"The IC Is Reigning-in Trojan AI Intruders"

"The IC Is Reigning-in Trojan AI Intruders"

The Intelligence Advanced Research Projects Activity (IARPA) launched the Trojans in Artificial Intelligence (TrojAI) program, which aims to defend AI systems by researching and developing technology capable of detecting and mitigating Trojan attacks. Although AI improves the Intelligence Community's (IC) capabilities, it also raises serious security concerns. The IC faces the challenge of protecting AI systems from malicious Trojan attacks, also known as backdoor or data poisoning attacks. These attacks rely on training AI to react to a certain trigger in its inputs.

Submitted by grigby1 CPVI on

"CISA: Roundcube Email Server Bug Now Exploited in Attacks"

"CISA: Roundcube Email Server Bug Now Exploited in Attacks"

According to the Cybersecurity and Infrastructure Security Agency (CISA), a Roundcube email server vulnerability patched in September 2023 is being actively exploited in Cross-Site Scripting (XSS) attacks. The security vulnerability, tracked CVE-2023-43770, is a persistent XSS flaw that enables attackers to gain access to restricted information. CISA has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, warning that these security flaws pose significant risks to the federal enterprise.

Submitted by grigby1 CPVI on

"US DOJ Dismantles Warzone RAT Infrastructure, Arrests Key Operators"

"US DOJ Dismantles Warzone RAT Infrastructure, Arrests Key Operators"

The US Department of Justice (DOJ) has announced the seizure of online infrastructure used to sell a Remote Access Trojan (RAT) called Warzone RAT. According to the DOJ, the domains were used to sell the computer malware capable of accessing and stealing data from victims' computers. The international law enforcement effort has also arrested and indicted two people in Malta and Nigeria for their roles in selling and supporting the malware, as well as helping other cybercriminals use the RAT. They have been charged with unauthorized damage to protected computers.

Submitted by grigby1 CPVI on

"Critical Fortinet FortiOS Flaw Exploited in The Wild (CVE-2024-21762)"

"Critical Fortinet FortiOS Flaw Exploited in The Wild (CVE-2024-21762)"

Fortinet has recently patched critical remote code execution vulnerabilities in FortiOS (CVE-2024-21762 and CVE-2024-23313), one of which is “potentially” being exploited in the wild.  CISA noted that CVE-2024-21762 is an out-of-bounds write vulnerability in FortiOS, which may allow a remote unauthenticated attacker to execute arbitrary code or command via specially crafted HTTP requests.

Submitted by Adam Ekwall on

"Ongoing Azure Compromises Target Senior Execs, Microsoft 365 Apps"

"Ongoing Azure Compromises Target Senior Execs, Microsoft 365 Apps"

Many environments and individual user accounts have been compromised as part of an ongoing campaign that targets Microsoft Azure corporate clouds. The activity includes data exfiltration, financial fraud, impersonation, and more against organizations in different geographic regions and industry verticals. Researchers have found that the activity is refined, with tailor-made phishing aimed at the highest-profile, highest-value individuals.

Submitted by grigby1 CPVI on

"Decryptor for Rhysida Ransomware Is Available!"

"Decryptor for Rhysida Ransomware Is Available!"

Rhysida ransomware victims can successfully decrypt files encrypted by the ransomware because of an implementation vulnerability discovered by researchers and used to create a decryptor. Rhysida is a Ransomware-as-a-Service (RaaS) gang that carries out double extortion tactics. It was first observed in May 2023, gaining notoriety for targeting the British Library, the Chilean Army, healthcare delivery organizations, and Holding Slovenske Elektrarne (HSE).

Submitted by grigby1 CPVI on

25th International Symposium on Quality Electronic Design (ISQED)

"The 25th International Symposium on Quality Electronic Design (ISQED'24) is the premier interdisciplinary and multidisciplinary Electronic Design conference—bridges the gap among Electronic/Semiconductor ecosystem members providing electronic design tools, integrated circuit technologies, semiconductor technology, packaging, assembly & test to achieve total design quality."

Topics of interest include, but are not limited to security, privacy, trust protocols, and trusted information flow.

2024 IEEE Power and Energy Conference at Illinois (PECI)

"The conference scope of topics includes, but is not limited to, all aspects of novel research in the Power & Energy Area. Key topics are Power Systems, Microgrids, Energy Resource Planning, Security and Operations, Transportation Electrification, Design of Electric Machinery and their operation, Power Electronics Systems and Circuits, and Energy Storage Systems from Renewable Sources."

2024 Wireless Telecommunications Symposium (WTS)

"Exchange information on advances in mobile communications and wireless networking technology, management, policy, applications, and security in the San Francisco Bay Area (Oakland), California, USA with leaders and experts from industry, governmental agencies, and universities around the world at the 23rd annual Wireless Telecommunications Symposium."

16th Annual IEEE Green Technologies (GreenTech) Conference

"The conference offers an excellent opportunity for presenting technical papers to a gathering of international experts in green technologies promoting secure and sustainable energy systems. The conference serves as a forum for engineers, researchers, and specialists from academia, research centers, and industry worldwide to discuss and present the latest developments and applications related to the challenges of transitioning to sustainable economic practices."

Topics of interest include, but are not limited to cybersecurity.

Subscribe to