Mon.Aug 12, 2024

article thumbnail

MY TAKE: Black Hat USA 2024’s big takeaway – GenAI factors into the quest for digital resiliency

The Last Watchdog

LAS VEGAS – Here’s what I discovered last week here at Black Hat USA 2024 : GenAI is very much in the mix as a potent X-factor in cybersecurity. Related: Prioritizing digital resiliency I spoke with over three dozen cybersecurity solution providers. Some of the more intriguing innovations had to do with leveraging GenAI/LLM-equipped chatbots as proprietary force multipliers.

Software 290
article thumbnail

Taxonomy of Generative AI Misuse

Schneier on Security

Interesting paper: “ Generative AI Misuse: A Taxonomy of Tactics and Insights from Real-World Data “: Generative, multimodal artificial intelligence (GenAI) offers transformative potential across industries, but its misuse poses significant risks. Prior research has shed light on the potential of advanced AI systems to be exploited for malicious purposes.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: Criminal IP and Maltego team up to broaden threat intelligence data search

The Last Watchdog

Torrance, Calif., Aug. 12, 2024, CyberNewsWire — Criminal IP , an expanding Cyber Threat Intelligence (CTI) search engine from AI SPERA, has recently completed its technology integration with Maltego , a global all-in-one investigation platform that specializes in visualized analysis of combined cyber data. This collaboration integrates Criminal IP’s comprehensive database of malicious IPs, domains, and CVEs directly into Maltego’s unified user interface and adds Criminal IP to Malte

Media 130
article thumbnail

Secureworks Fills Australian Mid-Market Demand for Simplified Cyber Security Solutions

Tech Republic Security

The CEO of a burgeoning cybersecurity firm spoke to TechRepublic about XDR, ransomware, the Crowdstrike outage and what organisations can do to prepare for cyberattacks.

Marketing 143
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

A FreeBSD flaw could allow remote code execution, patch it now!

Security Affairs

FreeBSD Project maintainers addressed a high-severity flaw in OpenSSH that could allow remote code execution with elevated privileges. The maintainers of the FreeBSD Project have released urgent security updates to address a high-severity flaw, tracked as CVE-2024-7589, (CVSS score of 7.4) in OpenSSH. A remote attacker could exploit the vulnerability to execute arbitrary code with elevated privileges.

article thumbnail

Common Business-Related Phishing Scams Include Fake HR and IT Subject Lines

Tech Republic Security

KnowBe4 Security Awareness Advocate Erich Kron talked to TechRepublic about the importance of assessing a seemingly urgent email before clicking any links.

Scams 135

More Trending

article thumbnail

FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability

The Hacker News

The maintainers of the FreeBSD Project have released security updates to address a high-severity flaw in OpenSSH that attackers could potentially exploit to execute arbitrary code remotely with elevated privileges. The vulnerability, tracked as CVE-2024-7589, carries a CVSS score of 7.4 out of a maximum of 10.0, indicating high severity.

131
131
article thumbnail

Microsoft found OpenVPN bugs that can be chained to achieve RCE and LPE

Security Affairs

Microsoft found four bugs in OpenVPN that could be chained to achieve remote code execution and local privilege escalation. During the Black Hat USA 2024 conference, Microsoft researchers disclosed multiple medium-severity bugs in the open-source project OpenVPN that could be chained to achieve remote code execution (RCE) and local privilege escalation (LPE).

article thumbnail

Security Flaw in PostgreSQL: CVE-2024-7348 Allows Arbitrary SQL Execution

Penetration Testing

The PostgreSQL project has issued a security advisory, warning users of a serious vulnerability (CVE-2024-7348). The flaw, which carries a CVSS score of 8.8, exposes users to the risk of... The post Security Flaw in PostgreSQL: CVE-2024-7348 Allows Arbitrary SQL Execution appeared first on Cybersecurity News.

