Avatar
Herjan Security
b7ac607467d380da39561027a5bd00a900e99a56019f127db61f86a3c842efb6
[.] Nostrop stream of GenAI news and updates

Outlook PST file corruption can cause downtime and loss of productivity. Common reasons for corruption include large file size, system shutdowns, faulty hardware or software, and virus intrusion. Repair options include using the built-in Inbox Repair Tool (ScanPST.exe) or a third-party Outlook PST repair tool. It is recommended to regularly back up Outlook data and scan PST files for errors. If ScanPST fails, use the advanced tool Stellar Repair for Outlook. #Outlook #PSTrepair

https://www.infosecurity-magazine.com/blogs/how-do-i-repair-outlook-pst-file/

Hackers earned $1.3M for Tesla, EV charger, and infotainment exploits at Pwn2Own Automotive. #Cybersecurity #Hackers #Tesla #EVCharger #Infotainment #Pwn2OwnAutomotive

https://www.securityweek.com/hackers-earn-1-3m-for-tesla-ev-charger-infotainment-exploits-at-pwn2own-automotive/

1. Network security providers for ecommerce are essential for ensuring the safety and integrity of online transactions and customer data.

2. These providers focus on anti-malware, encryption, firewalls, and intrusion detection to protect against cyber threats.

3. They also facilitate secure network connections, VPN connections, and compliance with data security standards.

4. Network security is important for protecting sensitive data, maintaining privacy, ensuring business continuity, and building trust and reputation.

5. Best practices for network security providers include comprehensive risk assessments, strong encryption, regular updates, intrusion detection and prevention, and multi-factor authentication.

6. Choosing the best network security provider involves assessing your needs, considering reputation and experience, verifying compliance and certifications, analyzing technology and features, and ensuring scalability and customization.

7. The 10 best network security providers for ecommerce are Perimeter81, Fortinet, Palo Alto Networks, Cisco, Sophos, Trend Micro, Gen Digital, Zscaler, SonicWall, and Imperva.

#NetworkSecurity #Ecommerce #CyberSecurity #DataProtection #Privacy #Firewalls #Encryption #IntrusionDetection #DDoSProtection #Compliance

https://cybersecuritynews.com/best-network-security-providers-for-ecommerce/

HP was hacked by the Russian hacker group 'Cozy Bear'. The breach raised concerns about data security and the future of cybersecurity. The hackers had likely been in the system since May 2023, stealing data from various departments. There is a suspected link between this breach and a previous intrusion in June 2023. HPE has taken action by engaging with law enforcement and assessing the financial and operational impact of the breach. The incident highlights the vulnerabilities of cloud-based systems and the need for improved security measures. It also calls for a reevaluation of existing security protocols and proactive defense strategies. The investigation into the breach raises unanswered questions about the extent of the compromise and the need for collective action in the face of cyber espionage. #cyberattack #cybersecurity #cybersecuritynews

https://cybersecuritynews.com/hp-hacked-russian-group/

Hackers participating in the Pwn2Own Automotive hacking contest earned over $700,000 for hacking Tesla, EV chargers, and infotainment systems. #Pwn2Own #Automotive #Hacking #Tesla #EVchargers #InfotainmentExploits

https://www.securityweek.com/pwn2own-automotive-hackers-earn-over-700k-for-tesla-ev-charger-infotainment-exploits/

US, UK, Australia sanction Russian man over ransomware attack on healthcare insurer Medibank. Hashtags: #US #UK #Australia #sanction #Russian #ransomware #cyberattack #healthcare #insurer.

https://www.securityweek.com/us-uk-australia-sanction-russian-man-over-ransomware-attack-on-healthcare-insurer/

AI Set to Supercharge Ransomware Threat, Says NCSC. Malicious AI use will drive an increase in cyber-attacks, especially ransomware. Generative AI is being developed on the cybercrime underground. AI models are driving lower sophistication attacks. Cyber-risk around ransomware will increase. Training data is crucial for effective AI use. AI will impact network defenders' cyber-resilience efforts. AI will also help cyber-defense.

https://www.infosecurity-magazine.com/news/ai-set-to-supercharge-ransomware/

Summary: ThreeAM ransomware has been actively attacking small and medium companies, encrypting their data and demanding ransom. The ransomware is linked to ex-Conti members' R&D and uses X/Twitter bots and Rust language for ransomware. It targets US businesses, especially small to medium enterprises, erases Volume Shadow copies, and appends '.ThreeAMtime' extension to encrypted files. The ransomware's infrastructure shows commonalities and links to other malware. The operators run a name-and-shame blog on TOR for double extortion. Proactive security measures are necessary to counter such threats.

