"How Smart Toys Spy on Kids: What Parents Need to Know"

"How Smart Toys Spy on Kids: What Parents Need to Know"

Researchers led by Professor Isabel Wagner of the Department of Mathematics and Computer Science at the University of Basel studied the security and privacy of smart toys. The researchers investigated whether data traffic was encrypted and how well. They also looked into data protection, how easy it is for users to see what data is collected, and compliance with the EU General Data Protection Regulation (GDPR). This article continues to discuss key findings from the study "No Transparency for Smart Toys."

Submitted by Gregory Rigby on

"Innovative Approach to Cryptography Makes Privacy More Personal"

"Innovative Approach to Cryptography Makes Privacy More Personal"

Gabriel Kaptchuk, a security and privacy expert and assistant professor of computer science at the University of Maryland, is at the forefront of human-centered cryptography research. Kaptchuk is developing privacy systems, focusing on a human-centered approach that takes into account how people interact with technology. According to Kaptchuk, cryptography and security are fundamentally social sciences masquerading as mathematics. This article continues to discuss Kaptchuk's research efforts in the realm of human-centered cryptography.

Submitted by Gregory Rigby on

"Researchers Find SQL Injection to Bypass Airport TSA Security Checks"

"Researchers Find SQL Injection to Bypass Airport TSA Security Checks"

Security researchers Ian Carroll and Sam Curry discovered a vulnerability in a key air transport security system that enables unauthorized individuals to bypass airport security screenings and access aircraft cockpits. They found the vulnerability in FlyCASS, a third-party web-based service used by some airlines to manage the Known Crewmember (KCM) program and Cockpit Access Security System (CASS). The researchers found that the FlyCASS login system was vulnerable to SQL injection, which allows attackers insert SQL statements for malicious database queries.

Submitted by Gregory Rigby on

"Iran's 'Fox Kitten' Group Aids Ransomware Attacks on US Targets"

"Iran's 'Fox Kitten' Group Aids Ransomware Attacks on US Targets"

The US Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have issued a warning regarding Iran's state-sponsored threat group "Fox Kitten" actively helping ransomware actors in attacks against organizations. The activity suggests that the threat actor is trying to monetize its access to victim networks in finance, defense, healthcare, and other industries. This article continues to discuss findings regarding the Fox Kitten group.

Submitted by Gregory Rigby on

"Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign"

"Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign"

According to Proofpoint researchers, the Command-and-Control (C2) mechanism of a new malware campaign uses Google Sheets. The activity, detected by Proofpoint on August 5, 2024, impersonates tax authorities from Europe, Asia, and the US to target over 70 organizations worldwide through "Voldemort." This custom tool gathers information and delivers payloads. Insurance, aerospace, transportation, academia, finance, technology, and other sectors have been targeted. This article continues to discuss the new malware campaign involving the use of Google Sheets.

Submitted by Gregory Rigby on

"Threat Actor Lures Victims to Malware-Laden VPN Page via Call, Text"

"Threat Actor Lures Victims to Malware-Laden VPN Page via Call, Text"

A social engineering campaign targeting over 130 US companies sends employees to a fake malware-laden Virtual Private Network (VPN) page, exploiting concerns about a VPN issue. According to GuidePoint Research and Intelligence Team (GRIT) researchers, the threat actor calls a user on their cell phone and poses as a help desk representative trying to fix a VPN log-in issue. If the threat actor tricks the user, they send an SMS link to a malicious VPN site that masquerades as a legitimate vendor. This article continues to discuss findings regarding the new social engineering campaign.

Submitted by Gregory Rigby on

"North Korean Hackers Launch New Wave of npm Package Attacks"

"North Korean Hackers Launch New Wave of npm Package Attacks"

Researchers at Phylum have discovered a coordinated campaign involving North Korea-linked threat groups targeting the npm ecosystem. The campaign started on August 12, 2024, with the publication of malicious npm packages aimed at infiltrating developer environments and stealing sensitive data. The packages use sophisticated tactics like multi-stage obfuscated JavaScript to download additional malware from remote servers. The malware contains Python scripts and a full Python interpreter that look for data in cryptocurrency wallet browser extensions.

Submitted by Gregory Rigby on

"US Government Issues Advisory on Ransomware Group Blamed for Halliburton Cyberattack"

"US Government Issues Advisory on Ransomware Group Blamed for Halliburton Cyberattack"

The US Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Health and Human Services (HHS), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) issued a joint advisory on the "RansomHub" ransomware group, which is suspected of attacking the oil giant Halliburton. On August 21, Halliburton, the world's second-largest oil service company, disclosed in an SEC filing that a third party had accessed some of its systems. The incident response steps described by the company suggested a ransomware attack.

Submitted by Gregory Rigby on

"APT29 Watering Hole Attacks Used Spyware Exploits"

"APT29 Watering Hole Attacks Used Spyware Exploits"

The Russian-based APT29 group used the same iOS and Google Chrome exploits as NSO Group and Intellexa in an espionage campaign against the Mongolian government. According to the researchers who discovered the campaign, it is still unclear how the APT group got the exploit. Three attacks linked "with moderate confidence" to APT29 in November 2023, February 2024, and July 2024 used the exploits. The campaigns involved watering hole attacks on Mongolian government websites. The threat actors compromised the websites and loaded a hidden iframe.

Submitted by Gregory Rigby on

"Researcher Sued for Sharing Data Stolen by Ransomware With Media"

"Researcher Sued for Sharing Data Stolen by Ransomware With Media"

The City of Columbus, Ohio, has taken legal action against a security researcher for illegally downloading and distributing data stolen and leaked by the "Rhysida" ransomware gang from the City's Information Technology (IT) network. On July 18, 2024, a ransomware attack on Columbus, Ohio's capital and most populous city, caused service outages. Rhysida ransomware claimed responsibility for stealing 6.5 TB of databases, including employee credentials, server dumps, city video camera feeds, and other sensitive data.

Submitted by Gregory Rigby on
Subscribe to