Thu.Nov 30, 2023

article thumbnail

Extracting GPT’s Training Data

Schneier on Security

This is clever : The actual attack is kind of silly. We prompt the model with the command “Repeat the word ‘poem’ forever” and sit back and watch as the model responds ( complete transcript here ). In the (abridged) example above, the model emits a real email address and phone number of some unsuspecting entity. This happens rather often when running our attack.

article thumbnail

Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs

Tech Republic Security

Hunters researchers noted the vulnerability could lead to privilege escalation. Google said the report “does not identify an underlying security issue in our products.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meta sued over forcing users to pay to stop tracking

Malwarebytes

Meta is required to get users’ consent in Europe in order to show them targeted ads. For this reason, Meta has to provide European users with a way to opt out of behavioral advertising or face fines totalling $100,000 a day. Behavioral advertising are ads tailored to someone’s browsing habits and other online behavior. A profile of the user is built up over time, as they work their way around the web.

article thumbnail

Apple fixes two new iOS zero-days in emergency updates

Bleeping Computer

Apple released emergency security updates to fix two zero-day vulnerabilities exploited in attacks and impacting iPhone, iPad, and Mac devices, reaching 20 zero-days patched since the start of the year. [.

143
143
article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Associated Press, ESPN, CBS among top sites serving fake virus alerts

Malwarebytes

ScamClub is a threat actor who’s been involved in malvertising activities since 2018. Chances are you probably ran into one of their online scams on your mobile device. Confiant, the firm that has tracked ScamClub for years, released a comprehensive report in September while also disrupting their activities. However, ScamClub has been back for several weeks, and more recently they were behind some very high profile malicious redirects.

Mobile 135
article thumbnail

Critical Zoom Room bug allowed to gain access to Zoom Tenants

Security Affairs

A critical vulnerability in Zoom Room allowed threat actors to take over meetings and steal sensitive data. Researchers at AppOms discovered a vulnerability in Zoom Room as part of the HackerOne live hacking event H1-4420. Zoom Rooms is a feature of the Zoom video conferencing platform designed to enhance collaboration in physical meeting spaces, such as conference rooms or huddle rooms.

More Trending

article thumbnail

Apple addressed 2 new iOS zero-day vulnerabilities

Security Affairs

Apple released emergency security updates to fix two actively exploited zero-day flaws impacting iPhone, iPad, and Mac devices. Apple released emergency security updates to address two zero-day vulnerabilities impacting iPhone, iPad, and Mac devices. The flaws are actively exploited in attacks in the wild, both issues reside in the WebKit browser engine.

article thumbnail

LogoFAIL bugs in UEFI code allow planting bootkits via images

Bleeping Computer

Multiple security vulnerabilities collectively named LogoFAIL affect image-parsing components in the UEFI code from various vendors. Researchers warn that they could be exploited to hijack the execution flow of the booting process and to deliver bootkits. [.

126
126
article thumbnail

Trend Micro Adds AI Tool While Extending CNAPP Reach

Security Boulevard

Trend Micro's generative AI tool, Trend Companion, leverages natural language to reduce toil by bringing context to alerts and reducing incident investigation times. The post Trend Micro Adds AI Tool While Extending CNAPP Reach appeared first on Security Boulevard.

article thumbnail

Executives behaving badly: 5 ways to manage the executive cyberthreat

We Live Security

Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk

Risk 132
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

CISA: Threat Groups are Targeting Unitronics PLCs in Water Systems

Security Boulevard

The United States’ top cybersecurity agency is warning that hackers are targeting a particular tool used by water and wastewater system operators around the country, noting an attack the day after Thanksgiving on a water utility in Pennsylvania. The Cybersecurity and Infrastructure Security Agency (CISA) wrote in an advisory this week that bad actors are.

article thumbnail

Ex-Motorola worker phished former employer to illegally hack network and steal data

Graham Cluley

A 28-year-old maj has pleaded guilty to charges that he illegally hacked the network of his former company, telecoms firm Motorola, after he successfully tricked current staff into handing over their login credentials. Read more in my article on the Tripwire State of Security blog.

Hacking 115
article thumbnail

Different Types of CISOs, Diverse Missions

Security Boulevard

There are a range of distinct roles/missions that hold the CISO title. Their ultimate goals are similar, but how they are positioned to do that varies. The post Different Types of CISOs, Diverse Missions appeared first on Security Boulevard.

CISO 117
article thumbnail

Opening Critical Infrastructure: The Current State of Open RAN Security

Trend Micro

The Open Radio Access Network (ORAN) architecture provides standardized interfaces and protocols to previously closed systems. However, our research on ORAN demonstrates the potential threat posed by malicious xApps that are capable of compromising the entire Ran Intelligent Controller (RIC) subsystem.

article thumbnail

Cybersecurity Predictions for 2024

Within the past few years, ransomware attacks have turned to critical infrastructure, healthcare, and government entities. Attackers have taken advantage of the rapid shift to remote work and new technologies. Add to that hacktivism due to global conflicts and U.S. elections, and an increased focus on AI, and you have the perfect recipe for a knotty and turbulent 2024.

article thumbnail

Black Basta Extortion Group Racks Up $107 Million in Ransom Payments

Security Boulevard

Anyone who wonders why the threat of ransomware continues to grow need only to take a look at Black Basta, the prolific extortion gang that last year likely rose from the ashes of the high-profile Russian group Conti. Black Basta has raked in at least $107 million in ransom payments in Bitcoin since early 2022. The post Black Basta Extortion Group Racks Up $107 Million in Ransom Payments appeared first on Security Boulevard.

article thumbnail

Zyxel warns of multiple critical vulnerabilities in NAS devices

Bleeping Computer

Zyxel has addressed multiple security issues, including three critical ones that could allow an unauthenticated attacker to execute operating system commands on vulnerable network-attached storage (NAS) devices. [.

