"NIST Releases 2 Draft Guides to Prepare for Post-Quantum Migration"

"NIST Releases 2 Draft Guides to Prepare for Post-Quantum Migration"

The National Institute of Standards and Technology (NIST) released two draft publications aimed at helping organizations transition from traditional encryption schemes to ones that can withstand attacks from a potential quantum computer. NIST opens the documents up for public comment as the agency ushers in the next era of cybersecurity.

Submitted by grigby1 CPVI on

"New Phishing Campaign Steals Instagram Backup Codes"

"New Phishing Campaign Steals Instagram Backup Codes"

Trustwave researchers have detailed a new phishing method that aims to bypass Instagram accounts' two-step verification. A misleading email message and login page lead users to reveal their credentials and a temporary six-digit backup code. The phishing method involves sending an email purporting to be from Instagram's parent company, Meta. It informs users that their account may have violated copyrights. To prevent losing their account, the user is prompted to log in within 12 hours using a specific link.

Submitted by grigby1 CPVI on

"The Impact of Prompt Injection in LLM Agents"

"The Impact of Prompt Injection in LLM Agents"

Prompt injection is an unresolved issue that poses a significant threat to the integrity of Large Language Models (LLMs). This threat is heightened when LLMs are transformed into agents that interact directly with the outside world, using tools to retrieve data or carry out actions. Prompt injection techniques can be used by malicious actors to produce unintended and potentially harmful output by distorting LLMs' reality.

Submitted by grigby1 CPVI on

"Group-IB Warns of Surge in Fake Delivery Sites in the Lead-up to Christmas"

"Group-IB Warns of Surge in Fake Delivery Sites in the Lead-up to Christmas"

A new Group-IB report warns of an increase in fake delivery websites. Group-IB's Computer Emergency Response Team (CERT-GIB) identified 587 fake postal resources in the first ten days of December, 34 percent more than in the last ten days of November. CERT-GIB has identified 1,539 phishing websites impersonating postal operators and delivery companies since the beginning of November.

Submitted by grigby1 CPVI on

"BidenCash Darkweb Market Gives 1.9 million Credit Cards for Free"

"BidenCash Darkweb Market Gives 1.9 million Credit Cards for Free"

It has recently been discovered that the BidenCash stolen credit card marketplace is giving away 1.9 million credit cards for free via its store to promote itself among cybercriminals.  BidenCash launched in early 2022 as a new marketplace on both the dark web and the clearnet, selling credit and debit cards that were stolen through phishing or skimmers on e-commerce sites.

Submitted by Adam Ekwall on

"NIST Calls for Information to Support Safe, Secure and Trustworthy Development and Use of Artificial Intelligence"

"NIST Calls for Information to Support Safe, Secure and Trustworthy Development and Use of Artificial Intelligence"

The National Institute of Standards and Technology (NIST) has issued a Request for Information (RFI) to help implement its responsibilities under the recent Executive Order on Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (AI). The order requires NIST to develop guidelines for evaluation, red-teaming, and other activities, as well as to facilitate the development of consensus-based standards. NIST will also provide testing environments for AI system evaluation.

Submitted by grigby1 CPVI on

"Celebrities Found in Unprotected Real Estate Database Exposing 1.5 Billion Records"

"Celebrities Found in Unprotected Real Estate Database Exposing 1.5 Billion Records"

According to security researchers at vpnMentor, an unprotected database belonging to Real Estate Wealth Network was left accessible from the internet for an unknown period.  Founded in 1993 and based in New York, Real Estate Wealth Network is an online real estate education platform that provides subscribers with access to courses, training materials, and a community. The researchers noted that the unprotected database was 1.16 terabytes in size, containing more than 1.5 billion records.

Submitted by Adam Ekwall on

"Microsoft Outlook Zero-Click Security Flaws Triggered by Sound File"

"Microsoft Outlook Zero-Click Security Flaws Triggered by Sound File"

Researchers have detailed two security flaws in Microsoft Outlook that, when exploited together, enable attackers to execute arbitrary code on impacted systems without requiring user interaction. They can both be triggered using a sound file. One of the flaws, tracked as CVE-2023-35384, is the second patch bypass discovered by Akamai researchers for a critical privilege escalation vulnerability in Outlook that Microsoft first patched in March.

Submitted by grigby1 CPVI on

"Remote Encryption Attacks Surge: How One Vulnerable Device Can Spell Disaster"

"Remote Encryption Attacks Surge: How One Vulnerable Device Can Spell Disaster"

There has been a significant shift to remote encryption among ransomware groups. Mark Loman, vice president of threat research at Sophos, points out that it only takes one vulnerable device to compromise a company's entire network, with remote ransomware. Attackers are aware of this, so they look for that one gap that most companies have. Remote encryption, also known as remote ransomware, occurs when a compromised endpoint is used to encrypt data on other devices on a network.

Submitted by grigby1 CPVI on

"Android Malware Chameleon Disables Fingerprint Unlock to Steal Pins"

"Android Malware Chameleon Disables Fingerprint Unlock to Steal Pins"

The Chameleon Android banking trojan has resurfaced with a new version that disables fingerprint and face unlock in order to steal device PINs and take over devices. The technique involves using an HTML page trick to gain access to the Accessibility service and a method to disrupt biometric operations. Earlier Chameleon versions discovered in April this year impersonated Australian government agencies, banks, and the CoinSpot cryptocurrency exchange. They conducted keylogging, overlay injection, cookie theft, and SMS theft on compromised devices.

Submitted by grigby1 CPVI on
Subscribe to