"TfL Claims Cyber-Incident is Not Impacting Services"

"TfL Claims Cyber-Incident is Not Impacting Services"

Transport for London (TfL) recently announced that it is dealing with an "ongoing cybersecurity incident." TfL is responsible for the extensive London Underground network, Docklands Light Railway, buses, taxis, river services, major road and cycle routes, and selected train services, including London Overground and the Elizabeth Line.  TfL noted that currently, there is no evidence that any customer data has been compromised and that there has been no impact on TfL services.

Submitted by Adam Ekwall on

"Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms"

"Researchers Identify Over 20 Supply Chain Vulnerabilities in MLOps Platforms"

JFrog researchers have brought further attention to security risks in the Machine Learning (ML) software supply chain after discovering over 20 vulnerabilities that attackers could exploit to target ML Operations (MLOps) platforms. The discovered flaws, which are said to be inherent and implementation-based, could result in arbitrary code execution, the loading of malicious datasets, and more. This article continues to discuss the discovery of supply chain vulnerabilities in MLOps platforms.

Submitted by grigby1 CPVI on

"MC2 Researchers Present Eight Papers at USENIX/SOUPS"

"MC2 Researchers Present Eight Papers at USENIX/SOUPS"

Researchers with the Maryland Cybersecurity Center (MC2) recently presented eight papers at symposiums focusing on privacy and online security. Three papers were presented at the 33rd USENIX Security Symposium, and five were presented at the Symposium on Usable Privacy and Security (SOUPS). The MC2 papers discussed privacy-related app reviews, user reactions to data access laws, password management for shared accounts, and diversity and safety in the cybersecurity community.

Submitted by grigby1 CPVI on

"US AI Safety Institute Signs Agreements Regarding AI Safety Research, Testing and Evaluation With Anthropic and OpenAI"

"US AI Safety Institute Signs Agreements Regarding AI Safety Research, Testing and Evaluation With Anthropic and OpenAI"

The US Artificial Intelligence (AI) Safety Institute at the Department of Commerce's National Institute of Standards and Technology (NIST)  announced agreements enabling formal collaboration on AI safety research, testing, and evaluation with Anthropic and OpenAI. The agreements support collaborative research on evaluating capabilities, risks, and methods to mitigate those risks.

Submitted by grigby1 CPVI on

"How Smart Toys Spy on Kids: What Parents Need to Know"

"How Smart Toys Spy on Kids: What Parents Need to Know"

Researchers led by Professor Isabel Wagner of the Department of Mathematics and Computer Science at the University of Basel studied the security and privacy of smart toys. The researchers investigated whether data traffic was encrypted and how well. They also looked into data protection, how easy it is for users to see what data is collected, and compliance with the EU General Data Protection Regulation (GDPR). This article continues to discuss key findings from the study "No Transparency for Smart Toys."

Submitted by grigby1 CPVI on

"Innovative Approach to Cryptography Makes Privacy More Personal"

"Innovative Approach to Cryptography Makes Privacy More Personal"

Gabriel Kaptchuk, a security and privacy expert and assistant professor of computer science at the University of Maryland, is at the forefront of human-centered cryptography research. Kaptchuk is developing privacy systems, focusing on a human-centered approach that takes into account how people interact with technology. According to Kaptchuk, cryptography and security are fundamentally social sciences masquerading as mathematics. This article continues to discuss Kaptchuk's research efforts in the realm of human-centered cryptography.

Submitted by grigby1 CPVI on

"Researchers Find SQL Injection to Bypass Airport TSA Security Checks"

"Researchers Find SQL Injection to Bypass Airport TSA Security Checks"

Security researchers Ian Carroll and Sam Curry discovered a vulnerability in a key air transport security system that enables unauthorized individuals to bypass airport security screenings and access aircraft cockpits. They found the vulnerability in FlyCASS, a third-party web-based service used by some airlines to manage the Known Crewmember (KCM) program and Cockpit Access Security System (CASS). The researchers found that the FlyCASS login system was vulnerable to SQL injection, which allows attackers insert SQL statements for malicious database queries.

Submitted by grigby1 CPVI on

"Iran's 'Fox Kitten' Group Aids Ransomware Attacks on US Targets"

"Iran's 'Fox Kitten' Group Aids Ransomware Attacks on US Targets"

The US Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have issued a warning regarding Iran's state-sponsored threat group "Fox Kitten" actively helping ransomware actors in attacks against organizations. The activity suggests that the threat actor is trying to monetize its access to victim networks in finance, defense, healthcare, and other industries. This article continues to discuss findings regarding the Fox Kitten group.

Submitted by grigby1 CPVI on

"Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign"

"Cyberattackers Exploit Google Sheets for Malware Control in Likely Espionage Campaign"

According to Proofpoint researchers, the Command-and-Control (C2) mechanism of a new malware campaign uses Google Sheets. The activity, detected by Proofpoint on August 5, 2024, impersonates tax authorities from Europe, Asia, and the US to target over 70 organizations worldwide through "Voldemort." This custom tool gathers information and delivers payloads. Insurance, aerospace, transportation, academia, finance, technology, and other sectors have been targeted. This article continues to discuss the new malware campaign involving the use of Google Sheets.

Submitted by grigby1 CPVI on

"Threat Actor Lures Victims to Malware-Laden VPN Page via Call, Text"

"Threat Actor Lures Victims to Malware-Laden VPN Page via Call, Text"

A social engineering campaign targeting over 130 US companies sends employees to a fake malware-laden Virtual Private Network (VPN) page, exploiting concerns about a VPN issue. According to GuidePoint Research and Intelligence Team (GRIT) researchers, the threat actor calls a user on their cell phone and poses as a help desk representative trying to fix a VPN log-in issue. If the threat actor tricks the user, they send an SMS link to a malicious VPN site that masquerades as a legitimate vendor. This article continues to discuss findings regarding the new social engineering campaign.

Submitted by grigby1 CPVI on
Subscribe to