Zero Trust & Generative AI Conference

"In today's dynamic world, ZERO Trust & Generative AI stands at the forefront of technological innovation, and it is essential to recognize the significance of these transformative technologies. ZERO Trust, with its paradigm shift in security protocols, ensures that trust is never assumed and always verified. On the other hand, Generative AI empowers us to create and innovate in ways previously unimaginable. Together, they represent a powerful force that aligns with the evolving needs of businesses and individuals in an increasingly digital world."

"Massive Ad Fraud Campaign Sends Million of Spam Emails from Thousands of Hijacked Reputable Domains"

"Massive Ad Fraud Campaign Sends Million of Spam Emails from Thousands of Hijacked Reputable Domains"

An ad fraud campaign uses thousands of hijacked legitimate domains and subdomains to send millions of spam emails, generating revenue for the threat actors. The "SubdoMailing" campaign distributes malicious ads to get fraudulent clicks for "Ad network" clients. The campaign, active since September 2022, involves hijacking no longer registered or abandoned domains and subdomains belonging to legitimate brands to send spam from attacker-controlled infrastructure. This article continues to discuss findings regarding the massive ad fraud campaign.

Submitted by Gregory Rigby on

"Microsoft: Russians Are Using Stolen Information to Breach Company's Systems"

"Microsoft: Russians Are Using Stolen Information to Breach Company's Systems"

Microsoft warns that Russian hackers who launched several high-profile attacks on the US government are now exploiting information stolen from the company's systems in November. According to Microsoft's Security Team, there is evidence that a cyber espionage group tied to Russia's Foreign Intelligence Service (SVR) has been using information pulled from the company's corporate email environment. The hackers are using the information from the incident to gain or attempt to gain unauthorized access to some of the company's source code repositories and internal systems.

Submitted by Gregory Rigby on

"Switzerland: Play Ransomware Leaked 65,000 Government Documents"

"Switzerland: Play Ransomware Leaked 65,000 Government Documents"

The National Cyber Security Centre (NCSC) of Switzerland has recently released a report on its analysis of a data breach following a ransomware attack on Xplain, disclosing that the incident impacted thousands of sensitive Federal government files.  Xplain is a Swiss technology and software solutions provider for various government departments, administrative units, and even the country's military force.  The Play ransomware gang breached the company on May 23, 2023.  During the investigation, the NSCS confirmed that 65,000 government documents were leaked during the breach.

Submitted by Adam Ekwall on

"CISA Warns on JetBrains TeamCity Flaw That Could Allow Hackers to Generate Admin Accounts"

"CISA Warns on JetBrains TeamCity Flaw That Could Allow Hackers to Generate Admin Accounts"

The US Cybersecurity and Infrastructure Security Agency (CISA) has added a JetBrains vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, noting evidence of active exploitation. The JetBrains flaw is a critical authentication bypass problem in the TeamCity On-Premises software that enables unauthenticated attackers to completely take over target servers. It is tracked as CVE-2024-27198 and has a severity score of 9.8.

Submitted by Gregory Rigby on

"Tesla Can Be Hacked via MiTM Phishing Attack"

"Tesla Can Be Hacked via MiTM Phishing Attack"

Researchers discovered that hackers can steal a Tesla Model 3 by conducting a Man-in-The-Middle (MiTM) phishing attack on car owners' Tesla accounts. The researchers carried out the attack using the 4.30.6 version of the Tesla App, which serves as the car's key, and version 11.1 2024.2.7 of the underlying Tesla software. Through the attack, the researchers were able to get a new "phone key" to unlock the Tesla vehicle. The study reveals that connecting the car to a new phone lacks adequate authentication security.

Submitted by Gregory Rigby on

"UnitedHealth Sets Timeline to Restore Change Healthcare Systems After BlackCat Hit"

"UnitedHealth Sets Timeline to Restore Change Healthcare Systems After BlackCat Hit"

UnitedHealth Group has recently published a timeline to restore Change Healthcare’s systems following the BlackCat/ALPHV ransomware attack, which has led to delays to patient care across the US.  UnitedHealth Group, which owns Change Healthcare, expects key pharmacy and payment systems to be restored and available by March 18.  In the meantime, UnitedHealth is urging its provider and payer clients to use applicable workarounds it has established, including its new iEDI claim submission system.

Submitted by Adam Ekwall on

"NSA Releases Top Ten Cloud Security Mitigation Strategies"

"NSA Releases Top Ten Cloud Security Mitigation Strategies"

The National Security Agency (NSA) has published "Top Ten Cloud Security Mitigation Strategies" to help cloud customers understand important security practices as they migrate their data to cloud environments. The report compiles ten Cybersecurity Information Sheets (CSIs), each covering a different strategy. The US Cybersecurity and Infrastructure Security Agency (CISA) has joined the NSA as a partner in six of the ten strategies.

Submitted by Gregory Rigby on

"Scientists Put Forth a Smarter Way to Protect a Smarter Grid"

"Scientists Put Forth a Smarter Way to Protect a Smarter Grid"

A team of experts at the US Department of Energy's (DOE) Pacific Northwest National Laboratory (PNNL) presented a new approach to protecting the electric grid against cyberattacks. Instead of protecting the grid and its many components piece-by-piece, the team is developing a tool capable of quickly sorting and prioritizing cyber threats. The goal is to provide grid operators with a clear blueprint for identifying and addressing the most serious threats first. This article continues to discuss the team's approach to protecting the electric grid against cyberattacks.

Submitted by Gregory Rigby on

"Flaws in Public Records Management Tool Could Let Hackers Nab Sensitive Data Linked to Requests"

"Flaws in Public Records Management Tool Could Let Hackers Nab Sensitive Data Linked to Requests"

According to Jason Parker, an independent cybersecurity researcher, a popular tool used by many state and local governments to manage public records requests had flaws that could have enabled hackers to download unsecured files associated with records inquiries, including personal information such as IDs, fingerprints, medical reports, and more. The vulnerabilities could have also let hackers trick the system into allowing individuals to edit or change the metadata of records requests without administrators' knowledge.

Submitted by Gregory Rigby on
Subscribe to