Mon.May 15, 2023

article thumbnail

The AI Attack Surface Map v1.0

Daniel Miessler

Introduction Purpose Components Attacks Discussion Summary Introduction This resource is a first thrust at a framework for thinking about how to attack AI systems. At the time of writing, GPT-4 has only been out for a couple of months, and ChatGPT for only 6 months. So things are very early. There has been, of course, much content on attacking pre-ChatGPT AI systems, namely how to attack machine learning implementations.

article thumbnail

Micro-Star International Signing Key Stolen

Schneier on Security

Micro-Star International—aka MSI—had its UEFI signing key stolen last month. This raises the possibility that the leaked key could push out updates that would infect a computer’s most nether regions without triggering a warning. To make matters worse, Matrosov said, MSI doesn’t have an automated patching process the way Dell, HP, and many larger hardware makers do.

Software 319
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SHARED INTEL: From airbags to malware: vehicle cyber safety arises in the age of connected cars

The Last Watchdog

In an increasingly interconnected world, the evolution of the automotive industry presents an exciting yet daunting prospect. Related: Privacy rules for vehicles As vehicles continue to offer modern features such as app-to-car connectivity, remote control access, and driver assistance software, a huge risk lurks in the shadows. The physical safety of things like airbags, rearview mirrors, and brakes is well accounted for; yet cybersecurity auto safety concerns are rising to the fore.

Malware 230
article thumbnail

Survey: Most CISOs feel their business is at risk for cyberattack

Tech Republic Security

A new report from Proofpoint provides global insight into CISOs' challenges, expectations and priorities for 2023. The post Survey: Most CISOs feel their business is at risk for cyberattack appeared first on TechRepublic.

CISO 203
article thumbnail

How to Avoid Pitfalls In Automation: Keep Humans In the Loop

Speaker: Erroll Amacker

Automation is transforming finance but without strong financial oversight it can introduce more risk than reward. From missed discrepancies to strained vendor relationships, accounts payable automation needs a human touch to deliver lasting value. This session is your playbook to get automation right. We’ll explore how to balance speed with control, boost decision-making through human-machine collaboration, and unlock ROI with fewer errors, stronger fraud prevention, and smoother operations.

article thumbnail

Anton’s Security Blog Quarterly Q2 2023

Anton on Security

Great blog posts are sometimes hard to find (especially on Medium ), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. Here is the next one. The posts below are ranked by lifetime views. This covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast too ( subscribe ). Top 5 most popular posts of all times (these ended up being the same as last quarter, and the quarter before) : “Security Correlation Then and Now: A

article thumbnail

Israel-based threat actors show growing sophistication of email attacks

Tech Republic Security

Abnormal Security is tracking cybercriminals from an unusual location for business email compromises who are using sophisticated spoofing to spur payments for fake acquisitions. The post Israel-based threat actors show growing sophistication of email attacks appeared first on TechRepublic.

Phishing 187

LifeWorks

More Trending

article thumbnail

Google combats AI misinformation with Search labels, adds dark web security upgrades

Tech Republic Security

Artificial intelligence art service Midjourney and Shutterstock will identify their computer-generated images in Google Search. The post Google combats AI misinformation with Search labels, adds dark web security upgrades appeared first on TechRepublic.

article thumbnail

Smashing Pumpkins Singer Pays Ransom to Avoid Early Release of Songs

SecureWorld News

Billy Corgan, founder and frontman for alt-rock band Smashing Pumpkins, paid ransom to a hacker to avoid a leak of music from its three-part rock opera that was released earlier this month. The news appears to have first been covered by Security Affairs in this post , in which it is revealed the FBI investigated the case, saying the hacker also stole similar material from other unnamed artists.

Insurance 125
article thumbnail

Insured companies more likely to be ransomware victims, sometimes more than once

CSO Magazine

Companies with cyber insurance are more likely to get hit by ransomware, more likely to be attacked multiple times, and more likely to pay ransoms, according to a recent survey of IT decision makers. Back in 2019, fewer than 20% of enterprises suffered repeat ransomware attacks, while during the pandemic, the percentage rose to around 30%. And it didn’t stop with the pandemic, with 38% of organizations surveyed in 2022 reporting two or more successful ransomware attacks, those that attackers wer

Insurance 123
article thumbnail

The Battle Against IoT Cyber Threats

Security Boulevard

The rapid increase of the Internet of Things (IoT) technology has transformed the world in many ways. From home automation to industrial control systems, IoT has become an integral part of our daily lives. However, as with any new technology, there are significant cybersecurity concerns that come with it. In this blog post, we will […] The post The Battle Against IoT Cyber Threats appeared first on PeoplActive.

