"Vulns in Android WebView, Password Managers Can Leak User Credentials"

"Vulns in Android WebView, Password Managers Can Leak User Credentials"

Researchers have shown that most popular password managers can leak credentials from Android devices when using the mobile operating system's WebView autofill function with malicious apps. Ankit Gangwal of the International Institute of Information Technology (IIIT) demonstrated how mobile apps that use WebView controls can leak passwords from many password managers. In a paper, Gangwal and his students Shubham Singh and Abhijeet Srivastava detail the "AutoSpill" credential-leaking vulnerability.

Submitted by Gregory Rigby on

"Researchers Automated Jailbreaking of LLMs With Other LLMs"

"Researchers Automated Jailbreaking of LLMs With Other LLMs"

Artificial Intelligence (AI) security researchers from Robust Intelligence and Yale University have developed a Machine Learning (ML) method that can quickly jailbreak Large Language Models (LLMs) and do so in an automated way. According to Robust Intelligence researchers, the Tree of Attacks with Pruning (TAP) method can be used to induce sophisticated models such as GPT-4 and Llama-2 to generate hundreds of harmful responses to a user query in minutes. Their findings imply that this vulnerability is widespread in LLM technology, but they do not see an obvious solution.

Submitted by Gregory Rigby on

"For Domestic Violence Victim-Survivors, a Data or Privacy Breach Can Be Extraordinarily Dangerous"

"For Domestic Violence Victim-Survivors, a Data or Privacy Breach Can Be Extraordinarily Dangerous"

Cybersecurity data breaches present unique risks for victim-survivors of domestic violence. For example, the UK Information Commissioner reported earlier this year that it had reprimanded seven organizations for privacy breaches involving victims of domestic abuse. These included organizations revealing the victims' safe addresses to their alleged abusers. In one case, a family had to be relocated to emergency housing immediately. In another case, an organization revealed two children's home address to their abusive birth father.

Submitted by Gregory Rigby on

"Ninety Percent of Energy Companies Suffer Supplier Data Breach"

"Ninety Percent of Energy Companies Suffer Supplier Data Breach"

According to security researchers at SecurityScorecard, almost all (90%) of the world’s 48 biggest energy companies have suffered a supply chain data breach in the past 12 months.  The researchers analyzed the cybersecurity posture of the largest coal, oil, natural gas, and electricity companies in the US, UK, France, Germany, and Italy, as well as their suppliers,  covering 21,000 domains.  The researchers identified 264 breach incidents related to third-party compromises in the past 90 days alone.  The researchers noted that some countries fared better than others.

Submitted by Adam Ekwall on

"New SLAM Attack Steals Sensitive Data From AMD, Future Intel CPUs"

"New SLAM Attack Steals Sensitive Data From AMD, Future Intel CPUs"

Researchers from the Systems and Network Security Group (VUSec Group) at Vrije Universiteit Amsterdam have developed "Spectre based on LAM" (SLAM), a new side-channel attack that uses hardware features designed to improve security in upcoming Intel, AMD, and Arm CPUs to obtain the root password hash from kernel memory. According to the researchers, SLAM is a transient execution attack that exploits a memory feature, which enables software to use untranslated address bits in 64-bit linear addresses for storing metadata.

Submitted by Gregory Rigby on

"UC Researchers Work on Knowledge Graph to Help Small Businesses Tackle Cybersecurity"

"UC Researchers Work on Knowledge Graph to Help Small Businesses Tackle Cybersecurity"

As part of a new research project, Dr. Rosetta Romano, an assistant professor in Information Technology (IT) and Systems at the University of Canberra, will help small businesses by educating them about the criticality of cybersecurity. Dr. Romano and fellow researchers, together with the Canberra-based data management company Surround Australia, are developing a Cybersecurity Standards and Frameworks Knowledge Graph for Australian small businesses. Large companies tend to have greater resilience and ability to continue operations in the event of a cyberattack.

Submitted by Gregory Rigby on

"The Ethics of Synthetic Data and Its Impact on Cybersecurity Algorithms"

"The Ethics of Synthetic Data and Its Impact on Cybersecurity Algorithms"

Synthetic data can be used to improve cybersecurity algorithms, such as facial recognition and fingerprint matching. These applications have the potential to improve suspect identification in law enforcement and streamline border control processes. Synthetic data generation involves manipulating variables and parameters in order to replicate data patterns. Since synthetic data does not contain real individuals' sensitive information, it can help to alleviate data privacy concerns. This is important in criminal investigations, where privacy is critical.

Submitted by Gregory Rigby on

"US and International Partners Issue Recommendations to Secure Software Products Through Memory Safety"

"US and International Partners Issue Recommendations to Secure Software Products Through Memory Safety"

The National Security Agency (NSA) has joined the Cybersecurity and Infrastructure Security Agency (CISA) and other US and international partners in releasing a Cybersecurity Information Sheet (CSI) titled "The Case for Memory Safe Roadmaps." The report, which expands on NSA's "Software Memory Safety" CSI published in April 2023, offers guidance for software manufacturers and technology providers in developing roadmaps tailored to eliminate memory safety vulnerabilities from their products.

Submitted by Gregory Rigby on

"Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware"

"Cisco Talos Report: New Trends in Ransomware, Network Infrastructure Attacks, Commodity Loader Malware"

The recently released Cisco Talos Year in Review report highlights new trends in the cybersecurity threat landscape. According to the report, more ransomware actors have shifted to extortion rather than encryption, while commodity loaders have become stealthier and more effective. For the second year in a row, LockBit was the most active ransomware group, followed by ALPHV and Clop. However, some ransomware groups continued to evolve in 2023, with structures often merging or rebranding to confuse law enforcement and the researchers tracking them.

Submitted by Gregory Rigby on

"Millions of Patient Scans and Health Records Spilling Online Thanks to Decades-Old Protocol Bug"

"Millions of Patient Scans and Health Records Spilling Online Thanks to Decades-Old Protocol Bug"

Aplite researchers warn that thousands of exposed servers are leaking millions of patients' medical records and personal health information due to security flaws in a decades-old industry standard, Digital Imaging and Communications in Medicine (DICOM). This standard is designed for storing and sharing medical images. DICOM, the internationally recognized medical imaging format, is the file format for CT scans and X-ray images.

Submitted by Gregory Rigby on
Subscribe to