Summary: Nearly $60 million was stolen in a cryptocurrency wallet drainer campaign, a stealthy backdoor named Xamalicious infected over 320,000 Android devices, threat actors are abusing the App Installer for malware delivery, Mint Mobile suffered a data breach, Ubisoft is investigating hacking claims, Google's Safety Check for Chrome on desktop will run automatically in the background, NASA released its Space Security Best Practices Guide, a report highlights vulnerabilities in medical devices, a security firm executive will be extradited to Russia, and TikTok blamed a bug for prompting iPhone users to provide passcodes.
Hashtags: #Cryptocurrency #MobileMalware #AppInstaller #DataBreach #Hacking #ChromeSafetyCheck #SpaceSecurity #MedicalDeviceVulnerabilities #Extradition #BugFix #CybersecurityNews
Top 10 AI Security Stories of 2023:
1. Privacy Concerns Around ChatGPT
2. GPT Models Used For Malicious Purposes
3. When the LLM Buzz Fizzles Out
4. The Challenge of Detecting AI-Generated Content
5. Offensive Cyber to Help Secure Generative AI
6. The US AI Regulation Roadmap Takes Shape
7. The UK AI Safety Summit: Achievements and Criticisms
8. The EU Passes Its AI Act With Generative AI-Inspired Tweaks
9. One Year of ChatGPT: The Impact of Generative AI on Cybersecurity
10. Deepfakes: The Looming Disinformation Threat
Hashtags: #ChatGPT #AIsecurity #cybersecurity #privacyconcerns #maliciouspurposes #AIregulation #UKAISafetySummit #EUAIAct #generativeAI #deepfakes
https://www.infosecurity-magazine.com/news-features/top-10-ai-security-stories-2023/
Palo Alto Networks acquires Talon Cyber Security, expanding its SASE offering. Talon's Enterprise Browser enhances security for all devices. Integration with Prisma SASE creates a comprehensive solution. Qualified SASE AI customers receive free access to Talon's browser. #cybersecurity #cybersecuritynews
https://cybersecuritynews.com/palo-alto-networks-acquisition-of-talon-cyber-security/
Summary: Eagers Automotive, a vehicle dealer in Australia and New Zealand, has halted trading due to a cyberattack that disrupted its operations. The company announced that certain IT systems were affected, impacting the ability to finalize transactions for new vehicles and impacting service and parts operations. The financial impact is expected to be minimal, and the company is investigating whether any personal information has been compromised. The specific details of the attack have not been disclosed.
Hashtags: #Cyberattack #EagersAutomotive #DataBreach #Cybersecurity
https://www.securityweek.com/operations-trading-of-eagers-automotive-disrupted-by-cyberattack/
The top 10 notable cyber attacks of 2023 include MOVEit Mass Attack, Cisco IOS XE Attacks, US Government Hacked via Microsoft 365, Citrix Bleed Attack, Okta's Customer Support Data Breach, Western Digital Cyber Attack, MGM Resorts Breach, Royal Ransomware Attack Over the City of Dallas, GoAnywhere Attacks, and 3CX Software Supply Chain Attack. #cyberattack #securitybreach #hacks #cybersecurity
https://cybersecuritynews.com/notable-cyber-attacks-of-2023/
AI-enhanced decision-making is poised to remove bottlenecks in various systems, such as limited options in decision-making and simplified menus. It can revolutionize how democracy functions by allowing AI systems to advocate for specific policies based on individual preferences. AI can also improve labor markets, apparel customization, and software interfaces. However, privacy concerns and the need for human deliberation are considerations. The transition to AI-enhanced direct democracies is not clear, and implementing these technologies will have risks and benefits. #ArtificialIntelligence #DemocracyInnovation #PersonalizationInTechnology #AIOvercomingBottlenecks #FuturePossibilities
https://www.schneier.com/blog/archives/2023/12/ai-and-lossy-bottlenecks.html
#AI #CybersecurityThreats #Fakesasaservice #MalCampaigns #AIpowereddisinformation #EnterpriseAISecurity #ProactiveSecurity #SoftSkills #AIandCybersecurity #GovernanceRiskCompliance #VulnerabilityRiskManagement #AIandPsychology
https://www.securityweek.com/the-emerging-landscape-of-ai-driven-cybersecurity-threats-a-look-ahead/
Palo Alto Networks completes acquisition of Talon Cyber Security, an Israeli startup. Hashtags: #Cybersecurity #Acquisition #Startup #Talon #PaloAltoNetworks.
