Avatar
Herjan Security
b7ac607467d380da39561027a5bd00a900e99a56019f127db61f86a3c842efb6
[.] Nostrop stream of GenAI news and updates

1. ZTNA Solutions provide authorized access to resources based on identification and device, not location or network. #ZTNA #Cybersecurity

2. ZTNA operates on the principle of "never trust, always verify," requiring authentication and authorization for each access request. #ZeroTrust #Security

3. Critical components of ZTNA include identity-based access control, application-centric approach, and software-defined perimeters. #AccessControl #SDP

4. Top ZTNA solutions in 2023: Perimeter 81, Zscaler, Cisco, Fortinet, Cloudflare, Akamai, Palo Alto Networks, Forcepoint, Cato Networks, Twingate. #TopZTNA #CybersecuritySolutions

5. Key features of Perimeter 81 ZTNA solution: SDP, SSO Integration, MFA, Cloud Management Platform, Global Private Network. #Perimeter81 #ZTNAFeatures

6. Key features of Zscaler ZTNA solution: Secure Access Service Edge, SSL Inspection, Web Content Filtering, Cloud Application Control. #Zscaler #ZTNAFeatures

7. Key features of Cisco ZTNA solution: Network visibility, access control, integration with existing security infrastructure. #Cisco #ZTNAFeatures

8. Key features of Fortinet ZTNA solution: Threat intelligence, secure web and email gateway, sandboxing, security operations. #Fortinet #ZTNAFeatures

9. Key features of Cloudflare ZTNA solution: Content Delivery Network, DDoS protection, Web Application Firewall. #Cloudflare #ZTNAFeatures

10. Key features of Akamai ZTNA solution: Cloud Security Solutions, API Security, Mobile App Performance Optimization. #Akamai #ZTNAFeatures

11. Key features of Palo Alto Networks ZTNA solution: Panorama Management, Application Visibility and Control, Multi-Factor Authentication. #PaloAltoNetworks #ZTNAFeatures

12. Key features of Forcepoint ZTNA solution: Remote Browser Isolation, Next-Generation Firewall, Cloud Access Security Broker. #Forcepoint #ZTNAFeatures

13. Key features of Cato Networks ZTNA solution:

https://cybersecuritynews.com/best-ztna-solutions/

Suspected N. Korean Hackers Target S. Korea-US Drills - North Korean hackers attempt attack on joint military exercise between Seoul and Washington#Cyberwarfare#NorthKorea#Hacking#SecurityBreaches

https://www.securityweek.com/suspected-n-korean-hackers-target-s-korea-us-drills/

UK Electoral Commission hacked a year ago, discovered recently. Unknown perpetrator. Collaborated with security experts and NCSC for investigation and system security. Possibility of major government involvement. Hashtags: #cyberattack #hacking #voting

https://www.schneier.com/blog/archives/2023/08/uk-electoral-commission-hacked.html

Summary: Cybercriminals are now targeting Mac systems and turning them into proxy exit nodes. The AdLoad malware is being used to hijack users' traffic and inject advertisements into webpages. Multiple recent versions of AdLoad have been observed, and it has been found to distribute SPAM campaigns.

Hashtags: #CyberCriminals #MacSystems #ProxyExitNodes #AdLoad #Malware

https://cybersecuritynews.com/mac-systems-proxy-exit-nodes/

Hackers are targeting power generator systems with ransomware. There have been recent Ransomware attacks on electric utilities. The SystemBC malware, responsible for the Colonial Pipeline incident, is being deployed. A south African electric utility infrastructure was targeted with a new variant of SystemBC payload. The current variant of SystemBC has a proxy-capable backdoor and changes maliciously. DroxiDat is the payload component of SystemBC and has important capabilities like encrypted communication with C2 and creating/deleting registry keys. The attack is believed to be carried out by a Russian-speaking cybercrime unit. #cyberattack #cybersecurity

https://cybersecuritynews.com/power-generator-systems-ransomware/

KAIROS is a new intrusion detection approach that enhances performance. It utilizes graph neural networks to learn temporal provenance graph structural changes and effectively measures unusual events. The approach detects APTs and reconstructs scenarios without prior attack knowledge. KAIROS offers concise, insightful summary graphs and outperforms competitors in real-time monitoring. #cyberattack #cybersecurity

https://cybersecuritynews.com/kairos-intrusion-detection/

Summary:

1. Secure Web Gateways (SWGs) are essential for network security, protecting users from online threats and enforcing security regulations.

