"Quishing Attacks Surge and Bypass Email Security"

"Quishing Attacks Surge and Bypass Email Security"

According to researchers at Abnormal Security, email attacks involving QR codes, also known as quishing attacks, increased significantly in the fourth quarter of 2023. Quishing attacks can evade email security solutions or spam filters. Abnormal Security discovered that quishing attacks increased by a factor of 42. These attacks primarily targeted C-level executives. About 90 percent of detected quishing attacks aimed to steal login credentials. This article continues to discuss the rise in quishing attacks.

Submitted by Gregory Rigby on

"Cybersecurity Teams Recognized as Key Enablers of Business Goals"

"Cybersecurity Teams Recognized as Key Enablers of Business Goals"

According to CybSafe, 97 percent of office employees in the UK and US trust that their cybersecurity team can prevent or mitigate the damage caused by cyberattacks. CybSafe examined attitudes toward cybersecurity teams within organizations and discovered that employees have high levels of trust and appreciation for such teams despite there being issues with communication and processes. Cybersecurity teams and professionals are increasingly regarded as a critical strategic function supporting individual and business success.

Submitted by Gregory Rigby on

SecureWorld Boston

"For more than 23 years, SecureWorld conferences have been connecting, informing, and developing leaders in cybersecurity through in-person regional events and interactive online platforms. Join your fellow InfoSec professionals for high-quality training and collaboration, whether virtual or in-person. Earn 6-18 CPE credits through 20-40 educational elements, learning from nationally recognized industry leaders. Attend featured keynotes, panel discussions, breakout sessions, and networking opportunities.

Trellix Public Sector Cybersecurity Summit

"Join top technology leaders from across the public sector at the Trellix Public Sector Cybersecurity Summit as they discuss emerging topics in cybersecurity like ransomware, zero trust, global security and XDR. Throughout the summit, you’ll have the opportunity to engage in conversations about how the arrival of AI will intersect with public sector cybersecurity, evolving partnerships to strengthen threat intelligence, how to navigate, take action on and go beyond new cybersecurity policy directives, and much more."

"Super Bowl LVIII Presents a Vast Attack Surface for Threat Actors"

"Super Bowl LVIII Presents a Vast Attack Surface for Threat Actors"

The NFL's digitization of almost every aspect of this year's Super Bowl has created new vulnerabilities and targets for cybercriminals. Threats to arena security include ransomware attacks on critical systems, phishing attacks, credential theft, and breaches of personal data belonging to fans, NFL employees, players, and coaches. This article continues to discuss the attack surface presented to cybercriminals by the Super Bowl.

Submitted by Gregory Rigby on

"Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decade"

"Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decade"

The U.S. government revealed that Chinese sponsored hacking group has embedded into many infrastructure networks including communications, energy, water and wastewater systems, and transportation. Agencies believe that this is a pre-positions effort that might allow future disruptions to these systems at a later time. The Volt Typhoon actors use these embedded hooks to learn about the target organizations and to be able to develop specialized attacks. This article is also related to the Living-off-the-Land guidance issued by CISA.

Submitted by Gregory Rigby on

"Connecticut College Discloses Data Breach From 11 Months Ago"

"Connecticut College Discloses Data Breach From 11 Months Ago"

It was recently announced that a data breach at Connecticut College early last year resulted in the unauthorized release of personal information, including social security numbers, for an unspecified number of people affiliated with the private liberal arts college in New London.  The college said that the breach was detected in March 2023 and prompted college officials to contact law enforcement and take steps to "remediate" the issue and launch a third-party investigation.

Submitted by Adam Ekwall on

"Your Personal Data Is Political: W&M Computer Scientists Find Gaps in the Privacy Practices of Campaign Websites"

"Your Personal Data Is Political: W&M Computer Scientists Find Gaps in the Privacy Practices of Campaign Websites"

A new study by William & Mary (W&M), Google, and IBM researchers examined 2,060 House, Senate, and presidential campaigns from the 2020 US election cycle, marking the first large-scale analysis of political campaign websites' privacy practices. According to the study, those campaigns often retained private data for an unspecified time, provided incomplete or no privacy disclosures, and were likely to share or sell data.

Submitted by Gregory Rigby on

"Hyundai Motor Europe Hit by Black Basta Ransomware Attack"

"Hyundai Motor Europe Hit by Black Basta Ransomware Attack"

Car maker Hyundai Motor Europe has recently suffered a Black Basta ransomware attack, with the threat actors claiming to have stolen three terabytes of corporate data.  Hyundai Motor Europe is Hyundai Motor Company's European division, headquartered in Germany.  Hyundai Motor Europe says it is investigating a case in which an unauthorized third party has accessed a limited part of its network.  The investigation is ongoing, and local law enforcement has been notified.

Submitted by Adam Ekwall on

"Biden-Harris Administration Announces First-Ever Consortium Dedicated to AI Safety"

"Biden-Harris Administration Announces First-Ever Consortium Dedicated to AI Safety"

The US Secretary of Commerce, Gina Raimondo, has announced the launch of the US Artificial Intelligence (AI) Safety Institute Consortium (AISIC), which will bring AI creators, academics, government researchers, civil society organizations, and more together to support the development and implementation of safe and trustworthy AI. The consortium will contribute to President Biden's Executive Order priority actions, such as developing guidelines for red-teaming operations, capability evaluations, risk management, security, and watermarking synthetic content.

Submitted by Gregory Rigby on
Subscribe to