abuse. Abusers often use the Internet and mobile technology to broaden the scope of their abuse. However, the small scale of such online attacks has resulted in security researchers paying less attention to them.

Submitted by Gregory Rigby on

"'Marriages of Convenience' Between State Actors and Cybercriminals Provide Cover for Both"

"'Marriages of Convenience' Between State Actors and Cybercriminals Provide Cover for Both"

Intelligence services in countries such as Russia, North Korea, and China have leveraged ad hoc relationships with cybercriminal groups within their borders for some time to shield their organizations from the repercussions of their actions. However, recent successes by authorities in the US and elsewhere have demonstrated that even this strategy does not put actors beyond the reach of law enforcement.

Submitted by Gregory Rigby on

"UK Data Regulator Warns That Data Breaches Put Abuse Victims' Lives at Risk"

"UK Data Regulator Warns That Data Breaches Put Abuse Victims' Lives at Risk"

The UK Information Commissioner's Office (ICO) has issued a warning about the potential risks posed by data breaches that expose the Personally Identifiable Information (PII) of domestic abuse victims. The data privacy regulator urges organizations handling domestic abuse victims' PII to train their staff and implement appropriate systems to prevent such incidents. In the past 14 months, the ICO has reprimanded seven organizations for data breaches impacting victims of domestic abuse, including four instances in which organizations exposed victims' safe addresses.

Submitted by Gregory Rigby on
Subscribe to