https://www.securityweek.com/palo-alto-networks-completes-acquisition-of-talon/
#cyberattack #AlbanianParliament #data #system #halt #services #hackers #temporary #cellphoneprovider #airflightcompany #targeted #Iranianhackers #HomelandJustice #consequences #cybersecurity #attack #government #technologycompanies #IranianForeignMinistry #retaliation #diplomaticrelations #MEK #laws #UnitedStates #NATO #EuropeanUnion #dispute
https://www.securityweek.com/cyberattack-targets-albanian-parliaments-data-system-halting-its-work/
Summary:
1. CISOs offer valuable insights to protect organizations from cyber-attacks.
2. CISOs should have hands-on experience and empathy for their team.
3. CISOs need to be ready for instant changes and be able to communicate effectively.
4. CISOs should support business goals and understand the industry they work in.
5. Learning about business is essential for CISOs to progress in their career.
6. CISOs should take breaks and vacations to avoid burnout.
7. CISOs should focus on risk-based decisions, particularly in identity and access management.
8. Continuous learning is crucial for CISOs to stay sharp and have a greater impact.
9. Leveraging the cybersecurity community provides support for CISOs in their role.
Hashtags: #CISO #cybersecurity #tips #business #riskmanagement #learning #community
https://www.infosecurity-magazine.com/news-features/top-tips-from-cisos/
Summary:
- The fourth version of the Common Vulnerability Scoring System (CVSS 4.0) was launched in November 2023, which will impact how organizations assess and prioritize vulnerabilities.
- Vulnerabilities are weaknesses in computer systems that can be exploited by threat actors to gain unauthorized access.
- The Common Vulnerabilities and Exposures (CVE) system lists publicly known information security vulnerabilities and exposures.
- CVEs are assigned a unique identifier and include a description of the vulnerability, severity score, and references to other sources of information.
- MITRE maintains and stores CVEs in the National Vulnerability Database (NVD).
- The Common Weakness Enumeration (CWE) is a hierarchical taxonomy of software weaknesses that can lead to vulnerabilities.
- The Open Web Application Security Project (OWASP) maintains lists of the top 10 vulnerabilities in different areas.
- Measuring the criticality of a vulnerability is important for prioritizing remediation efforts.
- The Common Vulnerability Scoring System (CVSS) is an industry standard for assessing the severity of vulnerabilities.
- CVSS 4.0 introduces supplemental metrics and a new nomenclature for severity ratings.
- CVSS 4.0 aims to address criticisms of previous versions and provide more granularity in assessing a vulnerability's criticality.
Hashtags:
#Cybersecurity #Vulnerabilities #CVE #CVSS #ITSecurity
https://www.infosecurity-magazine.com/news-features/navigating-vulnerability-maze-cve/
1. 'Leaksmas' darkweb event exposes massive hacked data worldwide.
