"How We're Using 'Chaos Engineering' to Make Cloud Computing Less Vulnerable to Cyberattacks"

"How We're Using 'Chaos Engineering' to Make Cloud Computing Less Vulnerable to Cyberattacks"

In a study titled "Towards Antifragility of Cloud Systems: An Adaptive Chaos Driven Framework," researchers used different strategies to show how stress can bolster the security of cloud computing systems. They applied "chaos engineering" and adaptive strategies to help the cloud computing system learn from faults and cyberattacks. This article continues to discuss the use of chaos engineering to decrease the vulnerability of cloud computing to cyberattacks.

Submitted by Gregory Rigby on

"China's Volt Typhoon Hackers Caught Exploiting Zero-Day in Servers Used by ISPs, MSPs"

"China's Volt Typhoon Hackers Caught Exploiting Zero-Day in Servers Used by ISPs, MSPs"

Lumen Technologies found the Chinese Advanced Persistent Threat (APT) group "Volt Typhoon" exploiting a new zero-day in Versa Director servers to steal credentials and break into downstream customers' networks. The vulnerability was recently added to the US Cybersecurity and Infrastructure Security Agency's (CISA) must-patch list after Versa Networks confirmed the zero-day exploitation, warning that the Versa Director Graphical User Interface (GUI) could be hacked to plant malware on affected devices.

Submitted by Gregory Rigby on

"macOS Version of HZ RAT Backdoor Targets Chinese Messaging App Users"

"macOS Version of HZ RAT Backdoor Targets Chinese Messaging App Users"

An Apple macOS version of a backdoor named "HZ RAT" targets users of Chinese instant messaging apps such as DingTalk and WeChat. The artifacts almost replicate the functionality of the Windows version of the backdoor, with the only difference being the payload, which is received from the attackers' server in the form of shell scripts.

Submitted by Gregory Rigby on

"Park’N Fly Notifies 1 Million Customers of Data Breach"

"Park’N Fly Notifies 1 Million Customers of Data Breach"

Park'N Fly recently announced that a data breach exposed the personal and account information of 1 million customers in Canada after hackers breached its network.  The threat actors breached the Park'N Fly networks through stolen VPN credentials in mid-July and stole data from the company.  On August 1, the company determined that customer information was also accessed during the attack.

Submitted by Adam Ekwall on

"Microsoft 365 Copilot Vulnerability Exposes User Data Risks"

"Microsoft 365 Copilot Vulnerability Exposes User Data Risks"

Cybersecurity researcher Johann Rehberger has disclosed a vulnerability he found in Microsoft 365 Copilot that allows attackers to steal users' sensitive information. According to Rehberger, the exploitation of this flaw involves several advanced techniques, including prompt injection, automatic tool invocation, and ASCII smuggling. The attack starts with a prompt injection through a malicious email or shared document. This injection prompts Microsoft 365 Copilot to search for additional emails and documents without consent from the user.

Submitted by Gregory Rigby on

"Microsoft Sway Abused in Massive QR Code Phishing Campaign"

"Microsoft Sway Abused in Massive QR Code Phishing Campaign"

A massive QR code phishing campaign has exploited Microsoft Sway, a cloud-based tool used for creating online presentations, to host landing pages aimed at tricking Microsoft 365 users into providing their credentials. Netskope Threat Labs discovered the attacks in July 2024, after detecting a significant increase in attacks involving Microsoft Sway to host phishing pages that steal Microsoft 365 credentials. This wave of attacks strongly differs from the minimal activity reported in the first half of the year, suggesting the campaign's large scale.

Submitted by Gregory Rigby on

"Can Your Smartwatch Get Hacked? Study Shows What Information Is at Risk"

"Can Your Smartwatch Get Hacked? Study Shows What Information Is at Risk"

According to a new Charles Darwin University (CDU) study, smartwatches can provide hackers with a wealth of personal information to exploit. The researchers hacked various smart wearable devices priced between $25 and $150 to learn about the technology's vulnerabilities and what information can be accessed and exploited. These devices enable people to track their health, monitor their fitness, perform medical tests, and more, but they frequently use Bluetooth Low Energy (BLE) technology, thus sacrificing security for low energy consumption.

Submitted by Gregory Rigby on

"A Third of Organizations Suffer SaaS Data Breaches"

"A Third of Organizations Suffer SaaS Data Breaches"

According to AppOmni, about 31 percent of global organizations experienced a data breach in their Software-as-a-Service (SaaS) applications last year while attempting to gain visibility and control over their cloud environment. To compile its "State of SaaS Security 2024 Report", the security vendor surveyed 644 enterprises with 2,500 or more employees in the US, UK, France, Germany, Japan, and Australia. The five-point increase in the share of breached respondents this year can be attributed to a number of factors identified in the study.

Submitted by Gregory Rigby on

"FBI Flawed Data Handling Raises Security Concerns"

"FBI Flawed Data Handling Raises Security Concerns"

A recent audit conducted by the Department of Justice's (DoJ) Office of the Inspector General (OIG) discovered that the FBI is exposing sensitive and classified data because of "significant weaknesses" in its inventory management and disposal of electronic storage media.

Submitted by Adam Ekwall on

NSA’s Summer 2025 Internship Opportunities - APPLY SEPT 1- OCT 1

NSA’s Summer 2025 Internship Opportunities - APPLY SEPT 1- OCT 1

The Science of Security team is pleased to announce the opening of... 

NSA’s Summer 2025 internship opportunities   

Ads open: September 1- October 1 

Who may Apply: College students (starting in freshman year) 

Submitted by Amy Karns on
Subscribe to