Deepfakes are on the rise and may impact the 2024 presidential elections. Deepfakes are digitally manipulated images and videos that impersonate someone's likeness. There is concern that deepfakes can be used to spread false information and influence voters. Tech giants and state legislatures are taking steps to combat the spread of deepfakes. AI is being used to detect deepfakes by analyzing data and comparing it to authenticated content. The potential impact of deepfakes on elections is significant, and it is crucial to harness AI's power to minimize their effects. #Deepfakes #2024Elections
https://www.infosecurity-magazine.com/opinions/deepfakes-impact-presidential/
OWASP ZAP 2.14.0 is a free and open-source web application security scanner, offering support for Host Header Manipulation, ZAPit, API File Transfers, Graal JS Add-on Access, Postman collections, SBOMs, and more. The update includes the option to manipulate host headers and a new command line option called -zapit for a quick reconnaissance scan. ZAP now supports file transfers through the API and recommends using the Graal JS add-on for JavaScript support. The release also includes dependency updates and the addition of the Postman add-on. #OWASP #ZAP #websecurity #hostheadermanipulation #API #filetransfers #GraalJS #SBOM #Postman.
https://cybersecuritynews.com/owasp-zap-2-14-0-released-whats-new/
A new supply-chain attack targeted users of Telegram, AWS, and Alibaba Cloud services. Threat actors used Typosquatting and Startjacking techniques to trick developers into downloading malicious packages from Pypi. The attack was active throughout September 2023. The malicious packages were disguised as popular packages like "Telethon" and "enumerate-iam," but contained hidden lines of code that executed when specific functions were called. The attack aimed to steal sensitive credentials. #supplychainattack #Telegram #AWS #AlibabaCloud #Typosquatting #Startjacking #Pypi #Cybersecurity
https://cybersecuritynews.com/telegram-aws-alibaba-supply-chain-attack/
Students hacking the high school grading system is a result of school policies that make it difficult for low-performing students to fail. Some school districts have a grading floor, allowing students to pass with very minimal effort. For example, even if work is never done, students cannot receive lower than a 50 percent on any assignment. This creates a scenario where students can skip over 100 days, complete a few assignments, and still pass. The hack takes advantage of the fact that if a student needs two-thirds of the points to pass, a zero work results in a 50% grade, requiring only a small amount of work to pass. #HighSchoolGrading #HackingTheSystem #GradingPolicies
https://www.schneier.com/blog/archives/2023/10/hacking-the-high-school-grading-system.html
Microsoft has launched a new bug bounty program for its AI-powered Bing, offering rewards of up to $15,000. The program covers vulnerabilities in bing.com, the Edge browser, Microsoft Start Application, and Skype mobile applications. Vulnerabilities such as inference manipulation, model manipulation, and information disclosure are within the scope of the program. Submissions should identify previously unreported critical or important vulnerabilities and include clear details and steps to reproduce. #Microsoft #AI #BugBounty #Bing
Note: The text provided is quite lengthy and contains a lot of irrelevant content, making it difficult to create a coherent summary. I have extracted relevant information related to the Microsoft bug bounty program for Bing.
