"Security in the Impending Age of Quantum Computers"

"Security in the Impending Age of Quantum Computers"

Quantum computing is important to the cybersecurity community because a future quantum computer of adequate size and efficiency could crack today's encryption schemes, putting currently protected information and communications at risk. Public-key encryption enables over 4.5 billion Internet users to access 200 million websites and engage in retail e-commerce securely. On the other hand, certain quantum technologies have the potential to improve existing encryption. Therefore, quantum technologies serve as both a sword and a shield in cybersecurity.

Submitted by Gregory Rigby on

"1.3 Million Maine Residents Impacted by MOVEit Hack"

"1.3 Million Maine Residents Impacted by MOVEit Hack"

The State of Maine is the latest entity to disclose a significant impact from the cyberattack targeting a zero-day in Progress Software’s MOVEit file transfer tool earlier this year.  According to security researchers at Emsisoft, more than 2,500 organizations and over 69 million individuals have been affected by the MOVEit hack.  The state of Main has found that the breach affected 1.3 million Main residents.

Submitted by Adam Ekwall on

"ICBC and Allen & Overy Hit By Ransomware"

"ICBC and Allen & Overy Hit By Ransomware"

Two giants of the banking and legal sectors have recently been breached by suspected ransomware actors.  Allen & Overy is one of the UK's "Magic Circle" law firms.  It is believed that LockBit was behind the ransomware attack on Allen & Overy since they are listed on the gang's leak site.  The company stated that investigations to date have confirmed that data in its core systems, including its email and document management system, has not been affected.

Submitted by Adam Ekwall on

"Audio Deepfake Detective Developing New Sleuthing Techniques"

"Audio Deepfake Detective Developing New Sleuthing Techniques"

Audio deepfakes have raised concerns among cybersecurity experts as scammers increasingly use voice-related Artificial Intelligence (AI) schemes for various malicious activities. With AI-driven audio generation making it challenging to distinguish between real and fake audio, You "Neil" Zhang of the University of Rochester's Audio Information Research (AIR) Lab is developing new audio deepfake detection systems. Zhang is also working on watermarking techniques for the audio generation process that will help identify the source of deepfakes.

Submitted by Gregory Rigby on

"MOVEit Hackers Cl0p Exploit SysAid Zero-Day – Microsoft"

"MOVEit Hackers Cl0p Exploit SysAid Zero-Day – Microsoft"

According to researchers at Microsoft Threat Intelligence, the Russia-linked Cl0p ransomware group behind the wave of MOVEit Transfer-related attacks has been exploiting a previously unknown bug in the SysAid Information Technology (IT) support software. SysAid is an international software company based in Israel whose products are used by many organizations worldwide. Its software offers help desk, asset management, remote control, patch management, and other services to support IT operations.

Submitted by Gregory Rigby on

"FBI: Ransomware Gangs Hack Casinos via 3rd Party Gaming Vendors"

"FBI: Ransomware Gangs Hack Casinos via 3rd Party Gaming Vendors"

The FBI is warning of ransomware threat actors targeting casino servers and using legitimate system management tools to gain network access. To breach casinos, ransomware gangs continue to rely on third-party gaming vendors. According to the agency, new trends include ransomware actors exploiting vulnerabilities in vendor-controlled remote access to casino servers and companies being victimized through legitimate system management tools to elevate network permissions.

Submitted by Gregory Rigby on

"Open-Source Vulnerability Disclosure: Exploitable Weak Spots"

"Open-Source Vulnerability Disclosure: Exploitable Weak Spots"

According to Aqua Security researchers, attackers could exploit flaws in the vulnerability disclosure process of open-source projects to gather the information they need to launch attacks before patches are made available. The maintainer is aware of "half-day" vulnerabilities, and information about them is publicly available on GitHub or the National Vulnerability Database, but there is still no official fix.

Submitted by Gregory Rigby on

"Medical Company Fined $450,000 by New York AG Over Data Breach"

"Medical Company Fined $450,000 by New York AG Over Data Breach"

The attorney general of the state of New York recently announced that a medical company has been fined $450,000 over a data breach resulting from a ransomware attack.  According to the New York AG's office, US Radiology Specialists, a major private radiology group, was targeted in a ransomware attack in December 2021.  The incident resulted in the personal and health information of nearly 200,000 patients, including 92,000 New Yorkers, getting compromised.

Submitted by Adam Ekwall on

"CISA Signs Memorandum of Understanding with the Republic of Korea to Share Cyber Threat Information and Cybersecurity Best Practices"

"CISA Signs Memorandum of Understanding with the Republic of Korea to Share Cyber Threat Information and Cybersecurity Best Practices"

Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA), and Baek Jong-wook, the Republic of Korea's Deputy Director of the National Intelligence Service (NIS), have signed a Memorandum of Understanding (MoU) outlining collaboration areas under the bilateral Cyber Framework signed by President Biden and Republic of Korea President Yoon in April. The Cyber Framework declares cooperation with Korea in CISA mission areas, including sharing technical and operational cyber threat information and best practices in cyber crisis management.

Submitted by Gregory Rigby on

"NSA and ESF Partners Release Recommended Practices for Software Bill of Materials Consumption"

"NSA and ESF Partners Release Recommended Practices for Software Bill of Materials Consumption"

The National Security Agency (NSA), the Office of the Director of National Intelligence (ODNI), the Cybersecurity and Infrastructure Security Agency (CISA), and industry partners have published "Securing the Software Supply Chain: Recommended Practices for Software Bill of Materials Consumption." This Cybersecurity Technical Report (CTR) aims to help software developers, suppliers, and customer stakeholders ensure the integrity and security of software through contractual agreements, software updates, notifications, and vulnerability mitigations.

Submitted by Gregory Rigby on
Subscribe to