Worcester Co. Sheriff’s Office To Implement Radio Encryption; Public Shares Concerns
Crisafulli shared a statement on social media Saturday announcing his agency’s plan to move toward encrypted communication.
His announcement came after the Eastern Shore Undercover Facebook page, known for its monitoring of emergency radio channels, shared the news that Worcester County would soon be encrypting its communications.
@Cyber_Security_Channel
Gartner’s Top 10 Strategic Technology Trends for 2024
Many organizations are already working with AI, but it is trending because Gartner surveys this year “indicate that the hype brought by ChatGPT and other GenAI platforms causes 45% of respondents to increase their AI budgets,” Willemsen explained.
@Cyber_Security_Channel
A Threat Actor Is Selling Access To Facebook And Instagram's Police Portal
The threat actor can abuse access to the portal for multiple purposes, including unauthorized data requests, enabling harassment and doxxing, fake law enforcement actions, and the risk of identity theft, all of which pose serious privacy and security concerns for users.
@Cyber_Security_Channel
Cisco Finds New Zero Day Bug, Pledges Patches in Days
Cisco also added another clarification from its earlier reporting on the first bug: it was thought in the early response that the threat actor had combined the new zero-day with a known and patched vulnerability from 2021, raising the specter of a patch bypass issue.
But Cisco has now dismissed that theory, according to a statement from the company.
@Cyber_Security_Channel
More Okta Customers Hacked
"Okta has worked with impacted customers to investigate, and has taken measures to protect our customers, including the revocation of embedded session tokens," Bradbury added.
In its blog post, Okta listed IP addresses and user-agents that security teams can use in their threat hunting efforts.
@Cyber_Security_Channel
How to Build Elite Technical Teams
Internally with Cybersecurity Training
Cybersecurity training is a continuous process that should be integrated into your organization’s culture.
Denis emphasized that team members are driven to acquire new skill sets and advance in their careers.
Packetlabs categorizes service offerings into different levels, evaluating their team members’ skills regularly, and upskilling them accordingly.
@Cyber_Security_Channel
The Fake Browser Update Scam Gets a Makeover
Nati Tal, head of security at Guardio Labs, the research unit at Guardio, said the malicious scripts stitched into hacked WordPress sites will create a new smart contract on the BSC Blockchain, starting with a unique, attacker-controlled blockchain address and a set of instructions that defines the contract’s functions and structure.
When that contract is queried by a compromised website, it will return an obfuscated and malicious payload.
@Cyber_Security_Channel
Flagstar Bank Suffers a MOVEit Data Breach Impacting Over 800,000 Customers
Flagstar said the data breach occurred between May 27 and 31, 2023, when the vulnerability was still publicly unknown, and was detected on June 3, 2023.
By then, threat actors had copied and transferred some files from the compromised file transfer system.
The stolen files included customer information, which varied between individuals.
@Cyber_Security_Channel
5 Ways Hospitals Can Help Improve Their IoT Security
Besides being difficult to protect, these connected devices present challenges when it comes to complying with the security requirements of laws such as the Health Insurance Portability and Accountability Act (HIPAA).
Luckily, there are several strategies hospitals can leverage to bolster their defenses.
Here are five actionable ways hospitals can help secure medical devices and provide life-saving patient care without disruption.
@Cyber_Security_Channel
Critical Vulnerabilities Expose Weintek HMIs to Attacks
Hank Chen, the TXOne Networks researcher credited for finding the vulnerabilities, told SecurityWeek that the flaws could allow an attacker to take complete control of an HMI.
However, Chen noted that while an attacker does not require any special permissions to launch a DoS attack, executing arbitrary commands requires the HMI’s password.
@Cyber_Security_Channel
Microsoft Defender Thwarted Akira Ransomware Attack On An Industrial Engineering Firm
“In this attack, the threat actor leveraged devices that were not onboarded to Microsoft Defender for Endpoint for most of the attack stages, a defense evasion tactic we’ve seen in other attacks” reads the analysis published by Microsoft.
“While visibility by our endpoint solution could have blocked the attack earlier in the attack chain and helped to protect the organization’s devices much sooner, Defender for Endpoint nonetheless successfully prevented the ransomware stage, protecting all onboarded devices in the organization from getting encrypted.”