2. Cybercriminals target individuals and organizations during the holiday season.
3. Motivations for cyberattacks go beyond financial gain, including ideological agendas.
4. Growing collaboration among disparate hacker groups poses a challenge to cybersecurity.
5. Stolen data becomes currency for fraudsters, leading to increased online malicious activity.
#cyberattack #cybersecurity #cybersecuritynews
https://cybersecuritynews.com/hackers-leaksmas-darkweb-event/
Yakult confirms cyber attack: Over 95 GB of data leaked. #cybersecurity #cyberattack #datasecurity #databreach #darkweb
Hackers use weaponized LNK files to exploit Windows vulnerabilities. Kimsuky Group deploys AppleSeed malware using these files. The group targets various sectors and specializes in spear phishing. They also use JavaScript and Excel macros. Kimsuky combines AppleSeed and AlphaSeed malware. They use Metasploit and VNC malware. Users should be cautious of unknown senders, update their OS, and keep browsers and V3 updated. #cybersecurity #malware #vulnerability
Top 10 most exploited vulnerabilities in 2023: MOVEit Vulnerability, Microsoft Outlook Privilege Escalation, Fortinet FortiOS, ChatGPT, Windows Common Log File System Driver Privilege Escalation, Barracuda Email Security Gateway Vulnerability, Adobe ColdFusion, Citrix Bleed Vulnerability, Windows Smart Screen Bypass, SugarCRM Remote Code Execution. #Top10Vulnerabilities #Cybersecurity
https://cybersecuritynews.com/top-10-vulnerabilities-that-were-exploited-the-most-in-2023/
New iPhone Security Features: Apple introduces Stolen Device Protection, requiring Face ID or Touch ID authentication for various actions, adding security delay for sensitive actions. #Apple #security #iPhone #theft
Police have warned hundreds of online merchants about skimmer infections in a coordinated international effort. Authorities in 17 countries identified over 400 infected ecommerce sites and alerted businesses to compromised credit card information. Digital skimming, also known as JavaScript-sniffing, involves stealing payment card details from customers making online purchases. The stolen data is often sold to other cybercriminals or used for fraud. Some of the skimmers identified in this operation include AngryBeaver, ATMZOW, FirstKiss, FakeGA, health_check, Inter, and R3nin. #PoliceWarning #SkimmerInfections #DigitalSkimming #Cybercrime
https://www.securityweek.com/police-warn-hundreds-of-online-merchants-of-skimmer-infections/
1. In 2024, organizations should focus on data integrity, identity management, and risk-based prioritization to reduce exposure to data breaches.
2. Ransomware attacks and supply chain vulnerabilities were the top cyber threats in 2023.
3. Gartner projects a 14% increase in worldwide information security spending in 2024.
4. Organizations should classify and encrypt data based on its sensitivity.
5. Access control and the adoption of a Zero Trust model are crucial for protecting data.
6. Risk-based prioritization of vulnerabilities and incidents is essential for effective cybersecurity.
7. Achieving 100% cybersecurity protection is impossible, but organizations can significantly reduce data breach exposure.
#Cybersecurity #DataIntegrity #IdentityManagement #RiskManagement #Ransomware #ZeroTrust #InformationSecurity
https://www.securityweek.com/refocusing-on-cybersecurity-essentials-in-2024-a-critical-review/
Summary:
First American Financial Corporation and its subsidiaries were hit by a cyberattack, causing significant disruptions to their systems and operations. The company took certain systems and email servers offline and warned customers of potential malicious emails. The breach appears to be a ransomware attack, but no group has taken credit for it. One week after the breach, the company's main website and some subsidiary sites remain offline. Customers have complained about financial losses and the company's handling of the incident.
Hashtags: #Cyberattack #FirstAmerican #Ransomware #DataBreach #Cybersecurity
https://www.securityweek.com/cyberattack-disrupts-operations-of-first-american-subsidiaries/
The threat landscape in the second half of 2023 was dominated by AI-related malicious activity and the emergence of new Android spyware. Cybersecurity provider ESET reported a significant rise in Android spyware detections, as well as the exploitation of OpenAI API keys and the ChatGPT chatbot. A third-party software development kit called SpinOk Spyware was incorporated into legitimate Android applications, leading to a surge in spyware detections. The MOVEit supply chain attack also had a significant impact during this period. Despite the increasing value of Bitcoin, there was no corresponding increase in cryptocurrency threats.
#ThreatLandscape #AI #AndroidSpyware #Cybersecurity #SpinOkSpyware #MOVEit #Bitcoin #ESET
https://www.infosecurity-magazine.com/news/2023-threat-dominated-ai-android/