Risk 120
article thumbnail

Survey: Cybersecurity Teams Investing in Automation to Reduce Noise Levels

Security Boulevard

A global survey of 300 IT and security professionals suggests that while security budgets are increasing the way funding is being allocated is shifting as organizations look to automate workflows. The post Survey: Cybersecurity Teams Investing in Automation to Reduce Noise Levels appeared first on Security Boulevard.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

CVE-2024-22116 (CVSS 9.9): Critical RCE Vulnerability Found in Zabbix Monitoring Solution

Penetration Testing

Zabbix, a widely-adopted open-source solution for enterprise-level IT infrastructure monitoring, has disclosed a critical security vulnerability that could lead to full system compromise. The vulnerability, identified as CVE-2024-22116 and assigned... The post CVE-2024-22116 (CVSS 9.9): Critical RCE Vulnerability Found in Zabbix Monitoring Solution appeared first on Cybersecurity News.

article thumbnail

AI Integration, Budget Pressures Challenge CISOs

Security Boulevard

Chief information security officers (CISOs) are struggling to manage cybersecurity effectively due to a lack of strategic support from other C-suite executives, according to a LevelBlue survey of 1,050 C-suite and senior executives. The post AI Integration, Budget Pressures Challenge CISOs appeared first on Security Boulevard.

CISO 115
article thumbnail

Ukraine Warns of New Phishing Campaign Targeting Government Computers

The Hacker News

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign that masquerades as the Security Service of Ukraine to distribute malware capable of remote desktop access. The agency is tracking the activity under the name UAC-0198.

article thumbnail

DOJ Shuts Down Another North Korean ‘Laptop Farm’

Security Boulevard

The DOJ shut down another "laptop farm" link to a North Korean fake IT worker scam that the country uses to illegally bring in money for its nuclear and ballistic weapons program and to steal information from unsuspecting companies in the United States and elsewhere. The post DOJ Shuts Down Another North Korean ‘Laptop Farm’ appeared first on Security Boulevard.

Scams 111
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Researchers Uncover Vulnerabilities in Solarman and Deye Solar Systems

The Hacker News

Cybersecurity researchers have identified a number of security shortcomings in photovoltaic system management platforms operated by Chinese companies Solarman and Deye that could enable malicious actors to cause disruption and power blackouts.

article thumbnail

The Value in Root Cause Analysis for Vulnerability Management

Security Boulevard

Identifying and addressing underlying issues and their root causes can lead to risk reduction, cost savings and better overall performance of a vulnerability management program. The post The Value in Root Cause Analysis for Vulnerability Management appeared first on Security Boulevard.

Risk 104
article thumbnail

How Phishing Attacks Adapt Quickly to Capitalize on Current Events

The Hacker News

In 2023, no fewer than 94 percent of businesses were impacted by phishing attacks, a 40 percent increase compared to the previous year, according to research from Egress. What's behind the surge in phishing?

Phishing 108
article thumbnail

The BlackSuit ransomware gang has demanded over $500 million since 2022

Graham Cluley

A notorious ransomware group has demanded more than half a billion dollars from victims in less than two years. Read more in my article on the Hot for Security blog.

article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

Indirect prompt injection in the real world: how people manipulate neural networks

SecureList

What is prompt injection? Large language models (LLMs) – the neural network algorithms that underpin ChatGPT and other popular chatbots – are becoming ever more powerful and inexpensive. For this reason, third-party applications that make use of them are also mushrooming, from systems for document search and analysis to assistants for academic writing, recruitment and even threat research.

article thumbnail

Norton Secure VPN vs NordVPN (2024): Which VPN Is the Best?

Tech Republic Security

Compare Norton Secure VPN and NordVPN based on speed, server options, privacy and support to learn which is better.

VPN 114
article thumbnail

The great location leak: Privacy risks in dating apps

We Live Security

Convenience may come at a cost – such as when your favorite app reveals your exact coordinates to someone you’d rather keep at a distance.

