"RedLine Malware Top Credential Stealer of Last 6 Months"

"RedLine Malware Top Credential Stealer of Last 6 Months"

According to new research published by Specops, RedLine malware was used to steal over 170 million passwords in the last six months, making it the most notorious credential stealer during that period. The malware was used in half of all cyber incidents involving stolen passwords, significantly surpassing the next closest stealer, Vidar. Vidar was used to steal over 65 million passwords. Raccoon Stealer, the malware responsible for the theft of over 42 million passwords, ranks third, making up 11.7 percent.

Submitted by grigby1 CPVI on

"Boat Dealer MarineMax Hit by Cyberattack"

"Boat Dealer MarineMax Hit by Cyberattack"

MarineMax, one of the world’s largest retailers of recreational boats and yachts, recently disclosed a cyberattack that has caused some disruption.  The Florida-based company revealed in a regulatory filing that it detected a cybersecurity incident on March 10.  The company noted that hackers gained access to its systems, which prompted them to initiate incident response and business continuity protocols.  The incident is still being investigated, but at the time of the regulatory filing, it did not have a material impact on operations.

Submitted by Adam Ekwall on

"Hackers Hiding Keylogger, RAT Malware in SVG Image Files"

"Hackers Hiding Keylogger, RAT Malware in SVG Image Files"

Threat actors are using Scalable Vector Graphic (SVG) image files to hide malware and avoid detection. In January, researchers at Cofense Intelligence discovered a two-month campaign involving the use of SVG files to distribute Agent Tesla Keylogger and XWorm RAT malware. The SVG file format uses mathematical equations to describe images, allowing them to be scaled without losing image quality and making them suitable for various design applications.

Submitted by grigby1 CPVI on

"BlackBerry: Global Financial Sector Faces 'Death by a Million Cuts' Through Malware Attacks"

"BlackBerry: Global Financial Sector Faces 'Death by a Million Cuts' Through Malware Attacks"

A new BlackBerry report reveals a significant increase in attacks on the global financial sector, with 1 million attacks recorded in just 120 days. According to BlackBerry's current Global Threat Intelligence Report, attacks on the global financial sector were primarily launched using commodity malware. The use of such malware suggests that many independent threat actors are targeting the industry for financial gain.

Submitted by grigby1 CPVI on

"SAFECOM and NCSWIC Develop 911 Cybersecurity Resource Hub"

"SAFECOM and NCSWIC Develop 911 Cybersecurity Resource Hub"

SAFECOM and the National Council of Statewide Interoperability Coordinators (NCSWIC) have announced the launch of the 911 Cybersecurity Resource Hub where Emergency Communications Centers (ECCs) can report cyber incidents, find real-world case studies, access cybersecurity education and training opportunities, and learn best practices regarding identifying and protecting networks from cyberattacks.

Submitted by grigby1 CPVI on

Open Source Summit

"Open Source Summit is the premier event for open source developers, technologists, and community leaders to collaborate, share information, solve problems, and gain knowledge, furthering open source innovation and ensuring a sustainable open source ecosystem. It is the gathering place for open-source code and community contributors. Open Source Summit is a conference umbrella, composed of a collection of events covering the most important technologies, topics, and issues affecting open source today."

Southeast Cybersecurity Summit

"The purpose of the Summit is to strengthen and promote the internet security profession in the southeastern United States region. That goal is achieved through event activities which result in relationship building, information sharing, and ongoing education and training focused on current technology challenges and solutions."



 

#CS4CA: Cyber Security Summit USA

"As critical infrastructure continues its transition from analog to digital, the surface for cyber attacks has expanded and the resulting risks to an organization’s physical assets, people, financial liability, and reputation are increasing in frequency and potency.  With this in mind, the Cyber Security for Critical Assets Summit brings together senior cybersecurity leaders from across US critical infrastructure, for 2-days of in-depth knowledge exchange, strategy planning and insight building on March 26-27th 2024.

"SIM Swappers Hijacking Phone Numbers in eSIM Attacks"

"SIM Swappers Hijacking Phone Numbers in eSIM Attacks"

Subscriber Identity Module (SIM) swappers have changed their attacks to steal a target's phone number by porting it to a new Embedded SIM (eSIM) card, which is a digital SIM in a rewritable chip found in many modern smartphones. An eSIM is a digital card stored on the chip of a mobile device that performs the same functions as physical SIM cards but can be remotely reprogrammed and provisioned, as well as deactivated, swapped, and deleted.

Submitted by grigby1 CPVI on

"ChatGPT Spills Secrets in Novel PoC Attack"

"ChatGPT Spills Secrets in Novel PoC Attack"

Researchers from Google DeepMind, Open AI, ETH Zurich, McGill University, and the University of Washington have developed a new attack that extracts key architectural information from proprietary Large Language Models (LLMs) such as ChatGPT and Google PaLM-2. The study shows how adversaries can extract supposedly hidden data from an LLM-enabled chatbot, allowing them to duplicate or steal its functionality. The attack is one of several highlighted in the past year that have delved into the security flaws of Artificial Intelligence (AI) technologies.

Submitted by grigby1 CPVI on
Subscribe to