https://www.securityweek.com/microsoft-offers-up-to-15000-in-new-ai-bug-bounty-program/
Dozens of Squid Proxy Vulnerabilities Remain Unpatched 2 Years After Disclosure. Squid is a widely used open-source proxy with numerous security holes. Researcher Joshua Rogers identified 55 vulnerabilities, with 35 remaining unpatched. These vulnerabilities can lead to crashes and code execution. The Squid team is understaffed and lacks resources to fix the issues. There are over 2.5 million exposed Squid instances on the internet. #SquidProxy #Vulnerabilities
New Phishing Campaign Uses LinkedIn Smart Links in Blanket Attack. Over 800 emails were sent between July and August 2023, using various subject themes. The financial, manufacturing, and energy sectors were the top targets. LinkedIn Smart Links bypass security email gateways and can be used for credential phishing. Employees should be trained to avoid clicking on suspicious links. Hashtags: #Phishing #LinkedIn #SmartLinks #Cybersecurity
https://www.infosecurity-magazine.com/news/new-phishing-campaign-uses/
Microsoft announced an AI Bug Bounty program that rewards up to $15,000. The program aims to improve the AI Power Bing experience. Bounty awards are available for AI-powered Bing experiences on various platforms. Microsoft works closely with security researchers to protect its customers from attacks. The company offers recognition and rewards for researchers who contribute to fixing vulnerabilities. #Microsoft #AI #BugBounty #CyberSecurityNews #Vulnerability
https://cybersecuritynews.com/microsoft-ai-bug-bounty-program/
Google has released a security update for Chrome addressing a critical user-after-free site isolation flaw. The update contains 20 security fixes. Medium severity vulnerabilities have also been addressed. To avoid exploitation, users are advised to update to the latest version of Chrome. #cybersecurity #vulnerability
Air Europa has asked customers to cancel their payment cards due to a data breach. The breach compromised customers' card details, including their long card number, CVV number, and expiry date. The airline has not specified the system that was breached or the number of impacted customers. There is no evidence of fraudulent use, but it is recommended to cancel and replace the cards. The breach may have been a Magecart attack. Air Europa has been fined in the past for failing to notify customers of a breach.
#AirEuropa #DataBreach #PaymentCards #Magecart
https://www.infosecurity-magazine.com/news/air-europa-customers-cancel-cards/
October Patch Tuesday addresses three zero-day vulnerabilities, including an elevation of privilege vulnerability in Skype, an information disclosure vulnerability in WordPad, and a denial of service vulnerability called Rapid Reset.
#PatchTuesday #ZeroDay #Skype #WordPad #RapidReset
https://www.infosecurity-magazine.com/news/october-patch-tuesday-three/
Cloudflare experienced a massive DDoS attack, reaching over 201 million requests per second. The attack, initiated by a botnet of 20,000 machines, posed a significant challenge. Cloudflare, along with Google and AWS, collaborated to address the issue. The attack exploited vulnerabilities in the HTTP/2 protocol, particularly rapid request resets. Cloudflare took multiple actions to mitigate the attacks, including extending its IP Jail system and changing stream concurrency settings. Their commitment to providing DDoS protection remains unwavering. #cybersecurity #DDoS #HTTP2 #vulnerabilities
SAP released security patches for October 2023, fixing 7 vulnerabilities including XSS, log injection, and information disclosure. #SAP #security #vulnerabilities #XSS #loginjection #informationdisclosure
Summary:
- Security management across SaaS clouds is challenging due to malware and ransomware attacks.
- Standardized configuration practices are lacking, leading to data leakage between systems.
- SaaS usage has surged, requiring robust security solutions.
- SaaS applications are vulnerable to cyberattacks.
- SaaS security tools ensure data protection, remote work security, and compliance with data laws.
- Secure data in SaaS through authentication, encryption, updates, backups, and incident response planning.
- Key features of SaaS security tools include data protection, access management, third-party integration, and monitoring.
- Top 10 SaaS security tools: DoControl, Splunk, Zscaler, Qualys, Proofpoint, Veracode, Okta, Trend Micro, CrowdStrike, Cloudflare.
