Fri.Jul 28, 2023

article thumbnail

Indirect Instruction Injection in Multi-Modal LLMs

Schneier on Security

Interesting research: “ (Ab)using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs “: Abstract: We demonstrate how images and sounds can be used for indirect prompt and instruction injection in multi-modal LLMs. An attacker generates an adversarial perturbation corresponding to the prompt and blends it into an image or audio recording.

article thumbnail

Weekly Update 358

Troy Hunt

IoT, breaches and largely business as usual so I'll skip that in the intro to this post and jump straight to the end: the impending HIBP domain search changes. As I say in the vid, I really value people's feedback on this so if nothing else, please skip through to 48:15, listen to that section and let me know what you think. By the time I do next week's vid my hope is that all the coding work is done and I'm a couple of days out from shipping it, so now is your time to provid

IoT 204
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

HackerOne: How Artificial Intelligence Is Changing Cyber Threats and Ethical Hacking

Tech Republic Security

Security experts from HackerOne and beyond weigh in on malicious prompt engineering and other attacks that could strike through LLMs.

article thumbnail

Twitter's rebranding to 'X' triggers Microsoft Edge security alert

Bleeping Computer

Microsoft Edge web browser has been displaying security warnings after Twitter changed its name to 'X'. It's got to do with a security feature dubbed 'Progressive Web App Icon change', designed to keep users safe during app icon or name changes. [.

98
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

OpenAI, Microsoft, Google, Anthropic Launch Frontier Model Forum to Promote Safe AI

Tech Republic Security

The forum's goal is to establish "guardrails" to mitigate the risk of AI. Learn about the group's four core objectives, as well as the criteria for membership.

Risk 148
article thumbnail

Russian APT BlueBravo targets diplomatic entities with GraphicalProton backdoor

Security Affairs

Russia-linked BlueBravo has been spotted targeting diplomatic entities in Eastern Europe with the GraphicalProton Backdoor. The Russia-linked threat-state actor BlueBravo (aka APT29 , Cloaked Ursa, and Midnight Blizzard, Nobelium ) has been observed targeting diplomatic entities throughout Eastern Europe. The group was observed conducting a spear-phishing campaign with the end goal of infecting recipients with a new backdoor called GraphicalProton.

LifeWorks

More Trending

article thumbnail

CoinsPaid blames North Korea-linked APT Lazarus for theft of $37M worth of cryptocurrency

Security Affairs

Crypto-payments service provider CoinsPaid suffered a cyber attack that resulted in the theft of $37,200,000 worth of cryptocurrency. CoinsPaid, a crypto-payment service provider, fell victim to a cyber attack, leading to the theft of $37,200,000 worth of cryptocurrency. The company attributes the cyber heist to the North Korea-linked APT Lazarus , which is also responsible for the attacks against Axie Infinity (USD 625M), Horizon Bridge (USD 100M), Atomic Wallet (USD 100M) and Alphapo (USD 23M)

article thumbnail

Hackers Abusing Windows Search Feature to Install Remote Access Trojans

The Hacker News

A legitimate Windows search feature is being exploited by unknown malicious actors to download arbitrary payloads from remote servers and compromise targeted systems with remote access trojans such as AsyncRAT and Remcos RAT.

98
article thumbnail

Monitor Insider Threats but Build Trust First

Security Affairs

The issue of how to prevent insider threats without infringing on employee privacy is one that has been a hot topic of debate in recent years. Because insider threats are uniquely challenging to detect and identify, different methods are needed than traditional detection based on signatures or other known threat triggers. Tools that are designed to detect insider threats are more effective, but also bring up questions related to the level of monitoring necessary and employees’ right to a certain

article thumbnail

Android Foils AirTag Stalkers and Thieves — While Apple Does Nothing

Security Boulevard

C’mon Cupertino: “Unknown Tracker Detected,” your phone screams. What now? The post Android Foils AirTag Stalkers and Thieves — While Apple Does Nothing appeared first on Security Boulevard.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Anomaly detection in certificate-based TGT requests

SecureList

One of the most complex yet effective methods of gaining unauthorized access to corporate network resources is an attack using forged certificates. Attackers create such certificates to fool the Key Distribution Center (KDC) into granting access to the target company’s network. An example of such an attack is the Shadow Credentials technique, which lets an attacker sign in under a user account by modifying the victim’s msDS-KeyCredentialLink attribute and adding an authorization cert

article thumbnail

DNS Protection: A Must-Have Defense Against Cyber Attacks

Heimadal Security

Picture this scenario: you’re browsing the internet, going about your business, when suddenly a malicious website pops up out of nowhere. Your heart races as you realize that your sensitive data and personal information may be at risk. You scramble to find a solution to protect yourself and your company from these cyber threats. Enter […] The post DNS Protection: A Must-Have Defense Against Cyber Attacks appeared first on Heimdal Security Blog.

