"Researchers Develop Malicious AI 'Worm' Targeting Generative AI Systems"

 "Researchers Develop Malicious AI 'Worm' Targeting Generative AI Systems"

A team of researchers from Cornell Tech, the Israel Institute of Technology, and Intuit developed a novel type of malware dubbed the "Morris II" worm, which uses popular Artificial Intelligence (AI) services to spread itself, infect systems, and steal data. The worm further highlights the potential dangers of AI security threats and the need to secure AI models. The team used an "adversarial self-replicating prompt" to create the worm.

Submitted by Gregory Rigby on

Cyber Scene - Against All Enemies, Foreign AND Domestic

Cyber Scene - Against All Enemies, Foreign AND Domestic

Image removed.

By krahal

This Cyber Scene will discuss the complexity of defending against cyberattacks not only from domestic and foreign enemies, but also address current issues of how these cyber enemies--domestic AND foreign together--complicate the defense of the US from its cyber enemies.

Submitted by Gregory Rigby on

"Cisco Raises Alarm for ArcaneDoor Zero-Days Hitting ASA Firewall Platforms"

"Cisco Raises Alarm for ArcaneDoor Zero-Days Hitting ASA Firewall Platforms"

Cisco recently warned that nation-state backed hacking teams are exploiting at least two zero-day vulnerabilities in its ASA firewall platforms to plant malware on telecommunications and energy sector networks. According to Cisco Talos, the attackers are taking aim at software defects in certain devices running Cisco Adaptive Security Appliance (ASA) or Cisco Firepower Threat Defense (FTD) products to implant malware, execute commands, and potentially exfiltrate data from compromised devices.

Submitted by Adam Ekwall on

"Security Leaders Braced for Daily AI-Driven Attacks by Year-End"

"Security Leaders Braced for Daily AI-Driven Attacks by Year-End"

According to a new Netacea report, most businesses have expressed concern regarding Artificial Intelligence (AI)-enabled cyber threats, with 93 percent of security leaders expecting daily AI-driven attacks by the end of 2024. About 65 percent expect offensive AI to become the norm for cybercriminals. Ransomware is the threat vector most likely to be powered by AI, according to 48 percent of the Chief Information Security Officers (CISOs) surveyed. Phishing, malware, bot attacks, and data exfiltration followed this.

Submitted by Gregory Rigby on

"Hackers Create Legit Phishing Links With Ghost GitHub, GitLab Comments"

"Hackers Create Legit Phishing Links With Ghost GitHub, GitLab Comments"

Hackers have been using unpublished GitHub and GitLab comments to generate phishing links appearing to be from legitimate Open Source Software (OSS) projects. The trick enables anyone to impersonate any repository without the owner knowing. According to McAfee, hackers have already used this method to spread the Redline Stealer Trojan by using links associated with Microsoft's GitHub-hosted repositories. There have been additional cases involving the same loader used in that campaign.

Submitted by Gregory Rigby on

"Fifth of CISOs Admit Staff Leaked Data Via GenAI"

"Fifth of CISOs Admit Staff Leaked Data Via GenAI"

Security researchers at RiverSafe have found that one in five UK companies have had potentially sensitive corporate data exposed via employee use of generative AI (GenAI). The researchers noted that the data leak risks of unmanaged GenAI use help to explain why three-quarters of surveyed CISOs (75%) claimed that insiders pose a greater risk to their organization than external threats. The researchers stated that UK CISOs are concerned not just about the risks associated with employee misuse of AI, but of the technology being used by threat actors.

Submitted by Adam Ekwall on

"New Password Cracking Analysis Targets Bcrypt"

"New Password Cracking Analysis Targets Bcrypt"

Hive Systems recently released the results of its latest annual analysis of password cracking through brute-force attacks. The company has been conducting this study for several years and has previously targeted passwords hashed with the widely used MD5 algorithm. In many cases, MD5 hashes can be easily cracked, so organizations are increasingly turning to more secure algorithms, specifically Bcrypt. Bcrypt is not the most secure, but according to Hive's collection of data from the Have I Been Pwned breach notification service, it has grown in use in recent years.

Submitted by Gregory Rigby on

"North Korean Hackers Target Dozens of Defense Companies"

"North Korean Hackers Target Dozens of Defense Companies"

South Korean police recently revealed a major hacking campaign that lasted more than a year, allowing hackers from North Korea to steal defense secrets. A report from the Korean National Police Agency (KNPA) published recently blamed the campaign on three North Korean state-backed groups: Lazarus, Kimsuky, and Andariel. The KNPA claimed that the groups targeted as many as 83 defense contractors and subcontractors and managed to steal sensitive information from 10 of them between October 2022 and July 2023.

Submitted by Adam Ekwall on
Subscribe to