@Cyber_Security_Channel
CISA Now Flagging Vulnerabilities, Misconfigurations Exploited by Ransomware
The catalog lists more than 1,000 vulnerabilities for which CISA has solid evidence of in-the-wild exploitation, many of which have been targeted in ransomware attacks.
One of the most recent examples of such flaws is CVE-2023-40044, a deserialization of untrusted data bug in Progress Software’s WS_FTP server that could lead to the execution of remote commands on the underlying operating system.
@Cyber_Security_Channel
New DDoS Attack is Record Breaking: HTTP/2 Rapid Reset Zero-Day Reported by Google, AWS & Cloudflare
Amazon observed and mitigated more than a dozen HTTP/2 Rapid Reset attacks over two days in late August, the strongest one hitting its infrastructures at 155 million requests per second.
Cloudflare reported a peak at 201 million requests per second and mitigated more than 1,100 other attacks with more than 10 million RPS, and 184 attacks greater than the previous DDoS record of 71 million RPS.
@Cyber_Security_Channel
State of New York Makes Moratorium on Facial Recognition Technology in Schools Permanent
The report did not take digital fingerprinting off the table, however, noting that it presented lower risk to student rights and would be fit for specific uses such as tracking lunch payments and letting students unlock school-owned devices.
The new legislation requires allows school districts to implement fingerprinting and types of biometric identification other than facial recognition technology, but they must first obtain input from parents and conduct a similar assessment of the potential impact on student rights.
@Cyber_Security_Channel
Canada Privacy Commissioner Wants Feedback on New Biometric Data Processing Guidelines
They come with “Musts” (must use authentication before ID, must delete biometric information on request) and “Shoulds” (should seek to keep the template in the individual’s control, should use active versus passive biometrics).
@Cyber_Security_Channel
Telling Small Businesses to Buy Cyber Insurance Isn't Enough
Even for businesses that can get — and afford — cyber insurance, it isn't comprehensive and doesn't cover every possible type of security breach. Instead, policies cover a set of named perils.
An inexperienced buyer may not realize the protection limitations, given the variety of coverages, exceptions, and exclusions in policies.
Policies, for example, may not cover cyber terrorism, state-sponsored attacks, contractual liabilities, or intellectual property infringement, and may have exclusions for war, terrorism, bodily injury, and property damage.
Policies may also have deductibles, co-payments, and sublimits that reduce the amount of coverage.
@Cyber_Security_Channel
China Crackdown on Cyber Scams in Southeast Asia Nets Thousands but Leaves Networks Intact
In August, China, Thailand, Laos and Myanmar agreed to set up a joint police operations center to tackle cyber scams in the region.
On Oct. 10, China’s Ministry of Public Security announced that its “Summer Operation” had successfully brought back 2,317 scam suspects from northern Myanmar to China.
@Cyber_Security_Channel
MI5 Chief Warns of Chinese Cyber Espionage Reached an Unprecedented Scale
Over the past year, British intelligence has observed over 20 cases involving Chinese firms contemplating or actively attempting to access sensitive technology developed by UK entities.
The espionage activity used different means to conceal the involvement of the Chinese government, including financial investments.
The BBC reported the case of an acquisition of a sensitive UK tech company involved in UK military supply chains.
@Cyber_Security_Channel
Over 50K Cisco IOS XE Devices Hacked Exploiting Zero-day
Cisco Talos IR and TAC identified a new cluster of unauthorized activity on October 12. An intruder created a “cisco_support” user from a suspicious IP (154.53.56[.]231).
Unlike September, this involved implant deployment (“cisco_service.conf”) for system-level commands.
However, the implant failed to activate in one case.
@Cyber_Security_Channel
Philippine Military Ordered to Stop Using Artificial Intelligence Apps Due to Security Risks
Teodoro ordered all defense and military personnel “to refrain from using AI photo generator applications and practice vigilance in sharing information online” and said their actions should adhere to the Philippines Defense Department’s values and policies.