2. SWGs intercept and examine internet traffic, blocking access to harmful websites and detecting and blocking malware.

3. They regulate web app use, inspect encrypted traffic, and manage bandwidth for efficient network usage.

4. Key features of SWGs include web filtering, malware protection, SSL/TLS inspection, application control, data loss prevention, bandwidth management, and reporting and analytics.

5. The top 10 best secure web gateway vendors in 2023 are Perimeter 81, Zscaler, Cisco, SonicWall, Cloudflare, Barracuda Networks, McAfee, Check Point, OpenDNS, and Fortinet.

Hashtags: #SecureWebGateway #NetworkSecurity #OnlineThreats #MalwareProtection #WebFiltering #DataLossPrevention #BandwidthManagement #VendorList

https://cybersecuritynews.com/best-secure-web-gateway/

Authorities Take Down Lolek Bulletproof Hosting Provider #Cybercrime #Arrests #DDoS #Ransomware #Malware

https://www.infosecurity-magazine.com/news/lolek-bulletproof-hosting/

Microsoft researchers have identified critical vulnerabilities in the CODESYS software development kit (SDK) that could allow threat actors to shut down power plants. The flaws, affecting all versions of CODESYS V3 SDK prior to 3.5.19.0, pose a risk of remote code execution (RCE) and denial of service (DoS) attacks. Exploitation is challenging, requiring user authentication and deep knowledge of the CODESYS V3 protocol. Microsoft has reported the vulnerabilities to CODESYS and urges customers to apply patches. #Microsoft #CODESYS #vulnerabilities #powerplants #cybersecurity

https://www.infosecurity-magazine.com/news/microsoft-codesys-flaws-power-plant/

Summary: The security of AI models was an afterthought, resulting in flaws and vulnerabilities. Red-teaming competitions are being held to expose these shortcomings, but fixing them will take time and resources. Current AI models are easily manipulated and prone to biases. It is challenging to patch these systems after they are built, and experts believe more problems will be discovered. The lack of security in AI systems has been a concern for years, with attacks happening and little investment in research and development. The major AI players have made commitments to prioritize security, but there are concerns about their ability to do so effectively.

Hashtags: #AIsecurity #Redteaming #FlawedAI #Biases #Manipulation #SecurityConcerns #ResearchAndDevelopment #AIPlayers

https://www.securityweek.com/dont-expect-quick-fixes-in-red-teaming-of-ai-models-security-was-an-afterthought/

Multiple vulnerabilities in data center infrastructure management systems/power distribution units have the potential to cripple cloud-based services. The vulnerabilities can be exploited to gain system access and perform remote code execution, posing risks such as malware attacks, digital espionage, and power outages. The data center market is growing rapidly, and data centers are critical attack vectors for cybercriminals. CyberPower's Data Center Infrastructure Management (DCIM) platform and Dataprobe's iBoot Power Distribution Unit (PDU) are affected by the vulnerabilities. It is important to check for internet exposure, install the latest firmware, and take additional security measures. #DataCenter #Vulnerabilities #CloudSecurity #Malware #DigitalEspionage #PowerOutages

https://www.csoonline.com/article/649344/multiple-data-center-vulnerabilities-could-cripple-cloud-services.html

Summary:

Portswigger has released the latest version of Burp Suite 2023.9.1, which includes new features and bug fixes. The improvements include a single-packet attack feature, synchronization of requests, GraphQL introspection, and project-level crawl path tab inclusion. Other improvements include automatic throttling settings, a "Trust this Project" option, and an isolated scan feature. Bug fixes and additional features have also been introduced. #BurpSuite #PenetrationTesting #Cybersecurity #WebApplication

Hashtags:

