"Protect AI Finds Vulnerabilities in Open-Source AI and Machine Learning Tools"

"Protect AI Finds Vulnerabilities in Open-Source AI and Machine Learning Tools"

Protect AI has released a new report highlighting vulnerabilities recently discovered in open-source Artificial Intelligence (AI) and Machine Learning (ML) tools by its bug bounty program. The first vulnerability posed a significant risk of server takeover and the loss of sensitive data. The MLflow tool, used for storing and tracking models, was discovered to contain a critical flaw in its code that could trick users into connecting to a malicious remote data source, thus allowing attackers to run commands on a victim's system.

Submitted by grigby1 CPVI on

"New Docker Malware Steals CPU for Crypto and Drives Fake Website Traffic"

"New Docker Malware Steals CPU for Crypto and Drives Fake Website Traffic"

A novel campaign is targeting vulnerable Docker services, with threat actors deploying both the XMRig cryptocurrency miner and the 9Hits Viewer software as part of a multi-pronged monetization strategy. According to the cloud security company Cado, this is the first documented case of malware using the 9Hits application as a payload. The development further demonstrates that adversaries are constantly looking for new ways to profit from compromised hosts. This article continues to discuss findings regarding the novel campaign targeting vulnerable Docker services.

Submitted by grigby1 CPVI on

"Poorly Secured PostgreSQL, MySQL Servers Targeted by Ransomware Bot"

"Poorly Secured PostgreSQL, MySQL Servers Targeted by Ransomware Bot"

Border0 researchers warn that users who expose poorly secured PostgreSQL and MySQL servers online risk having their databases wiped by a ransomware bot. The attackers request a small sum to return and not publish the data. However, those who pay will not recover their data because the bot takes a small portion of it before wiping it all. This article continues to discuss how the ransomware bot operates. 

Submitted by grigby1 CPVI on

"'Chaes' Infostealer Code Contains Hidden Threat Hunter Love Notes"

"'Chaes' Infostealer Code Contains Hidden Threat Hunter Love Notes"

An analysis of Chaes version 4.1 reveals hidden ASCII art and a message to cybersecurity researchers, thanking them for their interest in the malware. The current Chaes campaign uses a Portuguese-language email regarding an important legal matter. If the user clicks the malicious link in the email, they are taken to a spoofed TotalAV website, where they are asked to enter their password to download a document. This article continues to discuss findings from the analysis of Chaes 4.1.

Submitted by grigby1 CPVI on

"Have I Been Pwned Adds 71 Million Emails From Naz.API Stolen Account List"

"Have I Been Pwned Adds 71 Million Emails From Naz.API Stolen Account List"

Have I Been Pwned has added about 71 million email addresses associated with stolen accounts listed in the Naz.API data set to its data breach notification service. The Naz.API data set contains 1 billion credentials gathered from credential stuffing lists and data stolen by information-stealing malware. Credential stuffing lists are collections of username and password pairs stolen from past data breaches. They are used to compromise accounts on other websites.

Submitted by grigby1 CPVI on

"Energy Department to Invest $30 Million in Clean Energy Cybersecurity Solutions"

"Energy Department to Invest $30 Million in Clean Energy Cybersecurity Solutions"

The US Department of Energy (DoE) recently announced plans to invest $30 million in projects aimed at securing the clean energy infrastructure against cyber threats.  Meant to support the research, development, and demonstration (RD&D) of innovative cybersecurity tools, the federal funding is provided as part of the Biden-Harris administration’s efforts to improve the country’s energy and national security.

Submitted by Adam Ekwall on

"Unpatched Rapid SCADA Vulnerabilities Expose Industrial Organizations to Attacks"

"Unpatched Rapid SCADA Vulnerabilities Expose Industrial Organizations to Attacks"

According to CISA, the Rapid SCADA open source industrial automation platform is affected by several vulnerabilities that could allow hackers to gain access to sensitive industrial systems, but the flaws remain unpatchedRapid SCADA is advertised as ideal for industrial automation and IIoT systems, energy accounting systems, and process control systems.

Submitted by Adam Ekwall on

"Customer Information of Toyota Insurance Company Exposed Due to Misconfigurations"

"Customer Information of Toyota Insurance Company Exposed Due to Misconfigurations"

According to security researcher Eaton Zveare, a series of misconfigurations and security vulnerabilities allowed him to access customer information stored in an email account at Toyota Tsusho Insurance Broker India (TTIBI).  The researcher noted that the unauthorized access was possible because the TTIBI site had a dedicated Eicher Motors subdomain with a premium calculator.

Submitted by Adam Ekwall on

"CISA Releases 2023 Year in Review Showcasing Efforts to Protect Critical Infrastructure"

"CISA Releases 2023 Year in Review Showcasing Efforts to Protect Critical Infrastructure"

The Cybersecurity and Infrastructure Security Agency (CISA) has released its fourth annual Year in Review, which highlights the US agency's efforts to protect the nation from cyber and physical threats as well as improve the resilience of critical infrastructure. The 2023 Year in Review delves into the agency's achievements in its cybersecurity, infrastructure security, and emergency communications missions.

Submitted by grigby1 CPVI on

"NIST Offers Guidance on Measuring and Improving Your Company's Cybersecurity Program"

"NIST Offers Guidance on Measuring and Improving Your Company's Cybersecurity Program"

The two-volume document, with the overall title "NIST Special Publication (SP) 800-55 Revision 2: Measurement Guide for Information Security," provides guidance on establishing an effective cybersecurity program as well as a flexible approach to developing information security measures to meet an organization's performance objectives. NIST is requesting public feedback on this initial public draft by March 18, 2024. The publication is designed to be used in conjunction with any risk management framework, such as NIST's Cybersecurity Framework or Risk Management Framework.

Submitted by grigby1 CPVI on
Subscribe to