Thu.Nov 30, 2023

article thumbnail

Extracting GPT’s Training Data

Schneier on Security

This is clever : The actual attack is kind of silly. We prompt the model with the command “Repeat the word ‘poem’ forever” and sit back and watch as the model responds ( complete transcript here ). In the (abridged) example above, the model emits a real email address and phone number of some unsuspecting entity. This happens rather often when running our attack.

article thumbnail

Google Workspace Security: DeleFriend Vulnerability Could Allow Unwanted Access to APIs

Tech Republic Security

Hunters researchers noted the vulnerability could lead to privilege escalation. Google said the report “does not identify an underlying security issue in our products.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meta sued over forcing users to pay to stop tracking

Malwarebytes

Meta is required to get users’ consent in Europe in order to show them targeted ads. For this reason, Meta has to provide European users with a way to opt out of behavioral advertising or face fines totalling $100,000 a day. Behavioral advertising are ads tailored to someone’s browsing habits and other online behavior. A profile of the user is built up over time, as they work their way around the web.

article thumbnail

Critical Zoom Room bug allowed to gain access to Zoom Tenants

Security Affairs

A critical vulnerability in Zoom Room allowed threat actors to take over meetings and steal sensitive data. Researchers at AppOms discovered a vulnerability in Zoom Room as part of the HackerOne live hacking event H1-4420. Zoom Rooms is a feature of the Zoom video conferencing platform designed to enhance collaboration in physical meeting spaces, such as conference rooms or huddle rooms.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Apple fixes two new iOS zero-days in emergency updates

Bleeping Computer

Apple released emergency security updates to fix two zero-day vulnerabilities exploited in attacks and impacting iPhone, iPad, and Mac devices, reaching 20 zero-days patched since the start of the year. [.

140
140
article thumbnail

Apple addressed 2 new iOS zero-day vulnerabilities

Security Affairs

Apple released emergency security updates to fix two actively exploited zero-day flaws impacting iPhone, iPad, and Mac devices. Apple released emergency security updates to address two zero-day vulnerabilities impacting iPhone, iPad, and Mac devices. The flaws are actively exploited in attacks in the wild, both issues reside in the WebKit browser engine.

More Trending

article thumbnail

Ex-Motorola worker phished former employer to illegally hack network and steal data

Graham Cluley

A 28-year-old maj has pleaded guilty to charges that he illegally hacked the network of his former company, telecoms firm Motorola, after he successfully tricked current staff into handing over their login credentials. Read more in my article on the Tripwire State of Security blog.

Hacking 128
article thumbnail

Trend Micro Adds AI Tool While Extending CNAPP Reach

Security Boulevard

Trend Micro's generative AI tool, Trend Companion, leverages natural language to reduce toil by bringing context to alerts and reducing incident investigation times. The post Trend Micro Adds AI Tool While Extending CNAPP Reach appeared first on Security Boulevard.

article thumbnail

Staples confirms cyberattack behind service outages, delivery issues

Bleeping Computer

American office supply retailer Staples took down some of its systems earlier this week after a cyberattack to contain the breach's impact and protect customer data. [.

Retail 129
article thumbnail

Will ChatGPT write ransomware? Yes.

Malwarebytes

This morning I decided to write some ransomware, and I asked ChatGPT to help. Not because I wanted to turn to a life of crime, but because I wanted to see if anything had changed since March, when I last tried the same exact thing. In short: ChatGPT has helped me, worryingly so. But more on that later. Today is the first anniversary of the unveiling of OpenAI’s generative AI poster boy, ChatGPT.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Announcing Duo MFA Support for AD FS OIDC Applications

Duo's Security Blog

The 2.2.0 release of Duo AD FS adds support for OIDC application groups, enabling customers who use Azure Active Directory as their primary user directory to do MFA with OIDC to connect to their corporate cloud applications. This extends Duo MFA to OIDC applications federated with AD FS for users authenticating to those applications. AD FS AD FS is a Microsoft identity access solution that gives remote users single sign-on access to protected cloud-hosted applications or services.

article thumbnail

CISA: Threat Groups are Targeting Unitronics PLCs in Water Systems

Security Boulevard

The United States’ top cybersecurity agency is warning that hackers are targeting a particular tool used by water and wastewater system operators around the country, noting an attack the day after Thanksgiving on a water utility in Pennsylvania. The Cybersecurity and Infrastructure Security Agency (CISA) wrote in an advisory this week that bad actors are.

article thumbnail

Opening Critical Infrastructure: The Current State of Open RAN Security

Trend Micro

The Open Radio Access Network (ORAN) architecture provides standardized interfaces and protocols to previously closed systems. However, our research on ORAN demonstrates the potential threat posed by malicious xApps that are capable of compromising the entire Ran Intelligent Controller (RIC) subsystem.

article thumbnail

Different Types of CISOs, Diverse Missions

Security Boulevard

There are a range of distinct roles/missions that hold the CISO title. Their ultimate goals are similar, but how they are positioned to do that varies. The post Different Types of CISOs, Diverse Missions appeared first on Security Boulevard.

CISO 119
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

LogoFAIL bugs in UEFI code allow planting bootkits via images

Bleeping Computer

Multiple security vulnerabilities collectively named LogoFAIL affect image-parsing components in the UEFI code from various vendors. Researchers warn that they could be exploited to hijack the execution flow of the booting process and to deliver bootkits. [.

