"AI Models in Cybersecurity: From Misuse to Abuse"

"AI Models in Cybersecurity: From Misuse to Abuse"

Etay Maor, Chief Security Strategist and founding member of the Cyber Threats Research Lab (CTRL) at Cato Networks, has highlighted how both defenders and attackers could use Artificial Intelligence (AI) in their operations. For example, Maor points out that AI models can be applied to augment human researchers and security products by generating a human-readable report of all security events and alerts with one button. Cybercriminals can conduct prompt injection attacks against AI models used in the analysis of malware code.

Submitted by Gregory Rigby on

"Google Pays Out $36,000 for Severe Chrome Vulnerability"

"Google Pays Out $36,000 for Severe Chrome Vulnerability"

Google recently announced a fresh Chrome browser update that addresses 17 vulnerabilities, including 13 security defects reported by external researchers.  Google noted that the most severe of the externally reported bugs is CVE-2024-9954, a high-risk use-after-free defect in AI, for which it handed out a $36,000 bug bounty reward.  The browser update resolves five medium-severity use-after-free issues as well, impacting Web Authentication, UI, DevTools, Dawn, and Parcel Tracking.

Submitted by Adam Ekwall on

"Varsity Brands Data Breach Impacts 65,000 People"

"Varsity Brands Data Breach Impacts 65,000 People"

Apparel giant Varsity Brands recently disclosed a data breach impacting a significant number of individuals. Varsity provides uniforms, apparel, and services for sports teams, schools, and student-athletes.  The company said it detected "unusual activity" on its systems in May 2024 and, upon detection, took certain systems offline and launched an investigation with the assistance of external cybersecurity experts.  The company noted that it also notified law enforcement.

Submitted by Adam Ekwall on

"Chinese Researchers Break RSA Encryption With a Quantum Computer"

"Chinese Researchers Break RSA Encryption With a Quantum Computer"

A research team led by Wang Chao from Shanghai University has presented a method involving the use of D-Wave's quantum annealing systems to crack classic encryption. The study titled "Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage" describes how D-Wave's machines were used to break RSA encryption and attack symmetric encryption systems. Their method raises significant concerns about the future of cybersecurity.

Submitted by Gregory Rigby on

"Attackers Deploying Red Teaming Tool for EDR Evasion"

"Attackers Deploying Red Teaming Tool for EDR Evasion"

Researchers at Trend Micro have discovered that threat actors are using the open source "EDRSilencer" tool to evade Endpoint Detection and Response (EDR) systems. According to the researchers, the software designed for red teaming is being used to "silence" EDR solutions. It involves using the Windows Filtering Platform (WFP), which enables the creation of custom rules for monitoring, blocking, and modifying network traffic. This article continues to discuss the use of the EDRSilencer tool by threat actors.

Submitted by Gregory Rigby on

"Most Organizations Unprepared for Post-Quantum Threat"

"Most Organizations Unprepared for Post-Quantum Threat"

The Entrust Cybersecurity Institute found that many organizations have not begun post-quantum threat preparations despite the National Institute of Standards and Technology's (NIST) recent publication of post-quantum standards. NIST published its first three finalized post-quantum encryption standards in August, providing usage and implementation guidelines for organizations transitioning to quantum cryptography.

Submitted by Gregory Rigby on

"Election Day is Close, the Threat of Cyber Disruption is Real"

"Election Day is Close, the Threat of Cyber Disruption is Real"

According to Fortinet's recent threat report, cybercriminals, hacktivists, and nation-state actors have threatened to disrupt or take advantage of the US election. The report discusses the threat landscape and adversarial activity that could impact this year's election. Fortinet recognizes that the usual threats come from financially motivated criminals, partisan hacktivists, and politically motivated elite nation-state actors. This article continues to discuss the cyber threats to November's Election Day.

Submitted by Gregory Rigby on

"New ConfusedPilot Attack Targets AI Systems with Data Poisoning"

"New ConfusedPilot Attack Targets AI Systems with Data Poisoning"

Researchers from the University of Texas at Austin's SPARK Lab have identified "ConfusedPilot," a new cyberattack that targets Retrieval-Augmented Generation (RAG)-based Artificial Intelligence (AI) systems such as Microsoft 365 Copilot. Professor Mohit Tiwari, CEO of Symmetry Systems, led the team that discovered how attackers could manipulate AI-generated responses through the introduction of malicious content into documents referenced by the AI. This method could result in misinformation and flawed decision-making by organizations.

Submitted by Gregory Rigby on

"Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates"

"Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates"

A new malware campaign delivers "Hijack Loader" artifacts signed with legitimate code-signing certificates. Researchers at HarfangLab detected the activity, noting that the attack chains aim to deploy the "Lumma" infostealer. Hijack Loader was discovered in September 2023, with attack chains that trick users into downloading a booby-trapped binary as pirated software or movies.

Submitted by Gregory Rigby on

"New CounterSEVeillance and TDXDown Attacks Target AMD and Intel TEEs"

"New CounterSEVeillance and TDXDown Attacks Target AMD and Intel TEEs"

Intel and AMD have responded to security researchers' discoveries of new attack methods called "TDXDown" and "CounterSEVeillance" that target Trust Domain Extensions (TDX) and Secure Encrypted Virtualization (SEV) technology. The research focused on Intel and AMD Trusted Execution Environments (TEEs), which isolate the protected application or Virtual Machine (VM) from the operating system and other software on the same physical system in order to protect code and data.

Submitted by Gregory Rigby on
Subscribe to