"Computer Scientists Awarded $3M to Bolster Cybersecurity"

"Computer Scientists Awarded $3M to Bolster Cybersecurity"

The Defense Advanced Research Projects Agency (DARPA), the research and development agency of the US Department of Defense (DOD), has awarded a team of computer scientists at Cornell University a $3 million grant in support of using reinforcement learning to make computer networks more robust, dynamic, and secure. The researchers hope that their project titled LANCER (LeArning Network CybERagents) will result in more intelligent and dynamic defenses for cybersecurity professionals in the ongoing cat-and-mouse game between attackers and defenders.

Submitted by Gregory Rigby on

"Building More Cyber-Resilient Satellites Begins With a Strong Network"

"Building More Cyber-Resilient Satellites Begins With a Strong Network"

Nation-states are prioritizing seizing control of another nation's satellite infrastructure and destroying or disabling it in today's global cyber cold war. Interrupting a rival nation's satellites halts real-time communications, the situational awareness of military operating units, and navigation. For national security, satellites and space access are critical. By 2030, about 1,700 satellites will be launched annually.

Submitted by Gregory Rigby on

"EU Urged to Reconsider Cyber Resilience Act's Bug Reporting Within 24 Hours"

"EU Urged to Reconsider Cyber Resilience Act's Bug Reporting Within 24 Hours"

Security professionals and researchers from ESET, Rapid7, the Electronic Frontier Foundation (EFF), and more, have expressed concerns over the European Union (EU) requiring software publishers to disclose unpatched vulnerabilities to government agencies within 24 hours of exploitation.

Submitted by Gregory Rigby on

"Your Cheap Android TV Streaming Box May Have a Dangerous Backdoor"

"Your Cheap Android TV Streaming Box May Have a Dangerous Backdoor"

Earlier this year, security researcher Daniel Milisic discovered that an inexpensive Android TV streaming box called the T95 came infected with malware, and multiple other researchers confirmed his findings. The cybersecurity company Human Security has recently revealed new information regarding the scope of infected devices as well as the hidden, interconnected fraud schemes linked to streaming boxes. Researchers at Human Security discovered seven Android TV boxes and one tablet with the backdoors installed.

Submitted by Gregory Rigby on

"Atlassian Ships Urgent Patch for Exploited Confluence Zero-Day"

"Atlassian Ships Urgent Patch for Exploited Confluence Zero-Day"

Business software maker Atlassian recently called immediate attention to a major security defect in its Confluence Data Center and Server products and warned that the issue has already been exploited as zero-day in the wild.  Atlassian confirmed that “a handful of customers” were hit by exploits targeting a remotely exploitable flaw in Confluence Data Center and Server instances.  The vulnerability tracked as CVE-2023-22515 is described as a remotely exploitable privilege escalation issue affecting on-prem instances of Confluence Server and Confluence Data Center.

Submitted by Adam Ekwall on

"Phishing Campaign Targeted US Executives Exploiting a Flaw in Indeed Job Search Platform"

"Phishing Campaign Targeted US Executives Exploiting a Flaw in Indeed Job Search Platform"

According to Menlo Security researchers, threat actors have used an open redirection vulnerability contained by the Indeed job search platform to carry out phishing attacks. The phishing attacks targeted senior executives in banking, finance, insurance, real estate, manufacturing, and other industries. The campaign was observed between July and August, with threat actors using the phishing kit known as EvilProxy. EvilProxy actors use Reverse Proxy and Cookie Injection to circumvent two-factor authentication (2FA).

Submitted by Gregory Rigby on

"ChatGPT 'Not a Reliable' Tool for Detecting Vulnerabilities in Developed Code"

"ChatGPT 'Not a Reliable' Tool for Detecting Vulnerabilities in Developed Code"

According to a new report by NCC Group that examines various Artificial Intelligence (AI) cybersecurity use cases, generative AI, particularly ChatGPT, should not be considered a reliable resource for detecting vulnerabilities in developed code without human expert oversight. However, Machine Learning (ML) models show significant promise for helping detect zero-day attacks.

Submitted by Gregory Rigby on

"Qualcomm Patches 3 Zero-Days Reported by Google"

"Qualcomm Patches 3 Zero-Days Reported by Google"

US chip giant Qualcomm recently announced patches for over two dozen product vulnerabilities, including three zero-days reported by Google cybersecurity units.  Qualcomm learned from Google's Threat Analysis Group and Google Project Zero that flaws tracked as CVE-2023-33106, CVE-2023-33107, CVE-2023-33063, and CVE-2022-22071 "may be under limited, targeted exploitation." No information has been shared on the attacks exploiting these vulnerabilities, but the fact that they were reported by Google suggests that they may have been exploited by commercial spyware vendors.

 

Submitted by Adam Ekwall on

"NSA and ESF Partners Release Report on MFA and SSO Challenges"

"NSA and ESF Partners Release Report on MFA and SSO Challenges"

The National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and industry partners have released a Cybersecurity Technical Report (CTR) titled "Developer and Vendor Challenges to Identity and Access Management" to provide multi-factor authentication (MFA) and single sign-on (SSO) technology developers and vendors with actionable recommendations to address major challenges with their products.

Submitted by Gregory Rigby on

"Rogue npm Package Deploys Open-Source Rootkit in New Supply Chain Attack"

"Rogue npm Package Deploys Open-Source Rootkit in New Supply Chain Attack"

The discovery of a new deceptive package hidden within the npm package registry that deploys the open-source rootkit r77 marks the first time a malicious package has provided rootkit functionality. The package is node-hide-console-windows, and it imitates the legitimate npm package node-hide-console-window as part of a typosquatting campaign. It was downloaded 704 times in the previous two months before being removed. According to ReversingLabs, which detected the activity in August 2023, the package downloaded a Discord bot that facilitated the planting of the open-source rootkit r77.

Submitted by Gregory Rigby on
Subscribe to