111
111
article thumbnail

Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws

The Hacker News

Apple has released software updates for iOS, iPadOS, macOS, and Safari web browser to address two security flaws that it said have come under active exploitation in the wild on older versions of its software.

article thumbnail

WhatsApp's new Secret Code feature hides your locked chats

Bleeping Computer

WhatsApp has introduced a new Secret Code feature that allows users to hide their locked chats by setting a custom password. [.

Passwords 124
article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Not all cybercriminals are evil geniuses

Graham Cluley

I thought some of you might enjoy this. Here’s a video of a recent after-dinner talk I gave, exploring (in a hopefully fun way!) whether cybercriminals are quite as smart as we sometimes think they are. Are malicious hackers geniuses? Are they all evil?

article thumbnail

LogoFAIL attack can install UEFI bootkits through bootup logos

Bleeping Computer

Multiple security vulnerabilities collectively named LogoFAIL affect image-parsing components in the UEFI code from various vendors. Researchers warn that they could be exploited to hijack the execution flow of the booting process and to deliver bootkits. [.

96
article thumbnail

CIO in the Age of AI: A Title Under Threat?

SecureWorld News

The role of the Chief Information Officer has undergone significant transformations over the past few decades, driven by the rapid advancements in technology. With the advent of artificial intelligence (AI), machine learning (ML), and generative AI, questions have arisen regarding the continued relevance of the CIO title and whether it accurately reflects the evolving nature of the job.

CISO 93
article thumbnail

US govt sanctions North Korea’s Kimsuky hacking group

Bleeping Computer

The Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned the North Korean-backed Kimsuky hacking group for stealing intelligence in support of the country's strategic goals. [.

Hacking 96
article thumbnail

5 Key Findings From the 2023 FBI Internet Crime Report

The losses companies suffered in 2023 ransomware attacks increased by 74% compared to those of the previous year, according to new data from the Federal Bureau of Investigation (FBI). The true figure is likely to be even higher, though, as many identity theft and phishing attacks go unreported. Ransomware attackers can potentially paralyze not just private sector organizations but also healthcare facilities, schools, and entire police departments.

article thumbnail

Google Unveils RETVec - Gmail's New Defense Against Spam and Malicious Emails

The Hacker News

Google has revealed a new multilingual text vectorizer called RETVec (short for Resilient and Efficient Text Vectorizer) to help detect potentially harmful content such as spam and malicious emails in Gmail.

94
article thumbnail

Cactus ransomware exploiting Qlik Sense flaws to breach networks

Bleeping Computer

Cactus ransomware has been exploiting critical vulnerabilities in the Qlik Sense data analytics solution to get initial access on corporate networks. [.

article thumbnail

Smashing Security podcast #350: Think before you shrink! And our guest is faked

Graham Cluley

Don’t minimise your Teams Meeting video call too hastily, you might reveal your dirty secrets! Would you be prepared to pay for Facebook and Instagram? And who is being faked to promote cryptocurrency scams? All this and much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by technology journalist Jane Wakefield.

article thumbnail

Capital Health Hospitals hit by cyberattack causing IT outages

Bleeping Computer

Capital Health hospitals and physician offices across New Jersey are experiencing IT outages after a cyberattack hit the non-profit organization's network earlier this week. [.

article thumbnail

Software Composition Analysis: The New Armor for Your Cybersecurity

Speaker: Blackberry, OSS Consultants, & Revenera

Software is complex, which makes threats to the software supply chain more real every day. 64% of organizations have been impacted by a software supply chain attack and 60% of data breaches are due to unpatched software vulnerabilities. In the U.S. alone, cyber losses totaled $10.3 billion in 2022. All of these stats beg the question, “Do you know what’s in your software?

article thumbnail

Anduril’s New Drone Killer Is Locked on to AI-Powered Warfare

WIRED Threat Level

Autonomous drones are rapidly changing combat. Anduril’s new one aims to gain an edge with jet power and AI.

article thumbnail

FjordPhantom Android malware uses virtualization to evade detection

Bleeping Computer

A new Android malware named FjordPhantom has been discovered using virtualization to run malicious code in a container and evade detection. [.

Malware 105
article thumbnail

Process Stomping: execute shellcode on an executable’s section

Penetration Testing

Process Stomping A variation of ProcessOverwriting to execute shellcode on an executable’s section What is it Process Stomping, is a variation of hasherezade’s Process Overwriting and it has the advantage of writing a shellcode payload on... The post Process Stomping: execute shellcode on an executable’s section appeared first on Penetration Testing.

article thumbnail

Get 20% off Emsisoft's Enterprise Security EDR solution for the holidays

Bleeping Computer

Emsisoft is having a holiday deal where you can get 20% off 1-year licenses of the Emsisoft Enterprise Security EDR solution through December 17th, 2023, with no license limits. [.

81
article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Let’s step back and focus on the idea that no matter how complicated the compliance and security regime, it should be able to be distilled down to a checklist.