DNS 98
article thumbnail

A Data Exfiltration Attack Scenario: The Porsche Experience

The Hacker News

As part of Checkmarx's mission to help organizations develop and deploy secure software, the Security Research team started looking at the security posture of major car manufacturers. Porsche has a well-established Vulnerability Reporting Policy (Disclosure Policy)[1], it was considered in scope for our research, so we decided to start there, and see what we could find.

article thumbnail

Senator Wyden: Microsoft is Responsible for China-Linked Group’s Hack

Security Boulevard

US Senator Ron Wyden (D-OR) is asking government enforcement agencies to hold Microsoft responsible for the hack by a Chinese-linked threat group that reportedly led to hundreds of thousands of emails from top US officials being stolen and was caused by the IT giant’s “negligent cybersecurity practices.” In a sharply worded letter this week to. The post Senator Wyden: Microsoft is Responsible for China-Linked Group’s Hack appeared first on Security Boulevard.

Hacking 98
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

IcedID Malware Adapts and Expands Threat with Updated BackConnect Module

The Hacker News

The threat actors linked to the malware loader known as IcedID have made updates to the BackConnect (BC) module that's used for post-compromise activity on hacked systems, new findings from Team Cymru reveal.

Malware 98
article thumbnail

Nitrogen Campaign Starts with Fake Ads, Ends with Ransomware

Security Boulevard

Threat actors are using bogus advertisements for IT tools on sites like Google and Microsoft’s Bing in hopes of luring tech users to inadvertently download malware that kicks off an attack that eventually leads to ransomware like BlackCat. The hackers use the Nitrogen malware to get initial access into corporate networks, leading to a second. The post Nitrogen Campaign Starts with Fake Ads, Ends with Ransomware appeared first on Security Boulevard.

article thumbnail

U.S. Government Contractor Maximus Hit by Massive Data Breach

Heimadal Security

U.S. government service contracting giant Maximus has disclosed a data breach warning that threat actors stole the personal data (including Social Security numbers and protected health information) of 8 to 11 million people by exploiting a vulnerability in MOVEit Transfer. Maximus is a contractor that oversees and runs US government-sponsored initiatives, such as student loan […] The post U.S.

article thumbnail

6 Consensus Principles for Cyber Risk Governance: A Roadmap for Boards

SecureWorld News

Cybersecurity is no longer just a technical issue; it's a strategic business enabler. A study by PwC found that 52% of companies made significant progress in improving customer trust over the past three years through strengthened cybersecurity practices. And a report by the World Economic Forum estimates that the global cost of cybercrime could reach $10.5 trillion by 2025.

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

40,000 HRM Enterprises Clients Had Their Credit Card Information Stolen Following Cyberattack

Heimadal Security

HRM Enterprises, Inc., the owner of the US’s largest independent hardware store, was recently the victim of a cyberattack where the credit card information of more than 40,000 clients was stolen. Based in Hartville, Ohio, HRM Enterprises, Inc. is a group of businesses that revolve around the biggest independent hardware store in the nation. Client […] The post 40,000 HRM Enterprises Clients Had Their Credit Card Information Stolen Following Cyberattack appeared first on Heimdal Security Bl

article thumbnail

What to Expect at STRONGER 2023

Security Boulevard

In an increasingly digitalized world, the significance of cybersecurity cannot be overstated. Cyber threats continue to evolve, posing immense challenges to organizations of all sizes. To stay ahead of these threats, professionals and businesses need to arm themselves with knowledge, skills, and innovative solutions. STRONGER, a fully free and virtual cybersecurity conference , aims to gather the cyber community together for an event that fosters collaboration, delivers top-of-mind industry insi

