ISMG Virtual Government Cybersecurity Summit

"The 2024 ISMG Virtual Government Cybersecurity Summit hosted by GovInfoSecurity will address essential themes pivotal to the future of cybersecurity across both the public and private sectors. A key focus will be the importance of partnerships between government and industry to build cyber resilience through trust-building, information sharing, and enhanced incident response. Additionally, the summit will delve into Russia’s Hybrid Cyber Warfare, analyzing how Russian state-sanctioned groups like Cozy Bear and Lockbit have targeted U.S.

Intel IT Modernization Summit

"The 8th Annual Intel IT Modernization Summit will convene senior level experts, policymakers, and innovators from across the intelligence community, Military services, U.S. government, and industry to highlight advanced technologies and strategies aimed at modernizing IT infrastructure to ensure robust intelligence capabilities. The 2024 Summit will highlight current and future strategies and collaborations to drive transformation of the DoD and the IC’s digital landscape through innovative IT solutions."

"So Far, Cybercriminals Appear to Be Just Shopping Around for a Telegram Alternative"

"So Far, Cybercriminals Appear to Be Just Shopping Around for a Telegram Alternative"

Intel 471 researchers say most cybercriminals may stay with Telegram despite the app becoming less friendly for them. According to Intel 471, several hacker seemed have had plans to switch platforms after Telegram founder Pavel Durov's arrest and pledge to fight illegal activity on the app. Due to its convenience and reach, the researchers believe most cybercriminals who use the app will stay on it.

Submitted by Gregory Rigby on

"CRI Releases Guidance on Avoiding Ransomware Payments"

"CRI Releases Guidance on Avoiding Ransomware Payments"

The Counter Ransomware Initiative (CRI) has released new guidance to encourage organizations to consider other options before giving in to cybercriminals' ransomware demands. The new guidance aims to minimize the impact of a ransomware incident as well as reduce the number and size of ransoms paid by victims. The guidance discourages businesses from paying but acknowledges that there are situations where victims may be pressured to pay. However, the UK government does not condone ransom payments.

Submitted by Gregory Rigby on

"Thousands of DrayTek Routers at Risk From 14 Vulnerabilities"

"Thousands of DrayTek Routers at Risk From 14 Vulnerabilities"

Tens of thousands of DrayTek routers, including models used by many businesses and government agencies, are at risk of attack due to 14 newly discovered firmware vulnerabilities. Several flaws could lead to Denial-of-Service (DoS) and Remote Code Execution (RCE) attacks. The other vulnerabilities enable threat actors to carry out data theft, session hijacking, and other malicious activities. This article continues to discuss the vulnerabilities impacting thousands of DrayTek routers.

Submitted by Gregory Rigby on

"Ransomware Hits Critical Infrastructure Hard, Costs Adding Up"

"Ransomware Hits Critical Infrastructure Hard, Costs Adding Up"

Claroty surveyed 1,100 cybersecurity professionals responsible for securing Cyber-Physical Systems (CPS), including Operational Technology (OT), Internet of Things (IoT), Building Management Systems (BMS), and more. The survey found that 45 percent of organizations suffered losses of $500,000 or more in the past year, and 27 percent faced losses of $1 million or more.

Submitted by Gregory Rigby on

"DPRK's APT37 Targets Cambodia With Khmer, 'VeilShell' Backdoor"

"DPRK's APT37 Targets Cambodia With Khmer, 'VeilShell' Backdoor"

The North Korean state-sponsored threat actor known as "APT37" is spreading a new backdoor named "VeilShell." Most North Korean Advanced Persistent Threats (APTs) target South Korean or Japanese organizations, but APT37's latest campaign appears to target Cambodia, a country Kim Jong-Un has more complicated relations with. According to Securonix, APT37 has been sending malicious emails in the Khmer language about Cambodian affairs to attract victims.

Submitted by Gregory Rigby on

"Cybercriminals Capitalize on Poorly Configured Cloud Environments"

"Cybercriminals Capitalize on Poorly Configured Cloud Environments"

Researchers at Elastic found that off-the-shelf offensive security tools and poorly configured cloud environments expand the attack surface. About 54 percent of malware alerts involved offensive security tools such as Cobalt Strike and Metasploit. The most prevalent malware family this year was Cobalt Strike, with 27.02 percent of infections. Cobalt Strike is a commercial post-exploitation framework that threat actors often steal and use for their own malicious activities.

Submitted by Gregory Rigby on

"NJIT PhD Researcher Develops Secure Code Generation System, Achieves Early Conference Acceptance"

"NJIT PhD Researcher Develops Secure Code Generation System, Achieves Early Conference Acceptance"

Security vulnerabilities are a major issue in Artificial Intelligence (AI)-powered code generation. Therefore, Khiem Ton, a Ph.D. student, and his colleagues at the New Jersey Institute of Technology (NJIT) developed "SGCode," a system that uses advanced AI and security analysis tools to detect and fix security flaws during code creation. SGCode includes Large Language Models (LLMs) such as GPT-4, a graph-based Generative Adversarial Network (gGAN), and security analysis tools. The flexible system lets users switch between code security optimization methods.

Submitted by Gregory Rigby on

"Cloudflare Blocks Largest Recorded DDoS Attack Peaking at 3.8Tbps"

"Cloudflare Blocks Largest Recorded DDoS Attack Peaking at 3.8Tbps"

In a Distributed Denial-of-Service (DDoS) campaign aimed at financial services, Internet, and telecommunications companies, volumetric attacks peaked at 3.8 terabits per second (Tbps), the largest publicly recorded. The campaign involved over 100 hyper-volumetric DDoS attacks that flooded network infrastructure with garbage data. A volumetric DDoS attack overwhelms the target with large amounts of data, consuming bandwidth or exhausting the resources of applications and devices, denying legitimate users access.

Submitted by Gregory Rigby on
Subscribe to