Tue.Oct 11, 2022

article thumbnail

Inserting a Backdoor into a Machine-Learning System

Schneier on Security

Interesting research: “ ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks , by Tim Clifford, Ilia Shumailov, Yiren Zhao, Ross Anderson, and Robert Mullins: Abstract : Early backdoor attacks against machine learning set off an arms race in attack and defence development. Defences have since appeared demonstrating some ability to detect backdoors in models or even remove them.

article thumbnail

Microsoft Patch Tuesday, October 2022 Edition

Krebs on Security

Microsoft today released updates to fix at least 85 security holes in its Windows operating systems and related software, including a new zero-day vulnerability in all supported versions of Windows that is being actively exploited. However, noticeably absent from this month’s Patch Tuesday are any updates to address a pair of zero-day flaws being exploited this past month in Microsoft Exchange Server.

DNS 256
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook warns of 400 malicious apps that tried to steal your account credentials

Tech Republic Security

Previously available on Apple’s App Store and Google Play, the phony apps impersonated photo editors, games, VPN services and utilities to trick users into sharing their Facebook credentials. The post Facebook warns of 400 malicious apps that tried to steal your account credentials appeared first on TechRepublic.

article thumbnail

LEAKED: Intel’s BIOS Source Code — All 6GB of It

Security Boulevard

Source code for the Intel Alder Lake processor EUFI BIOS has gone walkies. 4chan is said to be involved. The post LEAKED: Intel’s BIOS Source Code — All 6GB of It appeared first on Security Boulevard.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

9 top Dropbox alternatives: Free and premium tools

Tech Republic Security

If you're tired of Dropbox's hidden costs, here are some of the best alternatives to Dropbox that you can use today. The post 9 top Dropbox alternatives: Free and premium tools appeared first on TechRepublic.

Software 143
article thumbnail

Microsoft Addresses Zero-Days, but Exchange Server Exploit Chain Remains Unpatched

Dark Reading

The computing giant didn't fix ProxyNotLogon in October's Patch Tuesday, but it disclosed a rare 10-out-of-10 bug and patched two other zero-days, including one being exploited.

139
139

More Trending

article thumbnail

All Windows versions can now block admin brute-force attacks

Bleeping Computer

Microsoft announced today that IT admins can now configure any Windows system still receiving security updates to automatically block brute force attacks targeting local administrator accounts via a group policy. [.].

article thumbnail

How legacy tech impedes zero trust and what to do about it

CSO Magazine

As organizations embrace the zero-trust security model, legacy tech has created some roadblocks. In fact, replacing or rebuilding existing legacy infrastructures is the biggest challenge to implementing zero trust, according to a recent study. General Dynamics’ 2022 Zero Trust Research Report surveyed 300 IT and program managers across US federal, civilian, and defense agencies, which are mandated to adopt a zero-trust model under a 2021 presidential executive order.

article thumbnail

Why Do You Need Ongoing Vulnerability Assessments?

CyberSecurity Insiders

[ This article was originally published here by Indusface.com ]. There are over 40,756 open vulnerabilities in applications – according to Indusface AppTrana, August-September 2022. 90% of all vulnerabilities are exploitable, even by attackers with little technical knowledge or skills. Given the circumstances, you need to build and maintain a sound security posture.

article thumbnail

Android leaks some traffic even when 'Always-on VPN' is enabled

Bleeping Computer

Mullvad VPN has discovered that Android leaks traffic every time the device connects to a WiFi network, even if the "Block connections without VPN," or "Always-on VPN," features is enabled. [.].

VPN 126
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

Black Basta Ransomware Gang Infiltrates networks via QAKBOT, Brute Ratel, and Cobalt Strike

Trend Micro

We analyzed a QAKBOT-related case leading to a Brute Ratel C4 and Cobalt Strike payload that can be attributed to the threat actors behind the Black Basta ransomware.

article thumbnail

Cloud security is the new battle zone

InfoWorld on Security

Don’t look now. More than 80% of organizations have experienced a security incident on a cloud platform during the past 12 months according to research from Venafi. Most concerning, almost half of those organizations reported at least four incidents during the same period. The study also shows that organizations encountered security incidents due to unauthorized access and misconfigurations.

125
125
article thumbnail

Hey CISO: You Need a Data-Driven Way to Navigate Budgeting Season

Security Boulevard

Articles related to cyber risk quantification, cyber risk management, and cyber resilience. The post Hey CISO: You Need a Data-Driven Way to Navigate Budgeting Season appeared first on Security Boulevard.

CISO 124
article thumbnail

Microsoft Exchange servers hacked to deploy LockBit ransomware

Bleeping Computer

Lockbit ransomware affiliates are encrypting victims via Microsoft Exchange servers hacked using exploits targeting unpatched vulnerabilities. [.].

Hacking 135
article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

New to cookies? Here’s what you need to know (Part 1)

BH Consulting

If you’re a rookie when it comes to cookies, look no further. This two-part blog aims to explain what they are, and why we’re hearing so much about them these days. We’ll give a rundown of cookie requirements, consent, and what organisations must do to make sure their cookies comply with the EU GDPR (and why that matters). What are cookies? Cookies are small text files that organisations’ websites or apps place on your device as you’re browsing.

article thumbnail

Critical VM2 flaw lets attackers run code outside the sandbox

Bleeping Computer

Researchers are warning of a critical remote code execution flaw in 'vm2', a JavaScript sandbox library downloaded over 16 million times per month via the NPM package repository. [.].