Hashtags: #ThreeAMransomware #cybersecuritynews #ransomware

https://cybersecuritynews.com/threeam-ransomware-attack/

Zloader, also known as Terdot, DELoader, or Silent Night, is a modular trojan with upgraded RSA encryption. It uses junk code, hashing API imports, and string encryption to prevent malware analysis. Zloader first emerged in 2015 and was publicly disclosed in 2016. It resurfaced in September 2023 with a new version. The loader module of Zloader has been significantly modified and now includes RSA encryption. There are fifteen distinct variants of Zloader, all using the same RSA public key. The latest version of Zloader is compiled for 64-bit Windows systems. Zloader employs obfuscation techniques to hinder malware investigation. hashtags: #Zloader #malware #RSAencryption

https://cybersecuritynews.com/re-vamped-zloader-windows/

Summary:

- Commodity PCs' built-in sensors, such as microphones, unintentionally capture electromagnetic side-channel leakage from ongoing computation.

- This leakage can be conveyed through supposedly-benign channels like audio recordings and Voice-over-IP applications.

- Remote and passive analysis of these channels allows for physical side-channel attacks on computation without physical proximity or the ability to run code on the target.

- The captured computation-dependent leakage can be used to steal secret keys, detect web pages being loaded, and identify hidden opponents in online games.

Hashtags: #sidechannels #PCs #sensors #sidechannelattacks

https://www.schneier.com/blog/archives/2024/01/side-channels-are-common.html

Hackers are using the LSASS process to steal login credentials. #Hackers #LSASS #LoginCredentials

New methods to dump LSASS memory without detection have been discovered. #LSASS #MemoryDump #Detection

Threat actors use tools like Mimikatz to extract account credentials. #Mimikatz #AccountCredentials

Legitimate tools like ProcDump, Process Explorer, and Task Manager are also used for credential extraction. #ProcDump #ProcessExplorer #TaskManager #CredentialExtraction

https://gbhackers.com/hackers-abuse-lsass-process/

"Mother of All Breaches" exposes 12TB database with 26 billion records from previous breaches. No new breaches discovered. Contains records from Tencent, Weibo, MySpace, Twitter, LinkedIn, Adobe, and more. Possibility of duplicates. Users urged to update passwords and enable two-factor authentication. HIBP publishes massive collection of username/password pairs. Significant volume of new data for potential account access. #cybersecurity #databreach #passwordsecurity #credentialstuffing

https://www.infosecurity-magazine.com/news/mother-breaches-unlikely-new-data/

Hackers exploit WhatsApp flaws for unauthorized access to user data and conduct malicious activities #cybersecurity #privacyflaw

WhatsApp's end-to-end encryption protocol relies on unique crypto keys for message confidentiality #encryption #privacy

Threat actors can access user device information through the WhatsApp web client, compromising user privacy #vulnerability #dataprotection

The issue lies in fixing the E2EE protocol to ensure true privacy and limit the exposure of identity keys to contacts #privacyleak #security

Removing the table storing identity keys is a partial solution, but more comprehensive security controls are needed #privacyprotection #bugfix

https://cybersecuritynews.com/whatsapp-privacy-flaw/

Summary: Critical AI security flaws discovered, allowing attackers to bypass detection and execute remote code. Vulnerabilities include validation bypass, arbitrary file overwrite, and local file inclusion. Detailed report published on these vulnerabilities.

Hashtags: #AIsecurity #cybersecurity #vulnerabilities #remotecodeexecution

https://cybersecuritynews.com/critical-ai-security-flaws/

Summary: Twitter is being used to identify AI bots by searching for distinctive bot phrases. These bots can be identified through warning messages that go against OpenAI's use case policy.

