"AI-Generated Phishing Emails Almost Impossible to Detect, Report Finds"

"AI-Generated Phishing Emails Almost Impossible to Detect, Report Finds"

The potential for cybercriminals to use AI chatbots to create phishing campaigns has been cause for concern, and now security researchers at Egress have found that it is almost impossible to detect AI-generated phishing emails.  The researchers noted that AI detectors cannot tell whether a phishing email has been written by a chatbot or a human in three cases out of four (71.4%).  The researchers stated that the reason for this is due to how AI detectors work.

Submitted by Adam Ekwall on

"Transforming Vulnerability Management: CISA Adds OASIS CSAF 2.0 Standard to ICS Advisories"

"Transforming Vulnerability Management: CISA Adds OASIS CSAF 2.0 Standard to ICS Advisories"

The US Cybersecurity and Infrastructure Security Agency (CISA) has announced that its security advisories for Industrial Control Systems (ICS), Operational Technology (OT), and medical devices now include the OASIS Common Security Advisory Framework (CSAF) Version 2.0 standard to transform the vulnerability management landscape. In the current risk environment, it is difficult for organizations to manage the increasing number and complexity of new vulnerabilities.

Submitted by grigby1 CPVI on

"Recently Patched TeamCity Vulnerability Exploited to Hack Servers"

"Recently Patched TeamCity Vulnerability Exploited to Hack Servers"

According to security researchers at GreyNoise, in-the-wild exploitation of a critical vulnerability in JetBrains’ TeamCity continuous integration and continuous deployment (CI/CD) server started just days after the availability of a patch was announced.  The vulnerability tracked as CVE-2023-42793 impacts the on-premises version of TeamCity, and it allows an unauthenticated attacker with access to a targeted server to achieve remote code execution and gain administrative control of the system.

Submitted by Adam Ekwall on

NSA Codebreaker Challenge 2023: Calling All Student Codebreakers to the Ultimate Challenge!

NSA Codebreaker Challenge 2023: Calling All Student Codebreakers to the Ultimate Challenge!

The National Security Agency (NSA) recently launched the NSA Codebreaker Challenge 2023, igniting the minds of aspiring codebreakers across the nation. Commencing on Thursday, September 28th, and running until December 21st, 2023, this annual competition presents students from U.S.-based academic institutions with the opportunity to showcase their reverse engineering prowess while tackling nine thrilling mission-oriented scenarios. This year's challenge revolves around a problem set rooted in a fictional unknown signals origin, as identified by the U.S. Coast Guard.

Submitted by Jason Gigax on

"Hackers Attack US Healthcare Giant, More Than 190K People Affected"

"Hackers Attack US Healthcare Giant, More Than 190K People Affected"

Prospect Medical Holdings operates over 150 clinics and dozens of hospitals in Southern California, Connecticut, Pennsylvania, and Rhode Island. In a notice sent to impacted clients on September 29, the organization disclosed that an "unauthorized party gained access to its IT network." The attack allegedly occurred between July 31 and August 3 of this year. The company's internal investigation revealed that threat actors accessed files containing employee and dependent information.

Submitted by grigby1 CPVI on

"BunnyLoader: New Malware-as-a-Service Threat Emerges in the Cybercrime Underground"

"BunnyLoader: New Malware-as-a-Service Threat Emerges in the Cybercrime Underground"

Researchers have found BunnyLoader, another Malware-as-a-Service (MaaS) threat, being sold on the cybercrime underground. According to Zscaler ThreatLabz researchers, BunnyLoader provides different functionalities such as downloading and executing a second-stage payload, stealing browser credentials, and more. Its other capabilities include running remote commands on the infected machine, a keylogger to collect keystrokes, and a clipper functionality to monitor the victim's clipboard and replace content matching cryptocurrency wallet addresses with actor-controlled addresses.

Submitted by grigby1 CPVI on

"Meet LostTrust Ransomware — A Likely Rebrand of the MetaEncryptor Gang"

"Meet LostTrust Ransomware — A Likely Rebrand of the MetaEncryptor Gang"

The LostTrust ransomware campaign is believed to be a rebranding of MetaEncryptor, using nearly identical data leak sites and encryptors. LostTrust started attacking organizations in March 2023, but it did not become widely known until September when a data leak site went live. Currently, the site lists 53 victims worldwide, some of whom have already had their data leaked for not paying the demanded ransom. It is unknown whether the ransomware group only targets Windows devices or also uses a Linux encryptor.

Submitted by grigby1 CPVI on

"Johnson Controls Ransomware Attack Could Impact DHS"

"Johnson Controls Ransomware Attack Could Impact DHS"

Sensitive Department of Homeland Security (DHS) information might have been compromised in a recent ransomware attack aimed at government contractor Johnson Controls International.  The cybercrime group claims to have exfiltrated 27TB of sensitive data from Johnson Controls.  The company serves clients in the education, government, healthcare, hospitality, naval, and transportation sectors, including the DoD, DHS, and other government agencies in the US.

Submitted by Adam Ekwall on

"Spyware Vendor Targets Egyptian Orgs With Rare iOS Exploit Chain"

"Spyware Vendor Targets Egyptian Orgs With Rare iOS Exploit Chain"

An Israeli surveillanceware company used the three recently revealed Apple zero-day vulnerabilities to create an exploit chain for iPhones, and a Chrome zero-day to exploit Androids in a novel attack against Egyptian organizations. According to a recent report by Google's Threat Analysis Group (TAG), "Intellexa" used the special access it gained through the exploit chain to install its "Predator" spyware on unidentified targets in Egypt. Predator was initially developed by Cytrox, one of several spyware developers that Intellexa has absorbed in recent years.

Submitted by grigby1 CPVI on

"Global Events Fuel DDoS Attack Campaigns"

"Global Events Fuel DDoS Attack Campaigns"

According to NETSCOUT, cybercriminals launched about 7.9 million Distributed Denial-of-Service (DDoS) attacks in the first half of 2023, a 31 percent increase year-over-year. Recent DDoS attack growth has been fueled by global events such as the Russia-Ukraine war and NATO bids. NETSCOUT observed a global increase of 79 percent in DDoS attacks against wireless telecommunications providers during the second half of 2022.

Submitted by grigby1 CPVI on
Subscribe to