article thumbnail

Why Giant Content Libraries Do Nothing for Your Employees’ Cyber Resilience

Many cybersecurity awareness platforms offer massive content libraries, yet they fail to enhance employees’ cyber resilience. Without structured, engaging, and personalized training, employees struggle to retain and apply key cybersecurity principles. Phished.io explains why organizations should focus on interactive, scenario-based learning rather than overwhelming employees with excessive content.

article thumbnail

Hackers exploit WordPress vulnerability within hours of PoC exploit release

CSO Magazine

Threat actors have started exploiting a recently disclosed vulnerability in WordPress, within 24 hours of the proof-of-concept (PoC) exploit being published by the company, according to a blog by Akamai. The high-severity vulnerability, CVE-2023-30777 that affects the WordPress Advanced Custom Fields plugin, was identified by a Patchstack researcher on May 2.

122
122
article thumbnail

Discord Announces a Data Breach Involving a Support Agent

Heimadal Security

Discord messaging platform announced a data breach. The incident involved a third-party support agent whose account has been compromised. The notification warned customers about unauthorized access to the agent’s support ticket queue. The Exposed Data & Security Measures This incident might have exposed data like: Customers email address Service messages Service attachments The messaging platform […] The post Discord Announces a Data Breach Involving a Support Agent appeared first on H

article thumbnail

The Importance of Understanding the Unique Challenges of IT & OT Cybersecurity

Security Boulevard

Cybersecurity threats have been increasing at an alarming rate, and organizations must continuously adapt to address these threats. The convergence of Information Technology (IT) and Operational Technology (OT) has created new challenges for cybersecurity. IT systems deal with data, communication, and networking, while OT systems control physical processes, such as manufacturing, transportation, and energy production. […] The post The Importance of Understanding the Unique Challenges of IT &

article thumbnail

Law enforcement crackdowns and new techniques are forcing cybercriminals to pivot

CSO Magazine

It can seem like cybercriminals are running rampant across the world's digital infrastructure, launching ransomware attacks, scams, and outright thefts with impunity. Over the last year, however, US and global authorities seized $112 million from cryptocurrency investment scams, disrupted the Hive ransomware group, broke up online illegal drug marketplaces, and sanctioned crypto money launderers, among other operations to crack down on internet-enabled crimes.

Scams 115
article thumbnail

Zero Trust Mandate: The Realities, Requirements and Roadmap

The DHS compliance audit clock is ticking on Zero Trust. Government agencies can no longer ignore or delay their Zero Trust initiatives. During this virtual panel discussion—featuring Kelly Fuller Gordon, Founder and CEO of RisX, Chris Wild, Zero Trust subject matter expert at Zermount, Inc., and Principal of Cybersecurity Practice at Eliassen Group, Trey Gannon—you’ll gain a detailed understanding of the Federal Zero Trust mandate, its requirements, milestones, and deadlines.

article thumbnail

Ransomware gang steals data of 5.8 million PharMerica patients

Bleeping Computer

Pharmacy services provider PharMerica has disclosed a massive data breach impacting over 5.8 million patients, exposing their medical data to hackers. [.

article thumbnail

Buffalo Mass Shooting Victims' Families Sue Meta, Reddit, Amazon

WIRED Threat Level

The families of victims of a mass shooting in Buffalo are challenging the platforms they believe led the attacker to carry out a racist massacre.

Media 112
article thumbnail

8220 Gang Evolves With New Strategies

Trend Micro

We observed the threat actor group known as “8220 Gang” employing new strategies for their respective campaigns, including exploits for the Linux utility “lwp-download” and CVE-2017-3506, an Oracle WebLogic vulnerability.

article thumbnail

New security tool lets you bypass SSL errors

CSO Magazine

Endpoint-based web and cloud security provider Dope Security has launched a new instant secure socket layer ( SSL ) error resolution feature on its secure web gateway (SWG) offering, Dope.swg. The new feature is added to simplify SSL inspection conducted by Dope’s SWG and helps admins bypass SSL errors generated as a result of the inspection. “Dope’s main differentiation is its ‘fly-direct’ architecture — rather than re-route all of your Internet traffic to a data center for security checks, we

article thumbnail

Next-Level Fraud Prevention: Strategies for Today’s Threat Landscape

Speaker: Sierre Lindgren

Fraud is a battle that every organization must face – it’s no longer a question of “if” but “when.” Every organization is a potential target for fraud, and the finance department is often the bullseye. From cleverly disguised emails to fraudulent payment requests, the tactics of cybercriminals are advancing rapidly. Drawing insights from real-world cases and industry expertise, we’ll explore the vulnerabilities in your processes and how to fortify them effectively.

article thumbnail

Toyota Discloses Decade-Long Data Leak Exposing 2.15M Customers' Data

Dark Reading

A misconfigured cloud instance exposed vehicle data, but not personally identifiable information, the car maker says.