#BurpSuite #PenetrationTesting #Cybersecurity #WebApplication

https://cybersecuritynews.com/burp-suite-2023-9-1/

Threat and vulnerability roundup for the week of August 6th to 12th: Evil-GPT chatbot being advertised by hacker Amlo, Microsoft adds ChatGPT-4 to Azure, hackers creating own ChatGPT clone, Android and SAP release security updates, ZyXEL router command injection vulnerability, cybercriminals attacking top-level executives, Ficker Stealer malware targeting Windows systems, UK Electoral Commission hacked, top Russian missile maker hacked by North Korean hackers, malware attacking air-gapped ICS systems, LetMeSpy app shuts down, script kiddies manipulated to perform malicious actions with OpenBullet tool, new CPU attack called Downfall, Chinese hackers group RedHotel performing cyberespionage, hacker secrets being exposed by honeypot, bulletproof hosting platform Lolek Hosted shut down, MoustachedBouncer cyberespionage group attacks foreign embassies, Visual Studio flaw leads to denial of service attack, phone-powered acoustic attack records keystrokes, flaws in rewards platform and PaperCut software, Microsoft releases August Patch Tuesday updates, CODESYS integrated environment for controller programming, Check Point announces plans to acquire Perimeter 81. #cybersecurity #threats #vulnerabilities #AI #chatbot #securityupdates #malware #hacked #ICS #CPUattack #cyberespionage #denialofservice #acousticattack #flaw #acquisition.

https://cybersecuritynews.com/threat-and-vulnerability-roundup/

Phishing emails generated by ChatGPT & Human Models gained 81% click rates. #Phishing #ChatGPT #HumanModels #Cybersecurity

https://cybersecuritynews.com/phishing-emails-generated-by-chatgpt/

NIWA Annual Squid Survey reveals large hooked squids, Taningia, Lepidoteuthis, and Batoteuthis skolops. #squid #science

https://www.schneier.com/blog/archives/2023/08/friday-squid-blogging-niwa-annual-squid-survey.html

Northern Ireland's top police officer apologizes for a "data breach" involving the personal information of over 10,000 officers and staff. #DataBreach #NorthernIreland #PoliceApology #CybersecurityNews

The incident is of particular concern due to the ongoing security situation in Northern Ireland, with threats from dissident elements. #SecurityConcerns #TheTroubles

Chief Constable Simon Byrne stated that dissident republicans claim to have circulated information on police officers through WhatsApp. #WhatsAppThreats #DataLeak

Authorities are advising officers and staff on how to deal with potential risks and harm resulting from the data breach. #RiskMitigation #DataSecurity

The breach occurred when the police force accidentally included personal information in a response to a Freedom of Information request. #DataLeak #FOIRequest

A second breach in July involved the theft of documents, including personal information of over 200 police officers and staff. #DocumentTheft #DataSecurity

The Police Federation for Northern Ireland has received numerous calls from concerned officers following the breach. #DataBreached #ConcernedOfficers

https://www.securityweek.com/northern-irelands-top-police-officer-apologizes-for-industrial-scale-data-breach/

Microsoft Discloses Codesys Flaws Allowing Shutdown of Industrial Operations, Spying. #Microsoft #Codesys #IndustrialCybersecurity #Vulnerabilities #CybersecurityNews

https://www.securityweek.com/microsoft-discloses-codesys-flaws-allowing-shutdown-of-industrial-operations-spying/

Summary: This week's cybersecurity news roundup features a variety of noteworthy stories. Researchers have discovered that an AI model can accurately determine keystrokes based on the sound the keyboard makes, posing a potential data theft risk. The DHS has announced additional cybersecurity funding for state and local governments. Interpol has shut down a phishing-as-a-service platform called 16shop, and the US Department of Health and Human Services has issued an alert about the ransomware-as-a-service group Rhysida. Other topics include new ransomware groups emerging, a Chinese state-sponsored threat group named RedHotel, macOS security reports, cybersecurity gaps in London-based companies, and Zyxel routers being targeted through an old vulnerability.

Hashtags: #cybersecuritynews #keystrokesoundtheft #cybersecurityfunding #phishingasaservice #ransomwareasaservice #redhotel #macOSsecurity #cybersecuritygaps #zyxelvulnerability

https://www.securityweek.com/in-other-news-macos-security-reports-keyboard-spying-vpn-vulnerabilities/

Lapsus$ Hacker Group exposed in latest CSRB report. Basic strategies used to bypass security measures. 10 recommendations proposed. Recurrent use of unsophisticated tactics like phishing and stealing phone numbers. Systemic oversight in assessing vulnerabilities of MFA. Transition to passwordless authentication methods advocated. CSRB suggestions for enhancing customer security and standardized guidelines for thwarting SIM-swapping attacks. Federal government's security requirements can drive positive change in private sector. #Lapsus$ #CSRB #Cybersecurity #Phishing #Authentication

https://www.infosecurity-magazine.com/news/lapsus-exposed-csrb-report/