This Cryptomining Tool Is Stealing Secrets

As the Israel-Hamas war raged on this week and Israel expanded its ground invasion of the Gaza Strip, the territory’s compromised internet infrastructure and access to connectivity went fully dark on Friday, leaving Palestinians without access to ground or mobile data connections. Meanwhile, researchers are bracing for the fallout if Hamas makes good on its … Read more

Okta’s Latest Security Breach Is Haunted by the Ghost of Incidents Past

“This is the second time Cloudflare has been impacted by a breach of Okta’s systems,” a group of Cloudflare engineers wrote on Friday. They went on to share a list of recommendations for how Okta can improve its security posture: “Take any report of compromise seriously and act immediately to limit damage. Provide timely, responsible … Read more

A New Protocol Vulnerability Will Haunt the Web for Years

Google, Amazon, Microsoft, and Cloudflare revealed this week that they battled massive, record-setting distributed denial of service attacks against their cloud infrastructure in August and September. DDoS attacks, in which attackers attempt to overwhelm a service with junk traffic to bring it down, are a classic internet menace, and hackers are always developing new strategies … Read more

The Biggest Hack of 2023 Keeps Getting Bigger

The MOVEit incident eclipses them, though, both in the number of victim organizations and individuals whose data was compromised. Antivirus company Emsisoft has been tracking the number of MOVEit victim organizations that have publicly declared they were impacted since May. The researchers have combed individual US state breach notifications, filings with the US Securities and … Read more

Apple, Microsoft, and Google Just Fixed Multiple Zero-Day Flaws

Earlier in the month, Google fixed another zero-day flaw, a heap buffer overflow issue initially tracked as CVE-2023-4863, which it thought impacted only the Chrome browser. But two weeks after fixing the issue, researchers discovered it was worse than they thought, affecting the widely-used libwebp image library for rendering images in the WebP format. Now … Read more

The Shocking Data on Kia and Hyundai Thefts in the US

Mandiant researchers published findings this week about a newly revealed Chinese espionage operation that used Sogu malware to spy on the African operations of both European and US organizations. The campaign is significant for the scope of its victims, but also because attackers used a classic malware distribution method: thumb drives. The attacks are the … Read more

Chinese language Spies Contaminated Dozens of Networks With Thumb Drive Malware

For a lot of the cybersecurity business, malware unfold through USB drives represents the quaint hacker risk of the previous decade—or the one earlier than that. However a bunch of China-backed spies seems to have discovered that world organizations with workers in creating nations nonetheless preserve one foot within the technological previous, the place thumb … Read more

The Comedy of Errors That Let China-Backed Hackers Steal Microsoft’s Signing Key

Microsoft stated in June {that a} China-backed hacking group had stolen a cryptographic key from the corporate’s techniques. This key allowed the attackers to entry cloud-based Outlook e-mail techniques for 25 organizations, together with a number of US authorities companies. On the time of the disclosure, nevertheless, Microsoft didn’t clarify how the hackers had been … Read more

Generative AI’s Largest Safety Flaw Is Not Straightforward to Repair

It is simple to trick the big language fashions powering chatbots like OpenAI’s ChatGPT and Google’s Bard. In a single experiment in February, safety researchers pressured Microsoft’s Bing chatbot to behave like a scammer. Hidden directions on an online web page the researchers created informed the chatbot to ask the particular person utilizing it handy … Read more

A New Assault Reveals All the things You Sort With 95 % Accuracy

In fact, generative AI instruments are the speak of the safety business this 12 months. And Microsoft is not any exception. The truth is, since 2018, the corporate has had an AI purple workforce that assaults AI instruments to seek out vulnerabilities and assist forestall them from behaving badly. Exterior of Black Hat and Defcon … Read more