Charlotte Cybersecurity Conference

"Hear from our esteemed speakers while gaining up to 10 CPE credits. Immerse yourself in the latest cybersecurity developments to gain valuable insights in today’s dynamic threat landscape. Learn how to effectively manage risk, demo the newest technologies from an array of different sponsors, and network with your local community.  Don’t miss our special ceremony recognizing our honorary attendees receiving an Award of Excellence!  Join us live for breakfast, lunch, and a wrap up cocktail happy hour!"

"How to Weaponize Microsoft Copilot for Cyberattackers"

"How to Weaponize Microsoft Copilot for Cyberattackers"

Companies are rapidly implementing Microsoft's Copilot Artificial Intelligence (AI)-based chatbots to improve data collection and time management. However, threat actors also benefit from Copilot. According to security researcher Michael Bargury, attackers can use Copilot to search for data, exfiltrate it without logs, and socially engineer victims to phishing sites without having them open emails or click links. Bargury has demonstrated how Copilot is vulnerable to prompt injections that enable hackers to evade its security controls.

Submitted by Gregory Rigby on

"New AMD SinkClose Flaw Helps Install Nearly Undetectable Malware"

"New AMD SinkClose Flaw Helps Install Nearly Undetectable Malware"

AMD is warning about "SinkClose," a severe CPU vulnerability affecting multiple generations of EPYC, Ryzen, and Threadripper processors. The vulnerability enables attackers with Kernel-level (Ring 0) privileges to gain Ring -2 privileges and install almost undetectable malware. Ring -2 is one of the highest privilege levels associated with modern CPUs' System Management Mode (SMM) feature, which handles power management, hardware control, security, and more. This article continues to discuss the SinkClose flaw that helps install nearly undetectable malware.

Submitted by Gregory Rigby on

"AI May Create a Tidal Wave of Buggy, Vulnerable Software"

"AI May Create a Tidal Wave of Buggy, Vulnerable Software"

Reliance on error-filled code written by generative Artificial Intelligence (AI) using Large Language Models (LLMs) is resulting in highly vulnerable software, according to Veracode Chief CTO and co-founder Chris Wysopal. He noted that LLMs write code like human software developers who do not write secure code. Code-writing generative AI programs such as Microsoft Copilot are expected to help improve software security. Generative AI programs help developers write 50 percent more code, but the code written by AI has been found to be less secure.

Submitted by Gregory Rigby on

"Vulnerability Allowed Eavesdropping via Sonos Smart Speakers"

"Vulnerability Allowed Eavesdropping via Sonos Smart Speakers"

NCC Group researchers discovered vulnerabilities in Sonos smart speakers, including a flaw that could have enabled attackers to eavesdrop on users. An attacker in Wi-Fi range of the targeted Sonos smart speaker can exploit one of the vulnerabilities for Remote Code Execution (RCE). The researchers showed how an attacker could have taken control of a speaker, secretly recorded audio, and exfiltrated it to their server using this vulnerability. This article continues to discuss the Sonos product vulnerabilities. 

Submitted by Gregory Rigby on

"Threat Actors Favor Rclone, WinSCP and cURL as Data Exfiltration Tools"

"Threat Actors Favor Rclone, WinSCP and cURL as Data Exfiltration Tools"

The top three data exfiltration tools used by threat actors between September 2023 and July 2024 were Rclone, WinSCP, and cURL, according to ReliaQuest. Data exfiltration may involve threat actor–owned infrastructure or third-party cloud services. ReliaQuest says most high-profile ransomware groups, such as "LockBit," "Black Basta," and "BlackSuit," use the top three tools. This article continues to discuss key findings regarding the top data exfiltration tools used by threat actors.

Submitted by Gregory Rigby on

"CISA Warns About Actively Exploited Apache OFBiz RCE Flaw"

"CISA Warns About Actively Exploited Apache OFBiz RCE Flaw"

The US Cybersecurity and Infrastructure Security Agency (CISA) warns of two vulnerabilities, including a path traversal flaw affecting Apache OFBiz. Apache OFBiz is an open source Enterprise Resource Planning (ERP) system with a suite of business applications to help manage an organization. Many industries and businesses of different sizes use it because it is versatile and cost-effective. The path traversal vulnerability could allow attackers to remotely execute arbitrary commands on vulnerable servers.

Submitted by Gregory Rigby on

"Phishing Attack Exploits Google, WhatsApp to Steal Data"

"Phishing Attack Exploits Google, WhatsApp to Steal Data"

Researchers at Menlo Security found a sophisticated phishing campaign that exploits users' trust in Google Drawings and WhatsApp. Menlo Security calls this attack a "Living Off Trusted Sites" (LOTS) threat because it manipulates legitimate platforms to trick victims into giving up their personal and financial information. This article continues to discuss findings regarding the novel phishing campaign that leverages Google Drawings and shortened links generated via WhatsApp to avoid detection and trick users.

Submitted by Gregory Rigby on

"Warnings Issued Over Cisco Device Hacking, Unpatched Vulnerabilities"

"Warnings Issued Over Cisco Device Hacking, Unpatched Vulnerabilities"

The US Cybersecurity and Infrastructure Security Agency (CISA) is warning organizations about threat actors targeting improperly configured Cisco devices. Malicious hackers have been observed acquiring system configuration files through the abuse of protocols or software such as the Cisco Smart Install (SMI) feature. This feature has been exploited to take control of Cisco switches. This article continues to discuss CISA's warning about the abuse of improperly configured Cisco devices.

Submitted by Gregory Rigby on

"Cost of a Data Breach: The Healthcare Industry"

"Cost of a Data Breach: The Healthcare Industry"

The "2024 Cost of Data Breach Study" by IBM and the Ponemon Institute details the financial costs of cyberattacks across different industries. In 2023, the global average cost of a data breach reached $4.45 million, up 15 percent over the previous three years. The report attributed this increase to the rising expenses of lost business and post-breach response actions. The US averaged $9.48 million per breach, the highest of any nation. As in previous years, healthcare had the highest average breach costs at $10.93 million.

Submitted by Gregory Rigby on
Subscribe to