112
112
article thumbnail

Zut alors! Raclage crapuleux! Clearview AI in 20% more trouble in France

Naked Security

We asked you once, we told you twice, now we're ordering you for the third time.

article thumbnail

What is Anti-Virus Software? And Do I really need it ?

Quick Heal Antivirus

If you’re still pondering over these questions, here’s the scoop: yes, you definitely need an antivirus, and we. The post What is Anti-Virus Software? And Do I really need it ? appeared first on Quick Heal Blog.

Software 111
article thumbnail

SHARED INTEL: From airbags to malware: vehicle cyber safety arises in the age of connected cars

Security Boulevard

In an increasingly interconnected world, the evolution of the automotive industry presents an exciting yet daunting prospect. Related: Privacy rules for vehicles As vehicles continue to offer modern features such as app-to-car connectivity, remote control access, and driver assistance software, … (more…) The post SHARED INTEL: From airbags to malware: vehicle cyber safety arises in the age of connected cars appeared first on Security Boulevard.

Malware 111
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

WhatsApp now lets you lock chats with a password or fingerprint

Bleeping Computer

Meta is now rolling out 'Chat Lock,' a new WhatsApp privacy feature allowing users to block others from accessing their most personal conversations. [.

Passwords 111
article thumbnail

War, Hunh. Yeah. What is it Good For? Reducing Insurer Liability for Cyberattacks

Security Boulevard

A New Jersey court recently ruled that an insurer was not relieved from its obligation to pay for Merck’s losses after a Russian NotPetya cyberattack. The insurer claimed its ‘Act of War’ exclusion applied to the company’s cyberinsurance policy; the court disagreed. The rise of cyberattacks has led to a significant increase in the demand.

Insurance 111
article thumbnail

New 'MichaelKors' Ransomware-as-a-Service Targeting Linux and VMware ESXi Systems

The Hacker News

A new ransomware-as-service (RaaS) operation called MichaelKors has become the latest file-encrypting malware to target Linux and VMware ESXi systems as of April 2023. The development points to cybercriminal actors increasingly setting their eyes on the ESXi, cybersecurity firm CrowdStrike said in a report shared with The Hacker News.

article thumbnail

How to Know if You’ve Been Infected by Ransomware

Security Boulevard

Detecting ransomware activity has become increasingly difficult because adversaries are constantly evolving their tools, tactics and techniques. For example, threat actors are using new programming languages like Rust to help avoid detection by security software and exfiltrating data (instead of encrypting it) so they can threaten organizations that use backups.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

New ransomware gang RA Group quickly expanding operations

CSO Magazine

Researchers warn of a new ransomware threat dubbed RA Group that also engages in data theft and extortion and has been hitting organizations since late April. The group's ransomware program is built from the leaked source code of a different threat called Babuk. "Like other ransomware actors, RA Group also operates a data leak site in which they threaten to publish the data exfiltrated from victims who fail to contact them within a specified time or do not meet their ransom demands," researchers

article thumbnail

CISOs: How to improve cybersecurity in an ever-changing threat landscape

CyberSecurity Insiders

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. The digital landscape is always changing to keep up with a constantly evolving world, and bad actors are also adapting. For every new development in the digital world, cybercriminals are looking to take advantage of weaknesses, so it is important that those concerned with the security of their organization’s

CISO 105
article thumbnail

DDoS Myths: Blackholing and Outsourcing Won’t Stop Everything

eSecurity Planet

Gone are the days when you could get away with doing nothing to prepare for DDoS attacks. With the cost of DDoS attacks falling and their frequency and sophistication growing, even organizations that think their profile is too low to worry about DDoS can still become victims. Even organizations that think they’re protected against DDoS attacks may be more at risk than they think.

DDOS 104
article thumbnail

Toyota Disclosed a Ten-Year Long Data Breach

Heimadal Security

Toyota Motor Corporation issued a notice on the company’s Japanese newsroom disclosing a data breach of ten years. A database misconfiguration in its cloud environment leads to exposing of the car-location data of 2,150,000 customers. Details from the Data Breach Notice The misconfiguration allowed unauthorized people to access the database without needing a password.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!