Austin Cybersecurity Summit

"The Second Annual Austin Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception."

Digital Forensics For National Security

"DSI’s 5th Annual Digital Forensics for National Security Symposium will provide a forum for the DoD, federal government, intelligence agencies, industry, and academia to discuss how digital forensics tools and technologies are supporting their efforts to identify, detect, investigate, prevent, and bring justice to increasingly sophisticated criminal activities."

FinCrime & Cybersecurity Summit

"Transform Finance is bringing together the top thinkers in the Carolinas and surrounding areas to get a deep look into the latest trends, challenges and the technology emerging to help stay vigilant against bad actors. Come together in the second largest financial hub in the US as we come together and explore how to stay vigilant in 2024. With expert led panels, interactive workshops and many opportunities for networking the 2024 Charlotte event is the place to learn about the latest in fighting economic crime." 

2024 National Cyber Crime Conference

Over the past decade, the NCCC has become one of the premier training events for law enforcement investigators, prosecutors, and forensic examiners in the world. The 2024 National Cyber Crime Conference will be held from April 23 through April 25. The event will feature hundreds of sessions on diverse digital evidence and cybercrime topics delivered by the top experts in the field.

"TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks"

"TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks"

The threat actor known as "TA558" has been using steganography as an obfuscation method in the delivery of a variety of malware, including Agent Tesla, FormBook, Remcos RAT, LokiBot, GuLoader, Snake Keylogger, XWorm, and more. Positive Technologies reported that the group used steganography extensively, sending VBSs, PowerShell code, and RTF documents containing an embedded exploit, inside images and text files. The campaign has been dubbed "SteganoAmor" due to its use of steganography and choice of file names.

Submitted by grigby1 CPVI on

"PuTTY SSH Client Flaw Allows Recovery of Cryptographic Private Keys"

"PuTTY SSH Client Flaw Allows Recovery of Cryptographic Private Keys"

Fabian Baumer and Marcus Brinkmann from Ruhr University Bochum discovered a vulnerability in PuTTY 0.68 through 0.80 that enables attackers with access to 60 cryptographic signatures to recover the private key used to generate them. PuTTY is a popular open source terminal emulator, serial console, and network file transfer tool that supports SSH, Telnet, SCP, and SFTP. According to the researchers, the vulnerability stems from how PuTTY generates ECDSA nonces, which are temporary unique cryptographic numbers, for the NIST P-521 curve used for SSH authentication.

Submitted by grigby1 CPVI on

"Ransomware Group Starts Leaking Data Allegedly Stolen From Change Healthcare"

"Ransomware Group Starts Leaking Data Allegedly Stolen From Change Healthcare"

The "RansomHub" ransomware group is now publishing data allegedly stolen from the healthcare transaction processor Change Healthcare in February. The incident disrupted Change Healthcare's operations and caused healthcare system outages. It was launched by an affiliate of the Alphv/BlackCat Ransomware-as-a-Service (RaaS), known as "Notchy." In early March, BlackCat pulled an exit scam, and Notchy claimed they had not received their share of the $22 million ransom paid by Change Healthcare and were still in possession of 4TB of stolen company data.

Submitted by grigby1 CPVI on

"Report Suggests 93% of Breaches Lead to Downtime and Data Loss"

"Report Suggests 93% of Breaches Lead to Downtime and Data Loss"

According to security researchers at Pentera, a substantial 93% of enterprises admitting to a breach have suffered significant consequences, ranging from unplanned downtime to data exposure or financial loss.  During the research, the researchers found that enterprises are allocating an average of $164,400, nearly 13% of their total IT security budgets to pentesting programs.  These initiatives serve multiple purposes, including validating the efficacy of security controls, gauging potential attack impact, and prioritizing security investments.

Submitted by Adam Ekwall on

"LeakyCLI Flaw Exposes AWS and Google Cloud Credentials"

"LeakyCLI Flaw Exposes AWS and Google Cloud Credentials"

A new security flaw, dubbed "LeakyCLI" by the Orca Security team, impacts command-line tools used in cloud environments. The vulnerability exposes sensitive credentials in logs, posing a risk to organizations that use Amazon Web Services (AWS) and Google Cloud. The problem reflects a previously identified vulnerability in Azure Command-Line Interface (CLI), which Microsoft addressed in November 2023. Although Microsoft fixed it, AWS and Google Cloud CLIs are still vulnerable to the same flaw.

Submitted by grigby1 CPVI on

"Former Security Engineer Sentenced to Prison for Hacking Crypto Exchanges"

"Former Security Engineer Sentenced to Prison for Hacking Crypto Exchanges"

Recently, Shakeeb Ahmed, a former senior security engineer, was sentenced to three years in prison for hacking and defrauding two cryptocurrency exchanges.  Ahmed, 34, of New York, New York, was arrested in July 2023, one year after the attacks occurred.  He pleaded guilty in December.  According to the Department of Justice (DoJ), in early July 2022, Ahmed defrauded a decentralized cryptocurrency exchange of roughly $9 million.

Submitted by Adam Ekwall on
Subscribe to