"Digital Emblem for Humanitarian Law in Cyberspace"

"Digital Emblem for Humanitarian Law in Cyberspace"

The International Committee of the Red Cross (ICRC) wants to protect its digital infrastructure and that of humanitarian organizations with a digital emblem in response to warfare increasingly spreading into cyberspace. Cyberattacks on critical digital infrastructure cause more than just financial and logistical harm. They can also have disastrous humanitarian consequences in hospitals. ETH Zurich computer scientists collaborated with ICRC to develop a protective emblem that can be easily and affordably integrated into existing digital systems around the world.

Submitted by Gregory Rigby on

"Security Flaws in Court Record Systems Used in Five US States Exposed Sensitive Legal Documents"

"Security Flaws in Court Record Systems Used in Five US States Exposed Sensitive Legal Documents"

The sensitive legal court filings discovered by security researcher Jason Parker to be exposed to the open Internet for anyone to access, include witness lists, mental health evaluations, detailed allegations of abuse, corporate trade secrets, and more. The court records system, which is the technology stack used to submit and store legal filings for criminal trials and civil legal cases, is at the heart of any judiciary.

Submitted by Gregory Rigby on

"Boosting Faith in the Authenticity of Open Source Software"

"Boosting Faith in the Authenticity of Open Source Software"

A team of researchers developed a new system called Speranza to reassure software consumers that the product they are receiving has not been tampered with and is coming directly from a trusted source. Speranza expands on Sigstore, a system introduced last year to improve software supply chain security. According to the researchers, Speranza ensures that software comes from the correct source without needing developers to reveal personal information such as email addresses. This article continues to discuss the purpose and goals of the Speranza system.

Submitted by Gregory Rigby on

"XDSpy Hackers Attack Military-Industrial Companies in Russia"

"XDSpy Hackers Attack Military-Industrial Companies in Russia"

New research reveals that a cyber espionage group called XDSpy recently targeted Russian military-industrial organizations. Researchers believe XDSpy is a state-controlled threat actor that has been active since 2011, mainly targeting countries in Eastern Europe and the Balkans. According to the Russian cybersecurity company F.A.C.C.T., in the latest XDSpy campaign, hackers attempted to gain access to the systems of a Russian metallurgical enterprise and a research institute involved in developing and producing guided missile weapons.

Submitted by Gregory Rigby on

"Critical Zoom Room Bug Allowed to Gain Access to Zoom Tenants"

"Critical Zoom Room Bug Allowed to Gain Access to Zoom Tenants"

AppOms researchers discovered a vulnerability in Zoom Room while participating in the HackerOne live hacking event H1-4420. Zoom Room, a Zoom video conferencing platform feature, aims to enhance collaboration in physical meeting spaces, such as conference rooms or huddle rooms. The researchers warned that the vulnerability, discovered in June 2023, could allow an attacker to hijack a Zoom Room's service account and access the tenant of the victim's organization. Invisible access to confidential information in Team Chat, Whiteboards, and other Zoom applications is also possible.

Submitted by Gregory Rigby on

"Cyber Risk to the UK's Water Network, NCSC Warns"

"Cyber Risk to the UK's Water Network, NCSC Warns"

The UK's National Cyber Security Centre (NCSC) has warned about the active exploitation of Unitronics Programmable Logic Controllers (PLCs) widely used in the water sector. Following a similar alert from the US Cybersecurity and Infrastructure Security Agency (CISA), the NCSC recommends that organizations follow its advice.

Submitted by Gregory Rigby on

CyberForge 2024

"CyberForge is a 2-day conference and capture-the-flag (CTF) competition event that is hosted by the Coastal Virginia Cybersecurity Student Association (CVCSA), Coastal Virginia Commonwealth Cyber Initiative (COVA CCI), and a local college/university's cybersecurity club. Cyberforge 2024 will be hosted with Tidewater Community College's cybersecurity club. This event aims to provide anyone interested in cybersecurity to come and hear from cyber professionals to increase their knowledge as well as enhance their skills by competing in the CTF competition."

"US And Allies Sanction Kimsuky Actors"

"US And Allies Sanction Kimsuky Actors"

The US government, together with foreign partners, sanctioned alleged members of Kimsuky, the North Korean state-sponsored hacking group suspected of conducting numerous campaigns against entities in the US, South Korea, Russia, Japan, and many European countries. According to the US Department of the Treasury, Kimsuky is a cyber espionage and Advanced Persistent Threat (APT) group associated with the North Korean government, with the goal of stealing intellectual property, cryptocurrency, and other valuable assets to support the government's weapons programs.

Submitted by Gregory Rigby on

"Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats"

"Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats"

The FBI and the US Department of Justice (DOJ) recently collaborated to take down the Qakbot malware and botnet in a multinational operation. Although the operation successfully disrupted this threat, Qakbot may still pose a threat in a reduced form. The malware had infected many devices, with 700,000 machines worldwide, including 200,000 computers in the US. This article continues to discuss the aftermath of the collaborative Qakbot disruption, mitigation strategies, and advice on determining past infections.

Submitted by Gregory Rigby on

"Apple Patches Actively Exploited iOS Zero-Days"

"Apple Patches Actively Exploited iOS Zero-Days"

Apple has been forced to patch yet another pair of zero-day vulnerabilities, bringing the total for the year to 20.  The tech giant stated that the two bugs in its WebKit browser engine were being actively exploited in the wild.  The first vulnerability, CVE-2023-42916, is found in a range of Apple products: iPhone XS and later, iPad Pro 12.9-inch 2nd generation and later, iPad Pro 10.5-inch, iPad Pro 11-inch 1st generation and later, iPad Air 3rd generation and later, iPad 6th generation and later, and iPad mini 5th generation and later.

Submitted by Adam Ekwall on
Subscribe to