Hashtags: #SaaSsecurity #cybersecurity #dataprivacy #remotework #vulnerabilitymanagement #encryption #accesscontrol #incidentresponse #SaaSprotection #cloudsecurity
Siemens and Schneider Electric released advisories addressing over 40 vulnerabilities in their products, including the Ruggedcom APE1808 industrial application hosting platform. These vulnerabilities exist in the Nozomi Networks Guardian product and Central Management Console. Siemens is working on patches, but in the meantime, workarounds and mitigations are available. The vulnerabilities can lead to information disclosure, arbitrary code execution, user session hijacking, and denial-of-service attacks. The advisories also address critical vulnerabilities in Scalance W1750D, Simcenter Amesim, and Sicam A8000 remote terminal units. Schneider Electric released advisories for vulnerabilities in SpaceLogic C-Bus Toolkit and EcoStruxure products. #ICS #cybersecurity #vulnerabilities
Model Extraction Attack on Neural Networks: Adi Shamir et al. have developed a new attack that can extract the parameters of deep neural networks (DNNs) with high precision in a polynomial amount of time. The attack improves upon previous methods and has been successfully applied to a full-sized neural network. #ModelExtraction #NeuralNetworks #Attack
#SchneieronSecurity
https://www.schneier.com/blog/archives/2023/10/model-extraction-attack-on-neural-networks.html
Summary: Adobe released patches for multiple security vulnerabilities in Adobe Commerce, Magento Open Source, and Adobe Photoshop. The flaws could lead to code execution, privilege escalation, arbitrary file system read, and security feature bypass. No known exploits for these vulnerabilities have been reported.
Hashtags: #Adobe #SecurityFlaws #CodeExecution #PrivilegeEscalation #FileSystemRead #SecurityFeatures #PatchTuesday
https://www.securityweek.com/patch-tuesday-code-execution-flaws-in-adobe-commerce-photoshop/
1. The ongoing war between Israel and Hamas is impacting the cybersecurity industry.
2. Israeli cybersecurity firms, especially smaller and new companies, are being affected by the war.
3. Manpower is being depleted as many professionals have been called up for reserve duty.
4. Cybersecurity companies are canceling funding announcements and events due to the war.
5. The Israeli tech sector has been quick to volunteer their services to assist in recovery missions.
6. The war will have a longer-term impact on product development and funding for startups.
7. The larger cybersecurity companies with headquarters outside of Israel are less likely to be affected.
8. The Israeli cybersecurity industry employs over 20,000 people and contributes significantly to the economy.
9. The war with Hamas is diverting attention and resources away from the cybersecurity sector.
10. New companies and R&D in Israel will face delays and challenges due to the ongoing conflict.
#Israel #HamasWar #Cybersecurity #StartupFunding #ManpowerDepletion #TechIndustry #ProductDevelopment #CybersecurityIndustry #Impact #R&D
https://www.securityweek.com/the-israel-hamas-war-and-its-effect-on-the-cybersecurity-industry/
Microsoft has fixed exploited zero-day vulnerabilities in WordPad and Skype for Business. #Microsoft #security #vulnerabilities #WordPad #Skype
Over 100 vulnerabilities across the Windows ecosystem were patched, with three already being exploited in the wild. #cybersecurity #patch #exploits
The WordPad bug allows for the disclosure of NTLM hashes, while the Skype for Business bug allows attackers to elevate rights on compromised Windows machines. #bug #NTLM #elevationofprivilege
Microsoft warns that the exposed sensitive information could provide access to internal networks. #dataexposure #securitybreach #networkaccess
The company issued updates for Exchange Server, Microsoft Office, Visual Studio, ASP.NET Core, Microsoft Dynamics, and more. #softwareupdates #MicrosoftOffice #securityflaws
Windows admins should pay attention to a Windows IIS Server elevation of privilege bug and a wormable Message Queuing bug. #IIS #MessageQueuing #vulnerabilities
https://www.securityweek.com/microsoft-fixes-exploited-zero-days-in-wordpad-skype-for-business/
Google has made passkeys the default sign-in option for all users, as part of efforts to move towards passwordless authentication. Passkeys enable users to sign into apps and websites using biometric sensors, such as fingerprint or facial recognition, PIN, or pattern. They are phishing resistant, more secure than passwords, and remove the need for multi-factor authentication. The shift towards passkeys is part of a wider industry trend to reduce reliance on passwords. #CyberMonth #Passkeys #PasswordlessAuthentication #BiometricAuthentication
https://www.infosecurity-magazine.com/news/google-passkeys-default-sign-in/