"Chrome 120 Update Patches High-Severity Vulnerabilities"

"Chrome 120 Update Patches High-Severity Vulnerabilities"

Google recently announced the release of a Chrome 120 security update that addresses nine vulnerabilities, six of which were reported by external researchers.  Of the externally reported flaws, five have a severity rating of high, four of which are use-after-free issues.  Google said it handed out $50,000 in rewards to the reporting researchers.  Based on the bug bounty reward that was paid out, the most severe of the resolved vulnerabilities is a type confusion bug in the V8 JavaScript engine.

Submitted by Adam Ekwall on

"New Cybercrime Market 'OLVX' Gains Popularity Among Hackers"

"New Cybercrime Market 'OLVX' Gains Popularity Among Hackers"

OLVX, a new cybercrime marketplace, has emerged and is quickly growing, with new customers looking to buy tools for online fraud and cyberattacks. OLVX is part of a recent trend in which cybercrime marketplaces are increasingly hosted on the clearnet rather than the dark web, making them more accessible to a wider range of users and more easily promoted through Search Engine Optimization (SEO). Researchers at ZeroFox, who discovered OLVX in early July 2023, have reported a significant increase in activity on the new marketplace in the fall, noting growth in both sellers and buyers.

Submitted by Gregory Rigby on

"Google Cloud's 'Dataproc' Abuse Risk Endangers Corporate Data Stores"

"Google Cloud's 'Dataproc' Abuse Risk Endangers Corporate Data Stores"

In one of Google's cloud services for data scientists, lax security controls could allow hackers to create applications, execute operations, and access data in Internet-facing environments. The problem stems from Google Cloud's "Dataproc," a managed service for running large-scale data processing and analytics workloads using Apache Hadoop, Spark, and over 30 other open source tools and frameworks. An "abuse risk" to Dataproc, as described by the Orca Research Pod on December 12, is based on the presence of two default open firewall ports used by Dataproc.

Submitted by Gregory Rigby on

"Many Popular Websites Still Cling to Password Creation Policies From 1985"

"Many Popular Websites Still Cling to Password Creation Policies From 1985"

According to a study conducted by researchers at the Georgia Institute of Technology, many popular websites still allow users to choose weak or even single-character passwords. The researchers used an automated account creation method to evaluate more than 20,000 websites across the Tranco top 1M, and the password creation policies users must adhere to. They discovered that 75 percent of websites permit passwords shorter than the recommended eight characters (with 12 percent allowing single-character passwords).

Submitted by Gregory Rigby on

"Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing"

"Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing"

Microsoft has warned that attackers are deploying Virtual Machines (VMs) for cryptocurrency mining and launching phishing attacks using Open Authorization (OAuth) applications as an automation tool. According to a Microsoft Threat Intelligence team analysis, threat actors compromise user accounts to create, modify, and grant high privileges to OAuth applications that they can then use to hide malicious activity. Misuse of OAuth also allows threat actors to maintain access to applications even if they lose access to the compromised account.

Submitted by Gregory Rigby on

"Boffins Fool AI Chatbot Into Revealing Harmful Content – With 98 Percent Success Rate"

"Boffins Fool AI Chatbot Into Revealing Harmful Content – With 98 Percent Success Rate"

Purdue University researchers have developed a method for interrogating Large Language Models (LLMs) in a way that almost always breaks their etiquette training. LLMs such as Bard, ChatGPT, and Llama are trained on large datasets that may contain questionable or harmful information. Artificial Intelligence (AI) giants like Google, OpenAI, and Meta try to "align" their models using "guardrails" to prevent chatbots based on these models from generating harmful content.

Submitted by Gregory Rigby on

"UCF Researcher Discovers New Technique for Photon Detection"

"UCF Researcher Discovers New Technique for Photon Detection"

Debashis Chanda, a University of Central Florida (UCF) researcher, has developed a new method for detecting photons, which are elementary particles spanning from visible light to radio frequencies and are used in cellular communication. The development could lead to increasingly precise and efficient technologies in different fields, possibly strengthening security measures. Traditionally, photon detection has relied on changes/modulation of voltage or current amplitude.

Submitted by Gregory Rigby on

"Spider-Man Game Creator Claimed by Ransom Gang"

"Spider-Man Game Creator Claimed by Ransom Gang"

The ransomware group named Rhysida has targeted Insomniac Games, the American game developer behind Spider-Man, Spyro the Dragon, and other popular video games. Rhysida says it stole "exclusive, unique, and impressive data" from Insomniac Games, but no details about the amount or contents have been provided. However, the gang's low-quality screenshots include some sensitive internal emails, copies of passports, images of game assets, and more. The gang is selling the allegedly stolen data for $2 million in digital currency.

Submitted by Gregory Rigby on

"The Hidden Challenges of Contractor Identity Management"

"The Hidden Challenges of Contractor Identity Management"

Contractors present a significant Identity and Access Management (IAM) vulnerability. Although these third parties are necessary for business operations, they still pose a threat. As suggested by discussions with security leaders, contractors are often left unaccounted for in security strategies. Outsourcing to contractors has become a critical component of business growth, from offshore customer support to software development.

Submitted by Gregory Rigby on

"UTSA Establishes New Hub to Improve Management of Digital Assets"

"UTSA Establishes New Hub to Improve Management of Digital Assets"

The National Science Foundation (NSF) has awarded the University of Texas at San Antonio (UTSA) a two-year grant to establish the National DigiFoundry (NDF). This consortium could redefine the management of digital assets such as cryptocurrencies. Current digital asset management systems present a number of cybersecurity challenges. They are vulnerable to decentralized notification attacks, multi-call transaction audits, and more. The NDF is building a robust framework capable of adapting to the fast-paced digital asset market.

Submitted by Gregory Rigby on
Subscribe to