@Cyber_Security_Channel
Pro-Iranian Hacktivists Set Sights on Israeli Industrial Control Systems
"In the absence of reported disruptions to Israeli infrastructure, the available NetFlow sample appears to support assessments that SiegedSec's attacks were either unsuccessful or have not yet begun in earnest," the report said.
@Cyber_Security_Channel
Tampa Hospital Suffers Recent Data Breach
The standing lawsuit against TGH accuses the facility of violating the Florida Deceptive and Unfair Trade Practices Act and includes allegations of invasion of privacy, unjust enrichment, breach of confidence, fiduciary duty and contract claims.
According to their legal counsel, the plaintiffs are seeking relief in the form of restitution, injunctive relief and significant monetary damages, which remain unspecified at this time.
@Cyber_Security_Channel
Software Supply Chain Security Attacks Up 200%: New Sonatype Research
Because of this huge increase in attacks, many open-source systems have implemented new security policies and improvements, such as mandatory multifactor authentication for developers; however, oftentimes, malicious packages are handled the same as packages with vulnerabilities, meaning they’re taken down the same way as vulnerabilities, which is inappropriate for malicious content, as the packages might stay online longer for that reason.
@Cyber_Security_Channel
Top 6 Mistakes in Incident Response Tabletop Exercises
Due to the discussion-based nature, most organizations consider a tabletop exercise to be a relatively easy training session that consists of a long conversation while looking at PowerPoint slides.
However, if it's not performed properly, it can be easy to lose the efficiency and value a tabletop exercise can provide.
@Cyber_Security_Channel
EPA Withdraws Water Sector Cybersecurity Rules Due to Lawsuits
“In addition to concerns about the legal process and legality of the rule, the water associations expressed concerns that the rule would create additional cybersecurity vulnerabilities for utilities, as sanitary surveys required in the rule have public notification requirements.
Finally, the rule would have required cybersecurity reviews by state regulatory agencies that lack expertise and resources for cybersecurity oversight,” AWWA and NRWA said in a press release issued last week after the EPA withdrew the rules.
@Cyber_Security_Channel
ShellBot Cracks Linux SSH Servers, Debuts New Evasion Tactic
ShellBot, aka PerlBot, is a well-known botnet that uses dictionary attacks to compromise servers that have weak SSH credentials.
From there, the server endpoint is marshalled into action to deliver distributed denial-of-service (DDoS) attacks or drop payloads like cryptominers on infected machines.
@Cyber_Security_Channel
Stayin’ Alive Campaign Targets High-Profile Asian Government and Telecom Entities. Is It Linked To ToddyCat APT?
The main payload is composed of three primary functionalities, ‘report’, ‘shell’, and ‘file.’ Each functionality is assigned to a different message type that is sent to the C2 server.
Upon execution, the payload initially runs the ‘report’ feature sending basic recon info to the C2, then it creates two separate threads that repeatedly run the shell and file functionalities.
@Cyber_Security_Channel
Data Thieves Test-Drive Unique Certificate Abuse Tactic
Notably, the malware uses abnormal certificates featuring Subject Name and Issuer Name fields that have unusually long strings, which means they require specific tools or infrastructure to inspect the certificates and are not visible in Windows systems.
Specifically, the signature strings include Arabic, Japanese, and other non-English languages, along with special characters and punctuation marks, diverging from the typical English character string structures, the researchers noted.
@Cyber_Security_Channel
DataLocker® Introduces Sentry 5: The Ultimate Hardware Encrypted USB Flash Drive for Compliance and Security
DataLocker CEO Jay Kim emphasizes, "In the ever-evolving digital landscape full of cyber threats, the Sentry 5 encrypted cold storage USB drive provides an additional tool for your security arsenal.
This device is a continuation of our unwavering commitment to upholding data security, offering organizations a blend of top-notch security measures, flexibility, and efficiency."
@Cyber_Security_Channel
In June, Argentina's Executive Branch Filed a New Bill to Replace the Current Personal Data Protection Law With the National Congress of Argentina.
Extraterritorial application of the law is included in the proposed bill and applies to those located in Argentina, even when the processing is performed in another country.
It also applies to those not located in Argentina but who comply with other conditions, such as providing goods and services to those within the country.
@Cyber_Security_Channel