Daily Brief

Find articles below, see 'DETAILS' for generated summaries

Total articles found: 12703

Checks for new stories every ~15 minutes

Title Summary
ROWS
2024-03-13 18:04:47 theregister MISCELLANEOUS Google's $10M Bug Bounty Payouts in 2023 Signal Security Focus
Google's vulnerability reward programs distributed $10 million to bug hunters in 2023, a decrease from $12 million the previous year. The company introduced new reward categories, including bounties for vulnerabilities in AI products and Android phone apps. Microsoft outpaced Google in bounty payouts, awarding $13.8 million to researchers in a similar period. Google's largest single bounty in 2023 was $113,337, awarded for an unspecified program and recipient. The Android Vulnerability Reward Program (VRP) paid over $3.4 million for Android device security issues, and maximum rewards for critical bugs were increased to $15,000. Google included Wear OS in its bounty program and hosted live hack-a-thon events, uncovering over 20 critical vulnerabilities with payouts totaling $70,000. Chrome Vulnerability Reward Program (VRP) paid $2.1 million, with fewer reports following the implementation of MiraclePtr technology aimed at preventing specific types of exploits. Concerns have been raised about the effectiveness of bug bounty programs in actually improving software security, with some arguing for the importance of investing in secure software development over bounty payouts.
Details
2024-03-13 16:02:25 theregister MISCELLANEOUS Microsoft Copilot for Security to Enhance AI-Driven Cybersecurity
Microsoft is releasing Copilot for Security, a generative AI service for cybersecurity tasks, on April 1, 2024. The AI service, powered by GPT-4 and a specialized security model, offers automated assistance with security operations, analysis, and incident response. Integration is set up across Microsoft's own product suite, including Sentinel and Defender XDR, and with third-party services, aiming to streamline cybersecurity workflows. Features include a standalone portal or embedded service, custom promptbooks, company-specific knowledge bases, multilingual support, and detailed usage reporting. Copilot for Security employs a 'pay-as-you-go' model through Microsoft Azure, with billing based on Security Compute Units at an anticipated rate of $4/hour. According to Microsoft, users of Copilot for Security completed tasks 22% faster on average, although for some response tasks, the service slowed down progress due to its load time. The service aims to alleviate the current cybersecurity talent shortage by enabling faster and more efficient security task handling, potentially improving threat detection and response.
Details
2024-03-13 15:41:35 thehackernews MISCELLANEOUS OPSWAT Advocates Multi-Layered Cybersecurity in New Whitepaper
OPSWAT's latest whitepaper offers insight on the insufficiency of common file upload security tools when used singularly. CEO Benny Czarny emphasizes the importance of a comprehensive, layered cybersecurity strategy to combat evolving malware threats. The paper identifies the limitations of standalone tools including Anti-Malware File Scanning, Web Application Firewalls, and Sandboxing. OPSWAT's MetaDefender Platform integrates multiple layers of security technology, including more than 30 anti-malware engines for near-perfect efficacy rates. Deep Content Disarm and Reconstruction (Deep CDR) and Proactive Data Loss Prevention (DLP) are highlighted as innovative methodologies for preemptive threat neutralization and data protection. The platform also includes an adaptive, emulation-based sandboxing feature that operates with other technologies for a robust defense against sophisticated malware. The whitepaper underscores OPSWAT's continued innovation to address the challenges and needs of protecting critical infrastructure in an ever-changing threat landscape.
Details
2024-03-13 14:04:14 bleepingcomputer MISCELLANEOUS Evaluating Pen Test Vendor Rotation Versus Continuous PTaaS Solutions
Penetration Testing as a Service (PTaaS) is becoming a sustainable alternative to annual pen test vendor rotation. Rotating pen test vendors annually is not mandatory but considered a best practice to uncover new vulnerabilities. A single, long-term relationship with a trusted vendor can be beneficial and avoid the resource drain associated with onboarding new vendors. PTaaS provides a standardized, manageable approach, offering continuous and regular testing rather than infrequent, annual tests. PTaaS providers typically utilize a larger pool of testers with diverse skill sets, potentially leading to more comprehensive and customized testing. Outpost24's SWAT, a PTaaS solution for web applications, provides continuous monitoring and the benefits of a SaaS delivery model. Concluding that while annual rotation can be useful, PTaaS offers more efficient, consistent, and in-depth pen testing options for organizations.
Details
2024-03-13 13:58:39 thehackernews MALWARE PixPirate Trojan Hides Icon, Targets Brazilian Banking Users
