"US, Indonesia Hold Port-Focused Cybersecurity Exercise"

"US, Indonesia Hold Port-Focused Cybersecurity Exercise"

The US and Indonesia recently conducted their first port-focused cybersecurity tabletop exercise to improve responses to cyberattacks on critical maritime infrastructure. According to the US Department of Homeland Security (DHS), the exercise simulated major cyber incidents and ransomware attacks on port operations, ship-to-shore cranes, and other aspects of maritime activity. This article continues to discuss the port-focused cybersecurity tabletop exercise and the importance of combating cyber threats in the maritime environment.

Submitted by Gregory Rigby on

"G7 to Develop Cybersecurity Framework for Energy Sector"

"G7 to Develop Cybersecurity Framework for Energy Sector"

G7 nations will develop a cybersecurity framework for operational technologies in energy systems, with the intended users being manufacturers and operators. The agreement was announced by US National Security Advisor Jake Sullivan at the G7 Leaders' Summit on June 18. The framework seeks to improve the cybersecurity of the global supply chain for critical technologies used to manage and operate electricity, oil, and natural gas systems. This article continues to discuss the cybersecurity framework that will be developed by the G7 nations. 

Submitted by Gregory Rigby on

"US, Allies Publish Guidance on Securing Network Access"

"US, Allies Publish Guidance on Securing Network Access"

Government agencies in the US, New Zealand, and Canada have released new guidance, titled "Modern Approaches to Network Access Security," for organizations to use stronger security solutions and improve network activity visibility. The document delves into modern security solutions that organizations can use beyond Virtual Private Networks (VPNs) to ensure secure access to hybrid environments.

Submitted by Gregory Rigby on

"Quishing Campaign Targets Chinese Citizens via Fake Official Documents"

"Quishing Campaign Targets Chinese Citizens via Fake Official Documents"

According to new research by Cyble Research and Intelligence Labs (CRIL), a QR code-based phishing campaign has targeted individuals in China, tricking victims by using QR codes in fake official documents. As part of the campaign, Microsoft Word files are disguised as official documents from the Chinese Ministry of Human Resources and Social Security. CRIL security researchers believe the files were distributed via spam email attachments. This article continues to discuss the QR code-based phishing campaign targeting individuals in China.

Submitted by Gregory Rigby on

"CISA Warns of PoC Exploit for Vulnerability in RAD SecFlow-2 Industrial Switch"

"CISA Warns of PoC Exploit for Vulnerability in RAD SecFlow-2 Industrial Switch"

The US Cybersecurity and Infrastructure Security Agency (CISA) has released an Industrial Control System (ICS) advisory informing organizations of a high-severity vulnerability discovered in an outdated industrial switch made by the Israel-based networking equipment manufacturer RAD Data Communications. The agency recently found a publicly available Proof-of-Concept (PoC) exploit aimed at a path traversal vulnerability in RAD's SecFlow-2 ruggedized switch/router, which is intended for harsh industrial environments.

Submitted by Gregory Rigby on

"Massachusetts 911 Outage Caused by Errant Firewall"

"Massachusetts 911 Outage Caused by Errant Firewall"

It has recently been announced that a statewide outage of the 911 emergency response system in Massachusetts this week was caused by an errant firewall that prevented calls from getting to the 911 dispatch centers.  The Massachusetts  Executive Office of Public Safety and Security described the two-hour outage on Tuesday as a “technical issue” with its 911 vendor Comtech that was the result of a firewall installed to provide protection against cyberattacks and hacking.

Submitted by Adam Ekwall on

"Chrome 126 Update Patches Vulnerability Exploited at Hacking Competition"

"Chrome 126 Update Patches Vulnerability Exploited at Hacking Competition"

Google recently announced a Chrome 126 update that contains six security fixes, four of which address high-severity vulnerabilities reported by external researchers.  The first externally reported bug addressed with this update, CVE-2024-6100, is a high-severity type confusion issue in the V8 JavaScript engine.  The second issue addressed is CVE-2024-6101, which was described as an inappropriate implementation in WebAssembly.

Submitted by Adam Ekwall on

"Amtrak Says Guest Rewards Accounts Hacked in Credential Stuffing Attacks"

"Amtrak Says Guest Rewards Accounts Hacked in Credential Stuffing Attacks"

Amtrak is starting to notify some customers that their Guest Rewards Accounts have been hacked.  According to Amtrak, no Amtrak systems were compromised in the attacks, as credential stuffing was employed.  During credential stuffing attacks, threat actors leverage username and password combinations obtained from other data breaches, malware infections, or phishing, in an attempt to gain access to accounts that use the same login credentials.  Amtrak noted that they believe the unauthorized party may have obtained login credentials from third-party sources.

Submitted by Adam Ekwall on

"Cybersecurity Burnout Costing Firms $700m+ Annually"

"Cybersecurity Burnout Costing Firms $700m+ Annually"

According to security researchers at Hack The Box, British and US enterprises may be throwing away as much as $756m each year through lost productivity due to burned-out cybersecurity staff.  The researchers claimed UK employers may be losing a combined $130m annually, while their US counterparts could be down by as much as $626m due to lost productivity.  The research pointed the blame squarely at employee burnout.

Submitted by Adam Ekwall on

"Protecting Software Secrets in Medical Systems"

"Protecting Software Secrets in Medical Systems"

A team of researchers investigated 36 digital square global goods, including open source apps, software development kits, desktop apps, and web apps used in the health sector. Eighty-three percent of them were found to contain passwords, private keys, authentication tokens, and other secrets that could be exposed. The research group, including Upanzi Network researchers Theoneste Byagutangaza and Junias Bonou and Carnegie Mellon University (CMU)-Africa student Emmanuel Hirwa, wants software developers to design products with cybersecurity in mind.

Submitted by Gregory Rigby on
Subscribe to