Risk 108
article thumbnail

The AI Hangover is Here – The End of the Beginning

The Hacker News

After a good year of sustained exuberance, the hangover is finally here. It’s a gentle one (for now), as the market corrects the share price of the major players (like Nvidia, Microsoft, and Google), while other players reassess the market and adjust priorities. Gartner calls it the trough of disillusionment, when interest wanes and implementations fail to deliver the promised breakthroughs.

article thumbnail

Bringing the Cybersecurity Imperative Into Focus

Tech leaders today are facing shrinking budgets and investment concerns. This whitepaper provides insights from over 1,000 tech leaders on how to stay secure and attract top cybersecurity talent, all while doing more with less. Download today to learn more!

article thumbnail

BYOVDLL: New Exploit Bypasses Microsoft’s LSASS Defenses

Penetration Testing

In July 2022, Microsoft made modifications to its Protected Process Light (PPL) system aimed at mitigating a vulnerability that allowed bypassing the protection of LSASS, a critical process responsible for... The post BYOVDLL: New Exploit Bypasses Microsoft’s LSASS Defenses appeared first on Cybersecurity News.

article thumbnail

Spotlight on Cybersecurity Leaders: Hemanth Tadepalli

SecureWorld News

In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. Hemanth Tadepalli is a a cybersecurity expert with experience across various sectors of security.

article thumbnail

Akamai Unveils New VPN Post-Exploitation Techniques: Major Vulnerabilities Discovered in Ivanti and FortiGate VPNs

Penetration Testing

Akamai researchers have exposed a series of vulnerabilities and techniques that could allow threat actors to further escalate their attacks after compromising a Virtual Private Network (VPN) server. The analysis... The post Akamai Unveils New VPN Post-Exploitation Techniques: Major Vulnerabilities Discovered in Ivanti and FortiGate VPNs appeared first on Cybersecurity News.

VPN 91
article thumbnail

AI girlfriends want to know all about you. So might ChatGPT (Lock and Code S05E17)

Malwarebytes

This week on the Lock and Code podcast… Somewhere out there is a romantic AI chatbot that wants to know everything about you. But in a revealing overlap, other AI tools—which are developed and popularized by far larger companies in technology—could crave the very same thing. For AI tools of any type, our data is key. In the nearly two years since OpenAI unveiled ChatGPT to the public, the biggest names in technology have raced to compete.

article thumbnail

Introducing CDEs to Your Enterprise

Explore how enterprises can enhance developer productivity and onboarding by adopting self-hosted Cloud Development Environments (CDEs). This whitepaper highlights the simplicity and flexibility of cloud-based development over traditional setups, demonstrating how large teams can leverage economies of scale to boost efficiency and developer satisfaction.

article thumbnail

New Phishing Campaign Deploys PureHVNC and Other Malware, Targets Sensitive Data

Penetration Testing

Cybersecurity researchers from FortiGuard Labs have discovered a sophisticated phishing campaign that utilizes a multi-stage execution flow and various evasion techniques to deliver multiple strains of malware, including the remote... The post New Phishing Campaign Deploys PureHVNC and Other Malware, Targets Sensitive Data appeared first on Cybersecurity News.

article thumbnail

Top 6 Craigslist scams: Don’t fall for these tricks

We Live Security

Here’s how to spot and dodge scams when searching for stuff on the classified ads website that offers almost everything under the sun

Scams 90
article thumbnail

USENIX Security ’23 – DISTDET: A Cost-Effective Distributed Cyber Threat Detection System

Security Boulevard

Authors/Presenters:Feng Dong, Liu Wang Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott ; and via the organizations YouTube channel.

article thumbnail

New APT Group ‘Actor240524’ Targets Azerbaijan and Israel with Advanced Tactics

Penetration Testing

A sophisticated cyber espionage campaign targeting Azerbaijan and Israel has been linked to a previously unidentified advanced persistent threat (APT) group, designated as ‘Actor240524’ by NSFOCUS Security Labs. Actor240524 distinguishes... The post New APT Group ‘Actor240524’ Targets Azerbaijan and Israel with Advanced Tactics appeared first on Cybersecurity News.

article thumbnail

IT Leadership Agrees AI is Here, but Now What?

IT leaders are experiencing rapid evolution in AI amid sustained investment uncertainty. As AI evolves, enhanced cybersecurity and hiring challenges grow. This whitepaper offers real strategies to manage risks and position your organization for success.