"Celebrated Cryptography Algorithm Gets an Upgrade"

"Celebrated Cryptography Algorithm Gets an Upgrade"

A well-known technique for lattice basis reduction has been improved by two researchers, unlocking new avenues for practical cryptography and mathematics experiments. Cryptography is essential for security in our increasingly digital lives. When sending a private message or paying a bill online, algorithms designed to keep this information private are critical. Some people seek to unveil those secrets, so researchers must work to put these systems to the test to ensure they can withstand sophisticated attacks.

Submitted by Gregory Rigby on

"Harry Coker Confirmed as National Cyber Director"

"Harry Coker Confirmed as National Cyber Director"

The US Senate recently confirmed Harry Coker as the next National Cyber Director serving in the White House’s Office of the National Cyber Director (ONCD).  Coker previously served as executive director of the NSA and held various leadership positions in the CIA.  The role of National Cyber Director was established in 2021 after the massive SolarWinds hack came to light.  The ONCD will advise President Biden on cybersecurity policy and strategy.  

 

Submitted by Adam Ekwall on

"Most Cyberattacks Hide in Encrypted Web Traffic"

"Most Cyberattacks Hide in Encrypted Web Traffic"

According to Zscaler's ThreatLabz 2023 State of Encrypted Attacks Report, most cyberattacks involve malware being hidden in encrypted web traffic. The spread of cyber threats through encrypted (HTTPS) web traffic is increasing year after year. It increased by 24 percent in 2023 compared to 2022. According to researchers at Zscaler,  this would amount to around 30 billion blocked threats. The report shows that 86 percent of cyberattacks now occur through encrypted channels. Malicious web content, malware payloads, and macro-based malware are all examples of encrypted malware.

Submitted by Gregory Rigby on

"Vulnerabilities Now Top Initial Access Route For Ransomware"

"Vulnerabilities Now Top Initial Access Route For Ransomware"

Corvus Insurance recently did a study and found that threat actors are switching tactics to compromise their victims with ransomware, with more attacks now exploiting vulnerabilities rather than using phishing emails.  The insurer analyzed claims data from this year to better understand threat actor activity.  The insurer claimed that vulnerability exploitation rose as an initial access method from nearly 0% of ransomware claims in H2 2022 to almost a third in the first half of 2023.

Submitted by Adam Ekwall on

"Ransomware Groups Are Using Media Coverage to Coerce Victims Into Paying"

"Ransomware Groups Are Using Media Coverage to Coerce Victims Into Paying"

According to new Sophos X-Ops research, ransomware gangs use media coverage of attacks to increase pressure on victims to meet their demands. An analysis conducted by Sophos X-Ops emphasized that ransomware groups and the media now have a closer relationship, suggesting that while hackers have traditionally been secretive, some now see the potential in using their publicity to strengthen extortion techniques.

Submitted by Gregory Rigby on

"PNNL Creates Center for Artificial Intelligence"

"PNNL Creates Center for Artificial Intelligence"

The Department of Energy's (DOE) Pacific Northwest National Laboratory (PNNL) has established the Center for AI @ PNNL to coordinate the pioneering research of hundreds of scientists working on various projects focusing on science, security, and energy resilience. With the availability of generative Artificial Intelligence (AI), which allows almost anyone to produce sophisticated text and images with just a small amount of data, AI use has surged.

Submitted by Gregory Rigby on

"New Pierogi++ Malware by Gaza Cyber Gang Targeting Palestinian Entities"

"New Pierogi++ Malware by Gaza Cyber Gang Targeting Palestinian Entities"

The Gaza Cyber Gang, a pro-Hamas threat actor, is targeting Palestinian entities with an updated version of the Pierogi backdoor. SentinelOne named the malware Pierogi++ because it is written in the C++ programming language, unlike its Delphi- and Pascal-based predecessor. According to security researcher Aleksandar Milenkoski, recent Gaza Cyber Gang activities show constant targeting of Palestinian entities, with no significant changes in dynamics since the start of the Israel-Hamas war.

Submitted by Gregory Rigby on

"Dell Urges Customers to Patch Vulnerabilities in PowerProtect Products"

"Dell Urges Customers to Patch Vulnerabilities in PowerProtect Products"

Dell is urging customers of its PowerProtect products to review a newly released security advisory and patch a series of potentially serious vulnerabilities.  Dell noted that the vulnerabilities impact PowerProtect Data Domain (DD) series appliances, which are designed to help organizations protect, manage, and recover data at scale.  APEX Protect Storage, PowerProtect DD Management Center, PowerProtect DP series appliances, and PowerProtect Data Manager appliances are also affected.

Submitted by Adam Ekwall on

"NSA Releases Recommendations to Mitigate Software Supply Chain Risks"

"NSA Releases Recommendations to Mitigate Software Supply Chain Risks"

In response to a rise in supply chain cyberattacks over the past five years, the National Security Agency (NSA) has released a Cybersecurity Information Sheet (CSI) titled "Recommendations for Software Bill of Materials (SBOM) Management." This CSI offers guidance to network owners and operators on integrating SBOM use to help protect the cybersecurity supply chain, with some additional guidance for National Security Systems (NSS).

Submitted by Gregory Rigby on

"MITRE Debuts ICS Threat Modeling for Embedded Systems"

"MITRE Debuts ICS Threat Modeling for Embedded Systems"

In collaboration with researchers from three other organizations, MITRE has released a draft of a new threat-modeling framework for those who make embedded devices used in critical infrastructure environments. The new EMB3D Threat Model aims to provide device makers with a common understanding of the vulnerabilities in their technologies that are being targeted by attacks, as well as the security mechanisms for addressing those vulnerabilities.

Submitted by Gregory Rigby on
Subscribe to