"Attackers Chain Two Google Kubernetes Engine Bugs to Escalate Privileges"

"Attackers Chain Two Google Kubernetes Engine Bugs to Escalate Privileges"

Attackers with access to a Kubernetes cluster could exploit two vulnerabilities in the Google Kubernetes Engine (GKE) to escalate their privileges. According to Palo Alto Networks' Unit 42 research team, attackers can use this access to steal data, deploy malicious pods, and disrupt cluster operations. The first flaw is the default configuration of GKE's logging agent, FluentBit, which runs on all Kubernetes clusters by default. The second flaw is the Anthos Service Mesh (ASM) default privileges.

Submitted by grigby1 CPVI on

"CHI Memorial's Data Breach: What Patients Need to Know"

"CHI Memorial's Data Breach: What Patients Need to Know"

Recently, CHI Memorial released new details about the scope of the breach that impacted them and how it could affect patients.  CHI Memorial says that some patient information may be at risk, including name, address, date of birth, some clinical information, patient ID number, and health insurance information.  An investigation revealed that the breach happened on May 30th of last year. 

 

Submitted by Adam Ekwall on

"Terrapin Attack Allows to Downgrade SSH Protocol Security"

"Terrapin Attack Allows to Downgrade SSH Protocol Security"

Ruhr University Bochum security researchers discovered Terrapin, a vulnerability tracked as CVE-2023-48795 with a CVSS score of 5.9, in the Secure Shell (SSH) cryptographic network protocol. The exploitation of the flaw allows an attacker to downgrade the connection's security. Terrapin is a prefix truncation attack that compromises the integrity of SSH's secure channel.

Submitted by grigby1 CPVI on

"New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections"

"New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections"

According to researchers at Security Joes, there is a new variant of the Dynamic Link Library (DLL) search order hijacking technique that threat actors could use to evade security mechanisms and execute malicious code on Microsoft Windows 10 and Windows 11 systems. The approach involves executables commonly found in the trusted WinSxS folder and exploits them using the classic DLL search order hijacking technique. Through this method, malicious actors can avoid the need for elevated privileges when trying to run malicious code on a compromised machine.

Submitted by grigby1 CPVI on

"Over $80m in Crypto Stolen in Cyberattack on Orbit Chain"

"Over $80m in Crypto Stolen in Cyberattack on Orbit Chain"

Over $80m worth of cryptocurrency was recently stolen following a cyberattack on the cross-chain bridge project Orbit Chain.  The blockchain revealed the incident on January 1, 2024, informing users that an “unidentified access” to Orbit Bridge was confirmed on December 31, 2023.  The attackers stole 26,741.6 of Ether (ETH), which were transferred to five wallet addresses, and around 15,498,358 of DAI (a stablecoin on the Ethereum blockchain) transferred to three addresses.  This is worth a total of around $84.5 million at current prices.

Submitted by Adam Ekwall on

"New Black Basta Decryptor Exploits Ransomware Flaw to Recover Files"

"New Black Basta Decryptor Exploits Ransomware Flaw to Recover Files"

Researchers have developed a decryptor that uses a flaw in the Black Basta ransomware and allows victims to recover their files for free. However, Bleeping Computer has discovered that the Black Basta developers fixed the bug in their encryption routine, thus preventing the decryptor technique from being used in newer attacks. Security Research Labs (SRLabs) developed the 'Black Basta Buster' decryptor after finding a flaw in the encryption algorithm applied for the gang's encryptors that enables the discovery of the ChaCha keystream used to XOR encrypt a file.

Submitted by grigby1 CPVI on

"UAE Banks on AI to Boost Cybersecurity"

"UAE Banks on AI to Boost Cybersecurity"

With about 50,000 cyberattacks reportedly thwarted every day, the United Arab Emirates (UAE) has spent the last year fortifying its digital borders and developing key partnerships in order to get ahead of attackers. Artificial Intelligence (AI) has been a major topic in the Middle East this year, with generative AI promising significant benefits. However, AI adoption poses risks as cybercriminals increasingly use AI tools for spoofing, creating phishing emails, and more. This article continues to discuss the UAE's vulnerability to cyber risks and efforts to boost cybersecurity.

Submitted by grigby1 CPVI on

"Ohio Bank Gives Notice of Security Incident"

"Ohio Bank Gives Notice of Security Incident"

An Ohio banking company recently announced that it was impacted by a “security incident” in April. Middlefield Bank experienced a data security incident that impacted certain computer systems and caused a temporary disruption to certain corporate operations around April 12, 2023. The company said it promptly launched an investigation and only recently concluded its review around November 21, at which time it was able to determine the individuals included in the potentially impacted data set.

Submitted by Adam Ekwall on

"Australian Court Service Hacked, Hearing Recordings at Risk"

"Australian Court Service Hacked, Hearing Recordings at Risk"

According to the Court Services Victoria (CSV), court cases and tribunals in Australia have recently been impacted by a cybersecurity incident, with attackers potentially accessing recordings of hearings.  The CSV revealed the incident in a statement on January 2, 2024.  This public notice came some 12 days after the CSV was first alerted to the cyber incident on December 21, 2023.  The CSV said it took time to establish which recordings and transcripts were affected.

Submitted by Adam Ekwall on

"Research Symposium Highlights Innovations in Cybersecurity and AI"

"Research Symposium Highlights Innovations in Cybersecurity and AI"

The Knight Foundation School of Computing and Information Sciences (KFSCIS) Research Symposium featured innovations in cybersecurity, Artificial Intelligence (AI), data science, federated learning, and more. Maryna Veksler, Harun Oz, and Mahshad Shariatnasab are three KFSCIS Ph.D. students who received top honors at the symposium for their work in cybersecurity and AI. Oz presented research on a newly discovered attack vector that may increase the risk of ransomware attacks.

Submitted by grigby1 CPVI on
Subscribe to