"Immediate AI Risks and Tomorrow's Dangers"

"Immediate AI Risks and Tomorrow's Dangers"

According to Mackenzie Jackson, a developer and security advocate at GitGuardian, Artificial Intelligence (AI) has increasingly empowered malicious attackers. There has been an increase in the impact of phishing, SMS phishing (smishing), and Voice phishing (vishing) attacks since the launch of ChatGPT in November 2022. Malicious Large Language Models (LLMs), such as FraudGPT, WormGPT, DarkBARD, and White Rabbit, enable threat actors to write malicious code, generate phishing messages, identify vulnerabilities, and build hacking tools.

Submitted by Gregory Rigby on

"The Weirdest Trend in Cybersecurity: Nation-States Returning to USBs"

"The Weirdest Trend in Cybersecurity: Nation-States Returning to USBs"

Nation-state cyber threat groups are again turning to USBs to infiltrate government organizations and critical infrastructure facilities. USBs are still an effective way for high-level threat actors to physically evade security at sensitive organizations. According to Maya Horowitz, vice president of research at Check Point, USBs were the primary infection vector for at least three major threat groups in 2023. This article continues to discuss nation-states returning to USBs to compromise highly guarded government organizations and critical infrastructure facilities.

Submitted by Gregory Rigby on

"Malicious Email Campaign Steals NTLM Hashes"

"Malicious Email Campaign Steals NTLM Hashes"

TA577, also known in the security industry as Hive0118, has targeted organizations with rogue email attachments that, when opened, steal Microsoft Windows NT LAN Manager (NTLM) authentication information. Researchers warn that the group's recent campaigns involved thousands of email messages sent to hundreds of entities. NTLM is the default authentication mechanism used on Windows networks when a computer attempts to access network resources or services. This article continues to discuss the malicious email campaign that steals NTLM authentication information.

Submitted by Gregory Rigby on

"New Fakext Malware Targets Latin American Banks"

"New Fakext Malware Targets Latin American Banks"

In November 2023, security researchers at IBM Security Trusteer discovered malware called "Fakext," which uses a malicious Edge extension to execute man-in-the-browser and web-injection attacks. Since early November 2023, researchers have seen over 35,000 infected sessions, most of which are in Latin America (LATAM), with a smaller number in Europe and North America. The large number of infected sessions suggests a highly successful and widespread campaign. Fakext injects content onto the screen, including error messages, user forms, and notifications.

Submitted by Gregory Rigby on

"Hackers Target Docker, Hadoop, Redis, Confluence With New Golang Malware"

"Hackers Target Docker, Hadoop, Redis, Confluence With New Golang Malware"

Misconfigured servers running Apache Hadoop YARN, Docker, Confluence, or Redis are the target of new Golang-based malware that automates the discovery and compromise of the hosts. The malicious tools used in the campaign exploit misconfigurations and an old Atlassian Confluence vulnerability to execute code on the system. Cado Security researchers discovered the campaign and examined the attack payloads, bash scripts, and Golang ELF binaries.

Submitted by Gregory Rigby on

"CISA Forced to Take Two Systems Offline Last Month After Ivanti Compromise"

"CISA Forced to Take Two Systems Offline Last Month After Ivanti Compromise"

In February, two systems from the Cybersecurity and Infrastructure Security Agency (CISA) were hacked through issues with Ivanti products. Ivanti provides software to manage IT security and system access. This compromise proved that any company is vulnerable to hacking. Sources reveal that the two systems hit were the Infrastructure Protection (IP) Gateway which contains data about U.S. infrastructure, and the Chemical Security Assessment Tool that contains chemical company security plans. CISA has taken those systems and tools offline.

Submitted by Gregory Rigby on

Dallas Cybersecurity Summit

"The 10th Edition of the Dallas Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception."


 


 

Baltimore Cybersecurity Summit

"The Inaugural Baltimore Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception."

Sunshine Cyber Conference

"It’s back! Cyber Florida is pleased to announce the return of our popular annual conference, now called the Sunshine Cyber Conference! Save the date for 27-28 March 2024 at the newly renovated Tampa Convention Center! Designed to be educational and affordable, Sunshine Cyber Conference offers valuable content for cybersecurity/IT practitioners, CISOs and CIOs, non-technical managers and c-suite leaders, and educaters, researchers, and students." 

Shift Up Summit

"Cybersecurity is evolving into cyber risk management. It is, therefore, crucial that CISOs, the C-suite, the board, and the markets are able to shift up and communicate with each other in a common language. Companies today face an almost total dependence on technology, economic pressures to cut spending, and new cybersecurity-focused regulations.  The need for executive decision-makers to evolve how they approach the issue of cyber risk has never been more acute.

Subscribe to