"Rise in Automated Attacks Troubles E-commerce Industry"

"Rise in Automated Attacks Troubles E-commerce Industry"

According to Imperva, the leading threat to online retailers is automated attacks conducted through sophisticated bad bots against application business logic. Other significant threats to online retailers include account takeover, Distributed Denial-of-Service (DDoS), Application Programming Interface (API) abuse, and client-side attacks. Online retailers are built on an extensive network of API connections and third-party dependencies, making them vulnerable to a range of attacks.

Submitted by Gregory Rigby on

"CISA Warns of Actively Exploited Windows, Sophos, and Oracle Bugs"

"CISA Warns of Actively Exploited Windows, Sophos, and Oracle Bugs"

The Cybersecurity and Infrastructure Security Agency (CISA) has added three security issues affecting Microsoft devices, a Sophos product, and an Oracle enterprise solution to its catalog of Known Exploited Vulnerabilities (KEV). The KEV catalog contains flaws that have been confirmed to be exploited by hackers in attacks. It serves as a repository for vulnerabilities that companies worldwide should prioritize.

Submitted by Gregory Rigby on

"Intel Patches Reptar Vulnerability in Intel Processors, Which Can Cause Data Theft"

"Intel Patches Reptar Vulnerability in Intel Processors, Which Can Cause Data Theft"

Intel has patched the Reptar vulnerability Google security researchers found in its CPUs that could lead to data theft or DNS attacks. According to researchers, the Reptar flaw is a "redundant prefix" issue. When hackers execute a REP MOVSB instruction with a redundant REX prefix in an Intel processor, the chip manufacturer warns in an advisory that it can result in unpredictable system behavior. This can then cause the system to crash or hang. In some cases, it can also result in the escalation of privileges.

Submitted by Gregory Rigby on

"CISA, FBI Warn of Scattered Spider Expertise With Social Engineering, SIM Swapping"

"CISA, FBI Warn of Scattered Spider Expertise With Social Engineering, SIM Swapping"

The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) are warning about a group of hackers known as Scattered Spider, who have disrupted some of the country's largest companies through social engineering and other methods. The hacking group, also known as Starfraud, UNC3944, Scatter Swine, and Muddled Libra, has recently made headlines for alleged attacks on MGM Resorts and Caesars Entertainment. The FBI and CISA supported research from cybersecurity experts on how the group works in a recent advisory and press roundtable.

Submitted by Gregory Rigby on

"CSA Launches First Zero Trust Certification"

"CSA Launches First Zero Trust Certification"

The Cloud Security Alliance (CSA) has recently introduced the Certificate of Competence in Zero Trust (CCZT), the industry’s inaugural authoritative zero trust certification.  CSA noted that the certification responds to the evolving landscape of pervasive technology and the inadequacy of legacy security models.  It aims to equip security professionals with the knowledge necessary to develop and implement a zero trust strategy.

Submitted by Adam Ekwall on

"British Library: Ransomware Recovery Could Take Months"

"British Library: Ransomware Recovery Could Take Months"

One of the world’s largest libraries has recently confirmed it was hit by a ransomware attack on October 28 and that it will take weeks or possibly months to fully recover.  The British Library noted that the breach impacted phone lines and on-site services at its main building in London and a separate facility in Yorkshire, as well as access to digital collections, its website, and its digital catalog.  The library stated that it was continuing to experience a major technology outage as a result of a cyberattack.

Submitted by Adam Ekwall on

"Royal Mail to Spend £10m on Ransomware Remediation"

"Royal Mail to Spend £10m on Ransomware Remediation"

Royal Mail has recently revealed a multimillion-pound cost attached to a serious ransomware breach it suffered earlier this year.  The British postal service company was hit by a LockBit affiliate in an incident which caused “severe service disruption” for items sent abroad.  The ransomware group was demanding nearly $80m from the firm to prevent it from leaking its stolen data.  Although Royal Mail refused to pay, in line with law enforcement advice, the operational costs associated with the incident are starting to emerge.

Submitted by Adam Ekwall on

"Unpatched Critical Vulnerabilities Open AI Models to Takeover"

"Unpatched Critical Vulnerabilities Open AI Models to Takeover"

Researchers discovered nearly a dozen critical vulnerabilities in the infrastructure used by Artificial Intelligence (AI) models, along with three high- and two medium-severity bugs, which could put companies at risk as they rush to capitalize on AI. The affected platforms host, deploy, and share Large Language Models (LLMs), as well as other Machine Learning (ML) platforms and AIs. They include Ray, MLflow, ModelDB, and H20 version 3. Protect AI, an ML security company, revealed the findings on November 16 as part of its AI-specific bug bounty program.

Submitted by Gregory Rigby on

"Virginia Tech Opens World’s First Fully Automated AI and Cyberbiosecurity Water Lab"

"Virginia Tech Opens World’s First Fully Automated AI and Cyberbiosecurity Water Lab"

The Artificial Intelligence (AI) and Cyber for Water and Agriculture (ACWA) lab at Virginia Tech is the world's first to combine cyberbiosecurity and AI automation to research water security. The multidisciplinary lab, led by a team of AI experts, seeks to protect the world's water resources from cyberattacks such as the one faced by a water treatment facility in Oldsmar, Florida, in 2021. During the attack, a sensor that measures the amount of sodium hydroxide in the water was compromised.

Submitted by Gregory Rigby on

"Children’s Tablet Has Malware and Exposes Kid’s Data, Researcher Finds"

"Children’s Tablet Has Malware and Exposes Kid’s Data, Researcher Finds"

Alexis Hancock, who works at the Electronic Frontier Foundation (EFF), discovered that the Dragon Touch KidzPad Y88X, a children's tablet, had security and privacy flaws that could have risked her daughter's and other children's data. According to Hancock, the tablet contains traces of well-known malware, runs a version of Android released five years ago, arrives pre-loaded with other software considered malware, and more. This article continues to discuss findings from the researcher's analysis of the Dragon Touch tablet and responses to her discovery. 

Submitted by Gregory Rigby on
Subscribe to