"The State of the Metaverse"

"The State of the Metaverse"

The metaverse raises significant concerns, including those about cybersecurity. The metaverse is a three-dimensional (3D) virtual immersive environment in which users interact as avatars. According to the 2023 report "Exploring the Industrial Metaverse in Manufacturing" from Deloitte and the Manufacturing Leadership Council, 72 percent of manufacturers are most concerned about the cybersecurity risks associated with implementing metaverse-enabling technologies.

Submitted by grigby1 CPVI on

"Security Flaw in a Popular Smart Helmet Allowed Silent Location Tracking"

"Security Flaw in a Popular Smart Helmet Allowed Silent Location Tracking"

Livall, a smart ski and bike helmet maker, has fixed a security flaw that enabled easy real-time location tracking of a user wearing its helmets. The company makes Internet-connected helmets that allow groups of skiers or bike riders to communicate with one another via the helmet's built-in speaker and microphone, as well as share their real-time location in a friend group using Livall's smartphone apps.

Submitted by grigby1 CPVI on

"Known Ransomware Attacks Increased 68% Last Year"

"Known Ransomware Attacks Increased 68% Last Year"

According to Malwarebytes' recent State of Malware report, the rise of Ransomware-as-a-Service (RaaS) gangs such as LockBit and ALPHV was accompanied by a 68 percent increase in known ransomware attacks in 2023, reaching a new high. The total number of known cyberattacks was 4,475 in 2023. The US made up nearly half of the ransomware attacks. The UK was second with 7 percent of costly incidents, followed by Canada, Italy, and Germany with 4 percent each. According to the report, the LockBit gang demanded the highest ransom of the year, $80 million, following an attack on Royal Mail.

Submitted by grigby1 CPVI on

"New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack"

"New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack"

A new banking trojan called Coyote has targeted 61 banking institutions in Brazil. Researchers discovered that Coyote differs from other banking trojans of its kind because of its use of the open-source Squirrel framework for installing and updating Windows apps. Another differentiating factor is the shift from Delphi, which is popular among banking malware families targeting Latin America, to a relatively new multi-platform programming language called Nim. This article continues to discuss findings regarding the Coyote banking trojan.

Submitted by grigby1 CPVI on

"Quishing Attacks Surge and Bypass Email Security"

"Quishing Attacks Surge and Bypass Email Security"

According to researchers at Abnormal Security, email attacks involving QR codes, also known as quishing attacks, increased significantly in the fourth quarter of 2023. Quishing attacks can evade email security solutions or spam filters. Abnormal Security discovered that quishing attacks increased by a factor of 42. These attacks primarily targeted C-level executives. About 90 percent of detected quishing attacks aimed to steal login credentials. This article continues to discuss the rise in quishing attacks.

Submitted by grigby1 CPVI on

"Cybersecurity Teams Recognized as Key Enablers of Business Goals"

"Cybersecurity Teams Recognized as Key Enablers of Business Goals"

According to CybSafe, 97 percent of office employees in the UK and US trust that their cybersecurity team can prevent or mitigate the damage caused by cyberattacks. CybSafe examined attitudes toward cybersecurity teams within organizations and discovered that employees have high levels of trust and appreciation for such teams despite there being issues with communication and processes. Cybersecurity teams and professionals are increasingly regarded as a critical strategic function supporting individual and business success.

Submitted by grigby1 CPVI on

SecureWorld Boston

"For more than 23 years, SecureWorld conferences have been connecting, informing, and developing leaders in cybersecurity through in-person regional events and interactive online platforms. Join your fellow InfoSec professionals for high-quality training and collaboration, whether virtual or in-person. Earn 6-18 CPE credits through 20-40 educational elements, learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and networking opportunities.

Trellix Public Sector Cybersecurity Summit

"Join top technology leaders from across the public sector at the Trellix Public Sector Cybersecurity Summit as they discuss emerging topics in cybersecurity like ransomware, zero trust, global security and XDR. Throughout the summit, you’ll have the opportunity to engage in conversations about how the arrival of AI will intersect with public sector cybersecurity, evolving partnerships to strengthen threat intelligence, how to navigate, take action on and go beyond new cybersecurity policy directives, and much more."

"Super Bowl LVIII Presents a Vast Attack Surface for Threat Actors"

"Super Bowl LVIII Presents a Vast Attack Surface for Threat Actors"

The NFL's digitization of almost every aspect of this year's Super Bowl has created new vulnerabilities and targets for cybercriminals. Threats to arena security include ransomware attacks on critical systems, phishing attacks, credential theft, and breaches of personal data belonging to fans, NFL employees, players, and coaches. This article continues to discuss the attack surface presented to cybercriminals by the Super Bowl.

Submitted by grigby1 CPVI on

"Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decade"

"Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decade"

The U.S. government revealed that Chinese sponsored hacking group has embedded into many infrastructure networks including communications, energy, water and wastewater systems, and transportation. Agencies believe that this is a pre-positions effort that might allow future disruptions to these systems at a later time. The Volt Typhoon actors use these embedded hooks to learn about the target organizations and to be able to develop specialized attacks. This article is also related to the Living-off-the-Land guidance issued by CISA.

Submitted by grigby1 CPVI on
Subscribe to