"Casio Confirms Ransomware Outage and Data Breach"

"Casio Confirms Ransomware Outage and Data Breach"

Casio has recently revealed that some of its corporate systems and services are still damaged and personal information has been compromised, after a ransomware attack over a week ago.  The Japanese electronics giant said it was alerted to an unauthorized intrusion after a system failure on October 5 rendered several systems unusable.  The full extent of the damage is still under investigation, but the company has set up a task force and is currently working diligently to quickly restore internal systems and resume operations.

Submitted by Adam Ekwall on

"Penn State Leads $8.5M, Multi-Institution DARPA Project on Mixed-Reality Systems"

"Penn State Leads $8.5M, Multi-Institution DARPA Project on Mixed-Reality Systems"

Penn State researchers will lead a multi-institution project called "Verified Probabilistic Cognitive Reasoning for Tactical Mixed Reality Systems (VeriPro)" funded by the Defense Advanced Research Projects Agency (DARPA) to identify cognitive threats faced by Mixed Reality (MR) systems as part of the agency's "Intrinsic Cognitive Security" program. The project aims to model risks, human behaviors, and potential attacks and mitigations within MR systems.

Submitted by Gregory Rigby on

"Explore Cybersecurity Through Art at New Exhibition"

"Explore Cybersecurity Through Art at New Exhibition"

In a new art exhibition, Virginia researchers and artists challenge our cybersecurity perceptions. The Commonwealth Cyber Initiative (CCI)-funded "CyberArts 2024 Exhibit" includes projects from Blue Ridge Community College, George Mason University, James Madison University, Old Dominion University, Virginia Commonwealth University, and Virginia Tech. A project named "Hidden Within" delves into steganography, a practice that can be used in a cyberattack. It involves hiding a message within a digital picture or music.

Submitted by Gregory Rigby on

"Akira and Fog Ransomware Now Exploit Critical Veeam RCE Flaw"

"Akira and Fog Ransomware Now Exploit Critical Veeam RCE Flaw"

A critical security vulnerability allows ransomware gangs such as "Akira" and Fog" to conduct Remote Code Execution (RCE) on vulnerable Veeam Backup & Replication (VBR) servers. Florian Hauser, a security researcher at Code White, found that the flaw, stemming from a deserialization of untrusted data weakness, can be used in low-complexity attacks. This article continues to discuss the exploitation of a critical Veeam RCE flaw.

Submitted by Gregory Rigby on

"SANS Institute: Top 5 Dangerous Cyberattack Techniques in 2024"

"SANS Institute: Top 5 Dangerous Cyberattack Techniques in 2024"

The SANS Institute, a leading cybersecurity research, education, and certification authority, has released its annual "Top Attacks and Threats Report." This report delves into the changing threat landscape as it identifies the most common and dangerous cyberattack techniques organizations must be on the lookout for. It also focused on key takeaways from a presentation at SANS Institute's yearly RSA Conference. SANS members identified and discussed five new cyberattacks, as well as suggested responses to them.

Submitted by Gregory Rigby on

"Over 10M Conversations Exposed in AI Call Center Hack"

"Over 10M Conversations Exposed in AI Call Center Hack"

A data breach has exposed over 10 million conversations from an Artificial Intelligence (AI)-driven call center platform in the Middle East. According to researchers at Resecurity, the breach involved unauthorized access to the platform's management dashboard, which enabled attackers to collect millions of interactions between consumers, operators, and AI agents. The stolen data could be used for advanced fraud, phishing schemes, and other malicious activities involving AI. This article continues to discuss the AI call center hack.

Submitted by Gregory Rigby on

"Granted ACCESS: $125K Award Will Improve Cybersecurity in US Defense Supply Chain"

"Granted ACCESS: $125K Award Will Improve Cybersecurity in US Defense Supply Chain"

Through a 12-month award for 2025 from the US Department of Defense (DOD) Cyber Service Academy, a team of researchers at the University of Wisconsin-Stout will develop the "AI-Powered Cloud CMMC and Education Support System" (ACCESS). The Cybersecurity Maturity Model Certification (CMMC) is a DOD program aimed at helping businesses protect against cybersecurity threats. Defense supply chain partners handling sensitive unclassified data will have to meet strict cybersecurity standards. ACCESS will try to simplify CMMC compliance. This article continues to discuss the ACCESS project.

Submitted by Gregory Rigby on

"CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance"

"CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance"

The US Cybersecurity and Infrastructure Security Agency (CISA) warns that threat actors are using unencrypted persistent cookies managed by the F5 BIG-IP Local Traffic Manager (LTM) module to perform network reconnaissance. According to CISA, the module is being leveraged to enumerate other non-internet-facing devices on the target network. CISA warned that a malicious cyber actor could use unencrypted persistence cookies to infer or identify additional network resources and exploit vulnerabilities in other devices on the network.

Submitted by Gregory Rigby on

"Fidelity Notifies 77K Customers of Data Breach"

"Fidelity Notifies 77K Customers of Data Breach"

Fidelity Investments recently announced that just over 77,000 individuals will receive news that their personal information was compromised in a data security incident. The breach itself occurred between Aug. 17 and Aug. 19, when an unauthorized third party gained access to two customer accounts and obtained private information. Access was terminated when the activity was detected on Aug. 19, and an investigation began.

Submitted by Adam Ekwall on

"Critical Mozilla Firefox Zero-Day Allows Code Execution"

"Critical Mozilla Firefox Zero-Day Allows Code Execution"

Mozilla has recently patched a critical security vulnerability in its Firefox Web browser that's being actively exploited in the wild.  Tracked as CVE-2024-9680, the vulnerability is a use-after-free issue in Animation timelines, with attackers exploiting it to execute arbitrary code.  It carries a CVSSv3 vulnerability severity rating of 9.8 out of 10 and has a low attack complexity.  Mozilla noted that no privileges or user interaction is needed to exploit the flaw successfully.

Submitted by Adam Ekwall on
Subscribe to