"BlackBerry: Global Financial Sector Faces 'Death by a Million Cuts' Through Malware Attacks"

"BlackBerry: Global Financial Sector Faces 'Death by a Million Cuts' Through Malware Attacks"

A new BlackBerry report reveals a significant increase in attacks on the global financial sector, with 1 million attacks recorded in just 120 days. According to BlackBerry's current Global Threat Intelligence Report, attacks on the global financial sector were primarily launched using commodity malware. The use of such malware suggests that many independent threat actors are targeting the industry for financial gain.

Submitted by Gregory Rigby on

"SAFECOM and NCSWIC Develop 911 Cybersecurity Resource Hub"

"SAFECOM and NCSWIC Develop 911 Cybersecurity Resource Hub"

SAFECOM and the National Council of Statewide Interoperability Coordinators (NCSWIC) have announced the launch of the 911 Cybersecurity Resource Hub where Emergency Communications Centers (ECCs) can report cyber incidents, find real-world case studies, access cybersecurity education and training opportunities, and learn best practices regarding identifying and protecting networks from cyberattacks.

Submitted by Gregory Rigby on

Open Source Summit

"Open Source Summit is the premier event for open source developers, technologists, and community leaders to collaborate, share information, solve problems, and gain knowledge, furthering open source innovation and ensuring a sustainable open source ecosystem. It is the gathering place for open-source code and community contributors. Open Source Summit is a conference umbrella, composed of a collection of events covering the most important technologies, topics, and issues affecting open source today."

Southeast Cybersecurity Summit

"The purpose of the Summit is to strengthen and promote the internet security profession in the southeastern United States region. That goal is achieved through event activities which result in relationship building, information sharing, and ongoing education and training focused on current technology challenges and solutions."



 

#CS4CA: Cyber Security Summit USA

"As critical infrastructure continues its transition from analog to digital, the surface for cyber attacks has expanded and the resulting risks to an organization’s physical assets, people, financial liability, and reputation are increasing in frequency and potency.  With this in mind, the Cyber Security for Critical Assets Summit brings together senior cybersecurity leaders from across US critical infrastructure, for 2-days of in-depth knowledge exchange, strategy planning and insight building on March 26-27th 2024.

"SIM Swappers Hijacking Phone Numbers in eSIM Attacks"

"SIM Swappers Hijacking Phone Numbers in eSIM Attacks"

Subscriber Identity Module (SIM) swappers have changed their attacks to steal a target's phone number by porting it to a new Embedded SIM (eSIM) card, which is a digital SIM in a rewritable chip found in many modern smartphones. An eSIM is a digital card stored on the chip of a mobile device that performs the same functions as physical SIM cards but can be remotely reprogrammed and provisioned, as well as deactivated, swapped, and deleted.

Submitted by Gregory Rigby on

"ChatGPT Spills Secrets in Novel PoC Attack"

"ChatGPT Spills Secrets in Novel PoC Attack"

Researchers from Google DeepMind, Open AI, ETH Zurich, McGill University, and the University of Washington have developed a new attack that extracts key architectural information from proprietary Large Language Models (LLMs) such as ChatGPT and Google PaLM-2. The study shows how adversaries can extract supposedly hidden data from an LLM-enabled chatbot, allowing them to duplicate or steal its functionality. The attack is one of several highlighted in the past year that have delved into the security flaws of Artificial Intelligence (AI) technologies.

Submitted by Gregory Rigby on

"Only 13% of Medical Devices Support Endpoint Protection Agents"

"Only 13% of Medical Devices Support Endpoint Protection Agents"

According to Claroty, healthcare networks have been found to contain 63 percent of the Known Exploited Vulnerabilities (KEVs) tracked by the US Cybersecurity and Infrastructure Security Agency (CISA). Twenty-three percent of medical devices, including imaging devices, clinical Internet of Things (IoT) devices, and surgery devices, have at least one KEV.

Submitted by Gregory Rigby on

"French Employment Agency Data Breach Could Affect 43 Million People"

"French Employment Agency Data Breach Could Affect 43 Million People"

France’s Employment Agency recently suffered a data breach that could affect users who registered over the past 20 years, representing 43 million potential users’ data exposed.  France Travail, the French national employment agency, announced on March 13, 2024, that its IT systems and those of Cap Emploi, a government employment service that supports people with disabilities, were breached.

Submitted by Adam Ekwall on

"Nissan Data Breach Affects 100,000 Individuals"

"Nissan Data Breach Affects 100,000 Individuals"

Nissan Oceania recently announced that roughly 100,000 individuals were affected by a data breach resulting from a ransomware attack conducted by a known cybercrime group in late 2023.  Nissan said it detected an intrusion on December 5, 2023, and informed customers about a disruptive cyber incident the same day.  The attack impacted Nissan Motor Corporation and Nissan Financial Services in Australia and New Zealand.

Submitted by Adam Ekwall on
Subscribe to