"Passwords Under Seven Characters Can Be Easily Cracked"

"Passwords Under Seven Characters Can Be Easily Cracked"

According to Hive Systems, passwords with less than seven characters can be cracked in just hours. The increased use of stronger password hashing algorithms to protect data has lengthened the time it takes hackers to crack passwords. The increased time it takes hackers to crack passwords suggests that the cybersecurity industry has made significant improvements in protecting data. However, hackers continue to find new ways around even the most robust protections.

Submitted by grigby1 CPVI on

"NSA Advisory Sheds Light on Securely Deploying AI Systems"

"NSA Advisory Sheds Light on Securely Deploying AI Systems"

The National Security Agency (NSA) recently released guidance on how operators of National Security Systems (NSS) and Defense Industrial Base (DIB) companies can securely deploy third-party-designed Artificial Intelligence (AI) systems. As companies weigh potential security risks in AI systems or in how they are deployed, the guidance focuses on securely operating AI in the environment and continuously protecting AI systems from vulnerabilities.

Submitted by grigby1 CPVI on

"Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms"

"Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms"

Finnish court recently sentenced a 26-year-old man to six years and three months in prison for hacking thousands of patient records at a private psychotherapy center and seeking ransom from some patients over the sensitive data. In February 2023, French police arrested well-known Finnish hacker Aleksanteri Kivimäki, living under a false identity near Paris.

Submitted by Adam Ekwall on

"Cybersecurity Activity Book Aims to Teach Children About Online Safety"

"Cybersecurity Activity Book Aims to Teach Children About Online Safety"

Virginia Tech National Security Institute faculty created "Cyber Snackz Adventures in Cybersecurity," an activity book that teaches elementary school students about Internet safety through engaging educational activities and coloring pages. According to Stephanie Travis, director of the Senior Military College Cyber Institute at the Virginia Tech National Security Institute, the book delves into protecting personal information online and not clicking on sketchy links in a way young children can understand.

Submitted by grigby1 CPVI on

"Ransomware Rising Despite Takedowns, Says Corvus Report"

"Ransomware Rising Despite Takedowns, Says Corvus Report"

According to Corvus Insurance, new ransomware gangs filled the void left by LockBit and ALPHV/BlackCat in the first quarter of 2024. The cyber insurance firm has published "Ransomware Groups Don't Die, They Multiply," which reveals that ransomware activity increased by 21 percent in the first quarter of 2024 compared to the same time in 2023. At 1,075, the number of recorded victims in the first quarter of 2024 is significantly higher than in the same period in 2023, at 699.

Submitted by grigby1 CPVI on

"Millions of Malicious 'Imageless' Containers Planted on Docker Hub Over 5 Years"

"Millions of Malicious 'Imageless' Containers Planted on Docker Hub Over 5 Years"

JFrog researchers found multiple campaigns planting millions of malicious "imageless" containers on Docker Hub over the past five years, highlighting how open source registries can enable supply chain attacks. More than four million Docker Hub repositories are imageless and contain only the repository documentation, according to JFrog security researcher Andrey Polkovnichenko. The documentation is unrelated to the container. Instead, it is a page that directs users to phishing or malware sites.

Submitted by grigby1 CPVI on

"Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover"

"Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover"

Tanto Security warns that three critical-severity vulnerabilities in the Judge0 open source service enable attackers to conduct sandbox escapes and take over the host machine. Judge0 is an online service for executing arbitrary code in a secure sandbox. This service facilitates the development of applications that require online code execution, such as programming, e-commerce, recruitment platforms, online code editors, and more.

Submitted by grigby1 CPVI on

"FCC Fines Carriers $200m For Selling User Location Data"

"FCC Fines Carriers $200m For Selling User Location Data"

According to the FCC, four of America’s largest mobile operators sold access to customer location data to third parties without gaining customer consent or putting adequate safeguards in place. The FCC is fining Sprint ($12m), T-Mobile ($80m), AT&T ($57m), and Verizon ($47m) close to $200m in total for breaking the law.

Submitted by Adam Ekwall on

"Ransom Payments Surge by 500% to an Average of $2m"

"Ransom Payments Surge by 500% to an Average of $2m"

According to security researchers at Sophos, average ransom payments surged by 500% in the past year to reach $2m per payment. This compares to an average payment of $400,000 calculated by Sophos in its 2023 study, demonstrating that ransomware operators are seeking increasingly large payoffs from victims. The researchers noted that nearly two-thirds (63%) of ransom demands made in the past year were $1m or more, with 30% of demands demanding over $5m. This is despite a reduction in the rate of organizations being hit by ransomware in the past year, at 59%.

Submitted by Adam Ekwall on

"Muddling Meerkat Hackers Manipulate DNS Using China's Great Firewall"

"Muddling Meerkat Hackers Manipulate DNS Using China's Great Firewall"

"Muddling Meerkat," a new cluster of activity, has been suspected of being linked to a Chinese state-sponsored threat actor's manipulation of the Domain Name System (DNS) to probe networks since October 2019, with a surge in activity observed in September 2023. The hackers behind this activity manipulate Mail Exchange (MX) records by injecting fake responses through China's Great Firewall (GFW).

Submitted by grigby1 CPVI on
Subscribe to