"Smart Speakers, Wearables and Sensors: How Up-To-Date Are Such Permanently Connected IoT Devices?"

"Smart Speakers, Wearables and Sensors: How Up-To-Date Are Such Permanently Connected IoT Devices?"

Internet of Things (IoT) devices process highly sensitive data, thus making it essential to keep them up-to-date to eliminate vulnerabilities and improve cybersecurity, especially as hacker attacks, data misuse, and industrial espionage grow. A new study conducted by researchers at the Fraunhofer Institute for Systems and Innovation Research ISI analyzed data from 52 billion devices, their geographical location, and whether or not their installed firmware is updated. The researchers also looked at the impact of the European General Data Protection Regulation (GDPR).

Submitted by Gregory Rigby on

"'Smishing' Is The Latest Way Scammers Are Trying To Get Your Info. Here's How To Protect Yourself"

"'Smishing' Is The Latest Way Scammers Are Trying To Get Your Info. Here's How To Protect Yourself"

Smishing is a phishing scheme that uses SMS to your phone. Like traditional phishing scams, hackers are trying to trick you into giving up your personal information via a text—that looks very much like a regular communication from your bank or a business you’ve ordered from before. The SMS text might alert you to with a problem with your account or offer you a free gift. In 2022, Americans were scammed for over $330 millions via smishing. With so many validations coming to our phones, we are used to responding to them. But it’s important to really look to what is being asked for.

Submitted by Gregory Rigby on

"Dozens of High-Profile Israeli Firms Hacked by Iran-Sponsored Gang"

"Dozens of High-Profile Israeli Firms Hacked by Iran-Sponsored Gang"

According to the threat intelligence platform FalconFeedsio, a newly emerged Iranian cyber gang called "Cyber Toufan" has allegedly leaked data from 49 Israeli companies. Researchers believe many incidents were caused by a breach faced by one hosting company. Since its appearance on November 16, 2023, Cyber Toufan says it compromised high-profile organizations, including the Israel Innovation Authority, Toyota Israel, the Ministry of Welfare and Social Security, Ikea Israel, the cybersecurity and geo-intelligence company Max Security, and more.

Submitted by Gregory Rigby on

"Member of Lapsus$ Gang Sentenced to an Indefinite Hospital Order"

"Member of Lapsus$ Gang Sentenced to an Indefinite Hospital Order"

Arion Kurtaj, a prominent member of the international cyber extortion gang Lapsus$, has been sentenced to an indefinite hospital order by the UK Southwark Crown Court. The Lapsus$ gang has compromised many high-profile companies, including NVIDIA, Samsung, Ubisoft, Mercado Libre, Vodafone, Microsoft, Okta, and Globant. Kurtaj was found guilty of hacking multiple high-profile companies by a London jury in August 2023. He has been conducting a series of solo attacks since September 2022, gaining access to about 5,000 Revolut customers' records and causing $3 million in damage to Uber.

Submitted by Gregory Rigby on

"CISA Finalizes Microsoft 365 Secure Configuration Baselines"

"CISA Finalizes Microsoft 365 Secure Configuration Baselines"

The US Cybersecurity and Infrastructure Security Agency (CISA) has announced the release of Version 1.0 of its Secure Configuration Baselines for Microsoft 365 (M365), along with its ScubaGear tool that helps organizations quickly assess their M365 services against CISA's recommended policies. These baselines provide easily implementable policy configuration recommendations that complement each federal agency's unique requirements and risk tolerance levels.

Submitted by Gregory Rigby on

"Cybercrooks Book a Stay in Hotel Email Inboxes to Trick Staff Into Spilling Credentials"

"Cybercrooks Book a Stay in Hotel Email Inboxes to Trick Staff Into Spilling Credentials"

Sophos researchers have detailed a new malware campaign targeting hotels that involves sending emails that play on employees' emotions while putting them under time pressure to trick them into downloading and running password-stealing Windows malware. There are two types of emails sent, with the first being those that complain about serious issues with a recent stay, and the second being those that request information to help with a future booking. Both situations typically call for a quick response from hotel management.

Submitted by Gregory Rigby on

"Nissan Australia Cyberattack Claimed by Akira Ransomware Gang"

"Nissan Australia Cyberattack Claimed by Akira Ransomware Gang"

The Akira ransomware gang recently claimed it breached the network of Nissan Australia, the Australian division of Japanese car maker Nissan.  In a new entry added to the operation's date leak blog on December 22, Akira says it allegedly stole around 100GB of documents from the automaker's systems.  The attackers have threatened to leak sensitive business and client data online, as ransom negotiations with Nissan failed after the company either refused to engage or pay the ransom.

Submitted by Adam Ekwall on

"OpenAI Rolls Out Imperfect Fix for ChatGPT Data Leak Flaw"

"OpenAI Rolls Out Imperfect Fix for ChatGPT Data Leak Flaw"

OpenAI has addressed a ChatGPT data exfiltration bug that could leak conversation details to an external URL. However, the mitigation is not perfect, according to security researcher Johann Rehberger, who discovered the flaw. According to Rehberger, attackers can still exploit it under certain conditions. The safety checks for ChatGPT have also yet to be implemented in the iOS mobile app, so the threat on that platform remains unaddressed. This article continues to discuss the ChatGPT data leak vulnerability and OpenAI's fix for it.

Submitted by Gregory Rigby on

"UAC-0099 Using WinRAR Exploit to Target Ukrainian Firms with LONEPAGE Malware"

"UAC-0099 Using WinRAR Exploit to Target Ukrainian Firms with LONEPAGE Malware"

A threat actor called UAC-0099 has been linked to attacks against Ukraine, some of which exploit a high-severity flaw contained by WinRAR software to deliver the LONEPAGE malware strain. According to researchers at Deep Instinct, the threat actor targets Ukrainian employees in companies based outside of Ukraine. The Computer Emergency Response Team of Ukraine (CERT-UA) first documented UAC-0099 in June 2023, describing its attacks against state organizations and media entities for espionage purposes.

Submitted by Gregory Rigby on

"'BattleRoyal' Hackers Deliver DarkGate RAT Using Every Trick"

"'BattleRoyal' Hackers Deliver DarkGate RAT Using Every Trick"

An unidentified threat actor conducted various social engineering campaigns against American and Canadian organizations in different industries to infect them with the multifaceted DarkGate malware. Proofpoint researchers could not determine whether the perpetrator dubbed "BattleRoyal" is a completely new actor or related to existing ones, partly because of the number of tactics, techniques, and procedures (TTPs) used.

Submitted by Gregory Rigby on
Subscribe to