article thumbnail

The Road to Redemption: Ransomware Recovery Strategies for Businesses

Heimadal Security

Ransomware attacks have become one of the most significant cybersecurity threats facing businesses and organizations today. These malicious attacks encrypt valuable data, rendering it inaccessible to users until a ransom is paid to the attackers. Despite investing in robust cybersecurity measures, organizations are not immune to ransomware attacks, as cybercriminals constantly evolve their tactics; therefore, […] The post The Road to Redemption: Ransomware Recovery Strategies for Business

article thumbnail

How Apple fixed what Microsoft hasn't, with Thomas Reed: Lock and Code S04E16

Malwarebytes

Earlier this month, a group of hackers was spotted using a set of malicious tools—that originally gained popularity with online video game cheaters—to hide their Windows-based malware from being detected. Sounds unique, right? Frustratingly, it isn't, as the specific security loophole that was abused by the hackers has been around for years, and Microsoft's response, or lack thereof, is actually a telling illustration of the competing security environments within Windows and macOS.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

Dark Power Ransomware Abusing Vulnerable Dynamic-Link Libraries in Resolved API Flow

Heimadal Security

In a previously-published material, Heimdal® has analyzed the emergent Dark Power malware – a ransomware strain written in the NIM programming and capable leveraging advanced encryption techniques such as CTR for a better stranglehold on the victim’s device and, implicitly, the hosted data. Open-source threat intelligence feeds shed very little insight on the preferred vector […] The post Dark Power Ransomware Abusing Vulnerable Dynamic-Link Libraries in Resolved API Flow appeared fi

article thumbnail

Zimbra issues awaited patch for actively exploited vulnerability

Malwarebytes

Two weeks ago, we urged readers to apply a workaround for an actively exploited vulnerability in Zimbra Collaboration Suite (ZCS) email servers. Zimbra has released ZCS 10.0.2 that fixes two security issues, including the known bug that could lead to exposure of internal JSP and XML files. Zimbra is an open source webmail application used for messaging and collaboration.

Backups 97
article thumbnail

How to Prioritize Vulnerabilities Effectively: Vulnerability Prioritization Explained

Heimadal Security

What Is Vulnerability Prioritization? Vulnerability prioritization is the process of identifying and ranking vulnerabilities based on the potential impact on the business, ease of exploitability, and other contextual factors. It represents one of the key steps in the vulnerability management process, as it sets the foundation for the next steps of the process.

97
article thumbnail

5 Top Data Center Infrastructure Management (DCIM) Trends

Security Boulevard

Data center infrastructure management (DCIM) is the process of monitoring, managing and optimizing the physical and logical components of a data center, such as servers, storage, network, power, cooling and security. DCIM software helps data center operators to improve efficiency, reduce costs, enhance performance and ensure availability of their IT services.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Apple Sets New Rules for Developers to Prevent Fingerprinting and Data Misuse

The Hacker News

Apple has announced plans to require developers to submit reasons to use certain APIs in their apps starting later this year with the release of iOS 17, iPadOS 17, macOS Sonoma, tvOS 17, and watchOS 10 to prevent their abuse for data collection. "This will help ensure that apps only use these APIs for their intended purpose," the company said in a statement.

article thumbnail

What Is Secure Remote Access?

Heimadal Security

Secure remote access is an effective approach to cybersecurity that combines multiple technologies, such as encryption, multifactor authentication (MFA), VPNs, and endpoint protection, among others, to safeguard an organization’s network, mission-critical systems, or sensitive data from unauthorized access. Its strength is in its flexibility, offering customized levels of access based on individual roles and responsibilities […] The post What Is Secure Remote Access?

article thumbnail

Ivanti Warns of Another Endpoint Manager Mobile Vulnerability Under Active Attack

The Hacker News

Ivanti has disclosed yet another security flaw impacting Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core, that it said has been weaponized as part of an exploit chain by malicious actors in the wild. The new vulnerability, tracked as CVE-2023-35081 (CVSS score: 7.8), impacts supported versions 11.10, 11.9, and 11.8, as well as those that are currently end-of-life (EoL).

Mobile 96
article thumbnail

Data Loss Prevention for Small and Medium-Sized Businesses

IT Security Guru

Hybrid work models and broadly adopted cloud technology disperse operations extensively; data is moved, stored, and accessed from highly distributed locations. Within such a disseminated environment, cybersecurity hygiene concerns businesses and organisations, especially nowadays, where highly skilled cybercriminals become more active, and their attacks are predicted to intensify further and increase the cost at a 15% annual rate.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!