"Cybercriminals Harness AI for New Era of Malware Development"

"Cybercriminals Harness AI for New Era of Malware Development"

According to Group-IB's Hi-Tech Crime Trends 2023/2024 report, the partnership between ransomware groups and Initial Access Brokers (IABs) remains powerful in the cybercrime industry. There has been a 74 percent year-on-year increase in companies that had their data uploaded on Dedicated Leak Sites (DLS). Global threat actors have also shown an increased interest in Apple platforms, as evidenced by the significant growth in underground sales of macOS information stealers. Group-IB experts observed a 70 percent increase in public posts offering zero-day exploits for sale.

Submitted by Gregory Rigby on

"CISA, US and International Partners Warn of Ongoing Exploitation of Multiple Ivanti Vulnerabilities"

"CISA, US and International Partners Warn of Ongoing Exploitation of Multiple Ivanti Vulnerabilities"

The US Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing and Analysis Center (MS-ISAC), and international partners have released a Cybersecurity Advisory (CSA) in response to the exploitation of multiple vulnerabilities in Ivanti Connect Secure and Ivanti Policy Secure gateways. According to the organizations and industry partners, these vulnerabilities have been targeted by various cyber threat actors.

Submitted by Gregory Rigby on

"Golden Corral Data Breach Impacts 180,000 Employees"

"Golden Corral Data Breach Impacts 180,000 Employees"

US restaurant chain Golden Corral recently announced that personal information was stolen in a data breach.  The incident, the company says, was identified on August 15, 2023, and led to the disruption of certain corporate operations.  The company noted that the investigation that ensued determined that a threat actor accessed certain systems and “acquired certain data relating to current and former employees and beneficiaries between August 11, 2023, until August 15, 2023”.

Submitted by Adam Ekwall on

"Critical Infrastructure Systems Are Vulnerable to a New Kind of Cyberattack"

"Critical Infrastructure Systems Are Vulnerable to a New Kind of Cyberattack"

Researchers at the Georgia Institute of Technology have discovered a way to take over computers that control infrastructure and industrial systems. Programmable Logic Controllers (PLCs) increasingly include embedded web servers and can be accessed on-site using web browsers. Attackers can use this method to gain complete access to the system. Such access could allow them to make motors spin out of control, turn off power relays or water pumps, disrupt Internet or telephone communication, or steal sensitive information. They could also launch or disrupt weapons.

Submitted by Gregory Rigby on

"Surge in High-Risk Open-Source Vulnerabilities Found in Commercial Codebases"

"Surge in High-Risk Open-Source Vulnerabilities Found in Commercial Codebases"

A new report from Synopsys reveals an alarming increase in high-risk vulnerabilities in commercial codebases, raising the risk of hacking and data theft. Although the percentage of codebases with at least one open-source vulnerability remained consistent year-over-year at 84 percent, significantly more codebases had high-risk vulnerabilities in 2023. The percentage of codebases with high-risk open-source vulnerabilities increased from 48 percent in 2022 to 74 percent in 2023.

Submitted by Gregory Rigby on

"Popular Video Doorbells Can Be Easily Hijacked, Researchers Find"

"Popular Video Doorbells Can Be Easily Hijacked, Researchers Find"

Consumer Reports detailed a security flaw in several Internet-connected doorbell cameras that allows hackers to hijack them. The organization published research on four security and privacy flaws in cameras made by EKEN, a company based in Shenzhen, China. According to Consumer Reports, the most significant issue is that if someone is near an EKEN doorbell camera, they can take control of it by downloading its official app, Aiwit, and pairing the camera by holding down the doorbell's button for eight seconds.

Submitted by Gregory Rigby on

IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)

"The conference technical programme focuses on wireless networking technologies and their key role in future Internet scenarios. The symposium addresses the increasing wealth of opportunities for distributing multimedia content over wireless networks, enabling the dissemination of professional content to mobile users and sharing user-generated content among them. Users will be able to retrieve, publish, and manage information, communicate with other users or devices, access, and author services, and create and exploit context awareness."

"Innovative NIST Research Enhances Cybersecurity"

"Innovative NIST Research Enhances Cybersecurity"

The National Institute of Standards and Technology's (NIST) Artificial Intelligence (AI) Bug Finder is a detection technology that identifies errors in code without executing the code itself and serves as a testbed. NIST's Information Technology Laboratory received a Department of Homeland Security (DHS) Commercialization Accelerator Program (CAP) grant in 2022 to support its AI Bug Finder project, and the research behind it continues. It has the advantage of being a modular program that enables the comparison of various AI-based techniques and datasets.

Submitted by Gregory Rigby on

"Discount Retail Giant Pepco Loses €15 Million to Cybercriminals"

"Discount Retail Giant Pepco Loses €15 Million to Cybercriminals"

European discount retailer Pepco Group recently revealed that its Hungarian business has lost a significant amount of money to cybercriminals.  The UK-based company reported losing roughly $16.8 million in cash due to a "sophisticated fraudulent phishing attack." The company noted that an investigation has been launched and is working with banks and the police to recover the money.  Still, the company says it needs to determine whether the funds can be recovered.

Submitted by Adam Ekwall on
Subscribe to