121
121
article thumbnail

VMware has yet to fix CVE-2021-22048 flaw in vCenter Server disclosed one year ago

Security Affairs

VMware has yet to address the CVE-2021-22048 privilege escalation vulnerability in vCenter Server disclosed in November 2021. VMware warns customers that it has yet to address a high-severity privilege escalation vulnerability, tracked as CVE-2021-22048 , in the vCenter Server. The flaw was disclosed in November 2021, it resides in the vCenter Server ‘s IWA (Integrated Windows Authentication) mechanism.

article thumbnail

This Thermal Attack Can Crack Your Password in Just a Few Seconds

Heimadal Security

Computer security researchers have developed a thermal attack technique combining thermal imaging and AI. It uses an AI-driven system that can guess your password by inspecting the heat signatures left by fingertips when entering data on keyboards and screens. This could discover computer or smartphone passwords in seconds, and it is a warning about how […].

Passwords 115
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

LockBit affiliates compromise Microsoft Exchange servers to deploy ransomware

Security Affairs

Lockbit ransomware affiliates are compromising Microsoft Exchange servers to deploy their ransomware, experts warn. South-Korean cybersecurity firm AhnLab reported that Lockbit ransomware affiliates are distributing their malware via compromised Microsoft Exchange servers. In July 2022, two servers operated by a customer of the security firm were infected with LockBit 3.0 ransomware. .

article thumbnail

More Details of macOS Archive Utility Flaw Emerge

Security Boulevard

Now that Apple has addressed a vulnerability in its macOS Archive Utility that could run malicious apps around Apple security, security researchers have released additional details about the flaw. The vulnerability, designated CVE-2022-32910, “could lead to the execution of an unsigned and unnotarized application without displaying security prompts to the user, by using a specially.

Malware 113
article thumbnail

VMware vCenter Server bug disclosed last year still not patched

Bleeping Computer

VMware informed customers today that vCenter Server 8.0 (the latest version) is still waiting for a patch to address a high-severity privilege escalation vulnerability disclosed in November 2021. [.].

113
113
article thumbnail

Google acquired Cloud companies now come under one Security umbrella

CyberSecurity Insiders

Google has launched Chronicle Security Operations to bring down its latest two acquisitions Mandiant and Siemplify under one umbrella. The internet juggernauts plan is to bring all its cybersecurity related purchases under one roof, so that its response to threats might pick up with speed, scale and intelligence. Chronicle Security Operations is a cloud-based software suite that was born on October 11th,2022 and is better enabled to respond to threats and investigate proactively.

article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Toyota Discloses Data Breach Impacting Source Code

Hacker Combat

Toyota, a Japanese automaker, has identified a security breach involving source code stored on GitHub that may have given third parties access to some 300,000 customer email addresses. According to the firm, the event affects users who subscribe to the T-Connect website. This service offers consumers automobile management tools like finding my car, maintenance reminders, concierge services, vehicle information, and a mobile application.

article thumbnail

Mapping Out Your Enterprise Digital Footprint to Avoid Cyber Risks

CyberSecurity Insiders

By Gerard D’Onofrio, Country Manager, Dialpad Australia. Most people have an approximate idea of what a digital footprint is. They know that it’s got something to do with the impact a person’s identity has on the internet. What most don’t realize is the potential extent of a digital footprint. They’re not dainty little deer hoofprints. They’re large hippo prints.

article thumbnail

Ransomware Group Uses Vulnerability to Bypass EDR Products

eSecurity Planet

The BlackByte ransomware group is actively exploiting a vulnerability in RTCore32.sys and RTCore64.sys, the drivers of a widely used graphic card utility called Micro-Star MSI AfterBurner (version 4.6.2.15658). Recorded as CVE-2019-16098 , the flaw allows any authenticated user to read and write to arbitrary memory, I/O ports and MSR control registers.

article thumbnail

Inserting a Backdoor into a Machine-Learning System

Security Boulevard

Interesting research: “ ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks , by Tim Clifford, Ilia Shumailov, Yiren Zhao, Ross Anderson, and Robert Mullins: Abstract : Early backdoor attacks against machine learning set off an arms race in attack and defence development. Defences have since appeared demonstrating some ability to detect backdoors in models or even remove them.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

AI and Residual Finger Heat Could Be a Password Cracker's Latest Tools

Dark Reading

New research demonstrates the use of thermal camera images of keyboards and screens in concert with AI to correctly guess computer passwords faster and more accurately.

Passwords 105
article thumbnail

Major US Airports’ Sites Are Down, Pro-Russian Hackers Claim the Attack

Heimadal Security

The pro-Russian hacktivist group ‘KillNet’ claims large-scale distributed denial-of-service (DDoS) attacks on the websites of several major airports in the United States, making them inoperable. Travelers are unable to connect and receive updates about their scheduled flights or book airport services because the servers hosting these sites are being overloaded by garbage requests as a result […].

DDOS 98
article thumbnail

Researchers Warn of New Phishing-as-a-Service Being Used by Cyber Criminals

The Hacker News

Cyber criminals are using a previously undocumented phishing-as-a-service (PhaaS) toolkit called Caffeine to effectively scale up their attacks and distribute nefarious payloads.

article thumbnail

Types of Multi-Factor Authentication (MFA)

Security Boulevard

In the first blog post within our Cybersecurity Awareness Month series, we talked about the. The post Types of Multi-Factor Authentication (MFA) appeared first on Entrust Blog. The post Types of Multi-Factor Authentication (MFA) appeared first on Security Boulevard.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.