"Ohio City Hit by Cyber Incident: What We Know"

"Ohio City Hit by Cyber Incident: What We Know"

Cleveland City Hall recently announced a temporary closure after a significant "cyber incident" that impacted the city's systems.  The city has been forced to shut down most internal systems to prevent further damage and investigate a significant cybersecurity breach.  The extent of the damage is not yet known.  City staff were told on Sunday night that they could not access most internal systems in the morning, with only essential and emergency services being maintained.

Submitted by Adam Ekwall on

"EmailGPT Exposed to Prompt Injection Attacks"

"EmailGPT Exposed to Prompt Injection Attacks"

A new vulnerability has been discovered in EmailGPT, a Google Chrome extension and Application Programming Interface (API) service that uses OpenAI's GPT models to help Gmail users write emails. According to the Synopsys Cybersecurity Research Center (CyRC), the flaw allows attackers to control the Artificial Intelligence (AI) service by entering harmful prompts. The system may reveal sensitive information or execute unauthorized commands due to these malicious prompts. The issue can be exploited by anyone with EmailGPT access, raising concerns about widespread abuse.

Submitted by Gregory Rigby on

NSA and Universities Partnering to Advance Cybersecurity Research

NSA and Universities Partnering to Advance Cybersecurity Research

NSA Research invited leading university research institutions across the country to the National Cryptologic Museum for a day-long event to tackle the ongoing challenge of securing critical cyber systems.
Submitted by Amy Karns on

"Tech Cybersecurity Duo Recognized for Data Research"

"Tech Cybersecurity Duo Recognized for Data Research"

Bo Chen and Niusen Chen won Michigan Technological University's 2024 Bhakta Rath Research Award for their work to ensure information on today's mobile devices can be stored securely and deleted permanently. They were the first to develop the capability for Plausibly Deniable Encryption (PDE) for computing devices. They also addressed sensitive data remnants in flash storage that can resist normal secure deletion techniques. This article continues to discuss the duo's cybersecurity work that won Michigan Technological University's 2024 Bhakta Rath Research Award.

Submitted by Gregory Rigby on

"New Gitloker Attacks Wipe GitHub Repos in Extortion Scheme"

"New Gitloker Attacks Wipe GitHub Repos in Extortion Scheme"

Attackers are wiping GitHub repositories' contents and asking victims to contact them on Telegram. CronUp security researcher German Fernandez discovered the malicious campaign. The threat actor behind it, with the Gitloker handle on Telegram, poses as a cyber incident analyst. They are likely using stolen credentials to compromise targets' GitHub accounts. This article continues to discuss the new Gitloker attacks wiping GitHub repositories in an extortion scheme. 

Submitted by Gregory Rigby on

"'Commando Cat' Digs Its Claws Into Exposed Docker Containers"

"'Commando Cat' Digs Its Claws Into Exposed Docker Containers"

In a campaign called "Commando Cat," cybercriminals use misconfigured Docker containers to conduct cryptojacking. The campaign emerged earlier this year. Trend Micro's latest update regarding the campaign shows that unknown attackers are still using Docker misconfigurations to gain unauthorized access to containerized environments. They use Docker images to launch cryptocurrency miners. This article continues to discuss findings regarding the Commando Cat campaign.

Submitted by Gregory Rigby on

"Ransomware Report Finds 43% of Data Unrecoverable After Attack"

"Ransomware Report Finds 43% of Data Unrecoverable After Attack"

Veeam found that ransomware victims permanently lose an average of 43 percent of the data impacted by an attack. The "Veeam Ransomware Trends Report 2024," based on a survey of 1,200 CISOs, security professionals, and backup administrators who experienced a ransomware attack in 2023, discovered that many organizations are unprepared to recover despite most having incident response plans and policies. This article continues to discuss key findings from Veeam regarding ransomware trends.

Submitted by Gregory Rigby on

"26% of Organizations Lack Any Form of IT Security Training"

"26% of Organizations Lack Any Form of IT Security Training"

Hornetsecurity reports that 26 percent of organizations do not train end users on Information Technology (IT) security. The Hornetsecurity survey of industry professionals worldwide found that 8 percent of organizations offer adaptive training based on security tests. Every company's cybersecurity strategy relies on people. Phishing, which exploits trust, is the most common cyberattack. Employees must have the skills, knowledge, and confidence to spot malicious behavior. However, Hornetsecurity's survey found a training gap and ineffective training initiatives.

Submitted by Gregory Rigby on

"Why Hackers Love Logs"

"Why Hackers Love Logs"

Computer log tampering is almost always part of a system compromise. Computer log files record application actions. They help identify system issues like design malfunctions and malicious activity. However, their value is often overlooked. They are usually read/write text files with little security and are not considered the company's "crown jewels" to protect. This is a mistake because the logs contain a record of the Information Technology (IT) infrastructure and its use.

Submitted by Gregory Rigby on

CMMC Ecosystem Summit

"That’s why we created the CEIC conference.  We have carefully designed CEIC so it has something for everyone in the broader CMMC ecosystem!  Whether you are a CMMC novice looking for help getting started, a seasoned pro looking for advanced training, or a service provider who wants a sneak peek into next-generation solutions to help you more efficiently maintain CMMC-compliant environments at scale, CEIC East has something for everyone.  Join us November 21-22 to learn the latest updates on the CMMC program and much more!"

 

 

Subscribe to