115
115
article thumbnail

Black Basta Extortion Group Racks Up $107 Million in Ransom Payments

Security Boulevard

Anyone who wonders why the threat of ransomware continues to grow need only to take a look at Black Basta, the prolific extortion gang that last year likely rose from the ashes of the high-profile Russian group Conti. Black Basta has raked in at least $107 million in ransom payments in Bitcoin since early 2022. The post Black Basta Extortion Group Racks Up $107 Million in Ransom Payments appeared first on Security Boulevard.

article thumbnail

Exploiting XPath Injection Weaknesses

NetSpi Technical

Welcome to the world of XPath Injection, a significant threat in web applications. XPath Injection occurs when applications construct XPath queries for XML data without proper validation, allowing attackers to exploit user input. This vulnerability enables unauthorized access to sensitive data, authentication bypass, and application logic interference.

article thumbnail

Executives behaving badly: 5 ways to manage the executive cyberthreat

We Live Security

Failing to practice what you preach, especially when you are a juicy target for bad actors, creates a situation fraught with considerable risk

Risk 123
article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

Not all cybercriminals are evil geniuses

Graham Cluley

I thought some of you might enjoy this. Here’s a video of a recent after-dinner talk I gave, exploring (in a hopefully fun way!) whether cybercriminals are quite as smart as we sometimes think they are. Are malicious hackers geniuses? Are they all evil?

article thumbnail

Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws

The Hacker News

Apple has released software updates for iOS, iPadOS, macOS, and Safari web browser to address two security flaws that it said have come under active exploitation in the wild on older versions of its software.

article thumbnail

Zyxel warns of multiple critical vulnerabilities in NAS devices

Bleeping Computer

Zyxel has addressed multiple security issues, including three critical ones that could allow an unauthenticated attacker to execute operating system commands on vulnerable network-attached storage (NAS) devices. [.

98
article thumbnail

CIO in the Age of AI: A Title Under Threat?

SecureWorld News

The role of the Chief Information Officer has undergone significant transformations over the past few decades, driven by the rapid advancements in technology. With the advent of artificial intelligence (AI), machine learning (ML), and generative AI, questions have arisen regarding the continued relevance of the CIO title and whether it accurately reflects the evolving nature of the job.

CISO 99
article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

Google Unveils RETVec - Gmail's New Defense Against Spam and Malicious Emails

The Hacker News

Google has revealed a new multilingual text vectorizer called RETVec (short for Resilient and Efficient Text Vectorizer) to help detect potentially harmful content such as spam and malicious emails in Gmail.

102
102
article thumbnail

WhatsApp's new Secret Code feature hides your locked chats

Bleeping Computer

WhatsApp has introduced a new Secret Code feature that allows users to hide their locked chats by setting a custom password. [.

Passwords 114
article thumbnail

Smashing Security podcast #350: Think before you shrink! And our guest is faked

Graham Cluley

Don’t minimise your Teams Meeting video call too hastily, you might reveal your dirty secrets! Would you be prepared to pay for Facebook and Instagram? And who is being faked to promote cryptocurrency scams? All this and much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by technology journalist Jane Wakefield.

article thumbnail

Google Chrome Patches Sixth Zero-Day of the Year

SecureWorld News

Google recently rushed out another emergency patch for a Zero-Day vulnerability in its Chrome browser that cybercriminals were actively exploiting in attacks prior to a fix being available. The flaw, tracked as CVE-2023-6345 , marks the sixth Chrome Zero-Day exploit in 2023 and showcases a growing trend in major browsers suffering Zero-Day attacks. This mounting crisis underscores how cyber adversaries have now turned core web browsers into a prime target.

Spyware 91
article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.

article thumbnail

Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP Devices

The Hacker News

Zyxel has released patches to address 15 security issues impacting network-attached storage (NAS), firewall, and access point (AP) devices, including three critical flaws that could lead to authentication bypass and command injection. The three vulnerabilities are listed below - CVE-2023-35138 (CVSS score: 9.

article thumbnail

LogoFAIL attack can install UEFI bootkits through bootup logos

Bleeping Computer

Multiple security vulnerabilities collectively named LogoFAIL affect image-parsing components in the UEFI code from various vendors. Researchers warn that they could be exploited to hijack the execution flow of the booting process and to deliver bootkits. [.

85
article thumbnail

Process Stomping: execute shellcode on an executable’s section

Penetration Testing

Process Stomping A variation of ProcessOverwriting to execute shellcode on an executable’s section What is it Process Stomping, is a variation of hasherezade’s Process Overwriting and it has the advantage of writing a shellcode payload on... The post Process Stomping: execute shellcode on an executable’s section appeared first on Penetration Testing.

article thumbnail

US govt sanctions North Korea’s Kimsuky hacking group

Bleeping Computer

The Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned the North Korean-backed Kimsuky hacking group for stealing intelligence in support of the country's strategic goals. [.

Hacking 84
article thumbnail

Enhance Innovation and Governance Through the Cloud Development Maturity Model

Leverage the Cloud Development Environment Maturity Model to elevate your software development practices with scalable, secure cloud-based workspaces. This model offers a structured approach to modernizing development, aligning technology, developer experience, security, and workflows. By implementing Cloud Development Environments (CDEs), teams can boost efficiency, improve security, and streamline operations through centralized governance.