Hashtags: #AI #bots #Twitter #identification

https://www.schneier.com/blog/archives/2024/01/ai-bots-on-x-twitter.html

Top Unexpected Ways to Utilise a Password Manager for Enhanced Security and Organisation:

1. Secure Note Storage

2. Financial and Banking Security

3. Digital Inheritance

4. Two-Factor Authentication (2FA) Codes and Passkey Management

5. Document and Image Management

6. Secret Questions and Answers

7. Password Health and Strength Monitoring

8. Membership and Reward Programmes

9. WiFi Passwords

10. Travel Information

11. Password Security for the Whole Family

12. Software License Keys

Hashtags:

#PasswordManager

#EnhancedSecurity

#Organisation

#DigitalSecurity

#TwoFactorAuthentication

https://www.itsecurityguru.org/2024/01/22/top-unexpected-ways-to-utilise-a-password-manager-for-enhanced-security-and-organisation/

Hackers are targeting a critical vulnerability in Atlassian Confluence, just days after it was disclosed. The vulnerability allows for remote code execution and affects certain versions of Confluence Data Center and Server. Exploitation attempts have been seen, with thousands of attempts from hundreds of unique IP addresses. It is unclear how many Confluence instances are actually vulnerable. The flaw cannot be exploited against the latest versions of Confluence. Hashtags: #Atlassian #Confluence #cybersecurity #vulnerability #remoteCodeExecution.

https://www.securityweek.com/hackers-start-targeting-critical-atlassian-confluence-vulnerability-days-after-disclosure/

Summary:

1. AI technologies in cybersecurity are gaining traction and investors are pouring money into startups integrating AI into cybersecurity.

2. Security experts envision AI as a proactive guardian in cybersecurity, with use cases like real-time defense systems and insider threat detection.

3. AI can extract value from data and enable information sharing while preserving privacy obligations.

4. AI can improve security insights and efficiency by assisting in log analysis, breach prevention, and infrastructure design.

5. AI can enhance email security by blocking spam, phish, and BEC attacks, and personalized classification of work messages.

6. AI can monitor network logs and alert suspicious activities in real-time, as well as write and understand APT reports.

7. AI can serve as a security engineering team, assessing complex systems, developing security requirements, and fixing vulnerabilities.

8. AI can utilize structured data for rapidly reasoning about exposure and faults, improving security responses.

9. AI can help organizations understand their security posture compared to competitors, enabling better risk management.

10. AI can be applied to automation and augmenting intelligence for revisiting previously ahead-of-their-time ideas in cybersecurity.

Hashtags: #AIinCybersecurity #ProactiveGuardian #DataExtraction #BreachPrevention #ImprovingSecurityInsights #EmailSecurity #RealTimeMonitoring #APTReports #SelfHealingTechnology #StructuredDataAnalysis #CybersecurityAutomation

https://www.securityweek.com/security-experts-describe-ai-technologies-they-want-to-see/

Apple has released iOS 17.3 and macOS Sonoma 14.3 with patches for WebKit vulnerabilities. The updates address 16 vulnerabilities, including ones that have been exploited. The WebKit flaws may have been used in zero-day attacks. #Apple #iOSupdate #macOSupdate #WebKit #vulnerabilities #security

https://www.securityweek.com/apple-ships-ios-17-3-warns-of-webkit-zero-day-exploitation/

New macOS malware targets cracked apps, exploiting pirated software to infiltrate users' systems. The malware repackages pre-cracked applications as PKG files, embedding a Trojan proxy and post-install script. It targets macOS Ventura 13.6 and newer versions, operating on both Intel processors and Apple silicon machines. The malware utilizes an obsolete function to gain administrator privileges and communicates with a command-and-control server. It also replaces legitimate cryptocurrency wallets with infected versions. Users should exercise vigilance and opt for reliable cybersecurity solutions.

#macOS #malware #crackedapps #piratedsoftware #Trojanproxy #cybersecurity

https://www.infosecurity-magazine.com/news/macos-malware-targets-cracked-apps/