The PixPirate Android banking trojan is applying a new evasion technique to conceal its presence from users' device screens, posing a persistent threat in Brazil. PixPirate exploits the Android accessibility services to execute unauthorized transactions via PIX instant payment and steal sensitive information, such as banking credentials and credit card data. The malware has evolved to avoid detection by hiding its app icon, making it harder for victims to recognize and remove the infection from their devices. Attackers are distributing the trojan primarily through SMS and WhatsApp using a dropper/downloader app that collaborates with the main payload to conduct fraud. The downloader is instrumental not only for deploying the PixPirate malware but also for executing and maintaining its operations through ongoing communication and command execution. Despite the potential removal of the downloader, PixPirate can persist on the infected device by triggering its execution based on various system events. The campaign's sophistication signals a growing trend of advanced financial malware targeting Latin American banks, including a recent malware called Fakext which uses a rogue Edge browser extension to hijack banking credentials.
Details
2024-03-13 12:06:24 theregister RANSOMWARE Stanford University Ransomware Incident Exposes Data of 27,000
Stanford University confirmed a ransomware attack which went undetected for four months, affecting 27,000 individuals. Sensitive data, including names and social security numbers, were stolen from the Department of Public Safety's database. The breach occurred on May 12, 2023, but was only discovered on September 27, raising concerns about the duration of unauthorized access. Stanford has offered the impacted individuals two years of free credit monitoring and ID theft recovery services. The university has engaged law enforcement and cybersecurity experts to address the breach and to strengthen its security measures. Akira, the ransomware group responsible, has made Stanford's stolen data available for download via a torrent file. Akira, operational since March 2023, has been responsible for other major attacks and is considered a significant threat in the ransomware landscape.
Details
2024-03-13 11:45:45 bleepingcomputer CYBERCRIME LockBit Ransomware Affiliate Sentenced to Four Years and Fined
Russian-Canadian cybercriminal Mikhail Vasiliev received a four-year prison sentence for involvement with the LockBit ransomware gang. Vasiliev pleaded guilty to eight charges and was implicated in roughly a thousand cyberattacks with demands totaling over $100 million. His cybercrimes primarily targeted businesses in various Canadian provinces between 2021 and 2022. The court ordered him to pay $860,000 in restitution and mentioned the possibility of extradition to the U.S. for additional charges. Though disrupted by law enforcement, LockBit relaunched operations on new infrastructure, attempting to maintain its active image. Analysis suggests LockBit's current activities may be overstated, with data leaks mostly from companies attacked in previous years.
Details
2024-03-13 10:34:20 thehackernews CYBERCRIME Protect Your SaaS Applications From Identity-Related Cyber Threats
Cybercriminals are increasingly targeting identities within SaaS applications, posing a risk of data breaches and compliance violations. A range of identities, both human and non-human, such as API keys and service accounts, are potential entry points for attackers in SaaS platforms. While human identities can be safeguarded with multi-factor identification and single sign-on, non-human identities require different security measures. Non-human accounts, often equipped with higher privileges for integration tasks, are more challenging to protect and more susceptible to attacks. Cybersecurity strategies for non-human accounts include continuous monitoring and automated security checks to detect unusual activities. Many organizations neglect the security of non-human identities, despite their high potential risk for exploitation. An upcoming webinar will feature Adaptive Shield's CEO Maor Bin, focusing on identity risks in SaaS applications and how to enforce a strong identity security posture. The webinar will cover advanced methods and tools to enhance protection against evolving cyber threats within SaaS environments.
Details
2024-03-13 10:18:54 thehackernews CYBERCRIME Researchers Uncover Security Risks in Google's Gemini AI
HiddenLayer has identified security threats in Google's Gemini large language model that could lead to unintended content generation and information leaks. The security guardrails meant to guide the AI in building appropriate responses can be bypassed, potentially leaking system prompts using synonym attacks or crafted prompts. Gemini models could be manipulated to spread misinformation, execute illegal activities, or cause the AI to divulge sensitive system messages. The models are tricked into mixing up user inputs with system prompts, especially when fed a series of nonsensical inputs. A test using Google Workspace integration revealed potential for malicious actors to gain control over a user's interaction with the AI model. Alongside this, academics highlighted the possibility of model-stealing attacks that can extract information from production language models like OpenAI's ChatGPT or Google's PaLM-2. Security measures like model defenses and safeguards against harmful responses are being continuously improved by Google, which also runs red-teaming exercises. In response to these vulnerabilities, Google has restricted AI responses to election-related queries and is working to improve their protective measures.
Details
2024-03-13 09:53:21 thehackernews MALWARE Malware Phishing Campaign Exploits AWS and GitHub for RAT Deployment
Cybercriminals are leveraging Amazon Web Services (AWS) and GitHub to distribute remote access trojans (RATs) VCURMS and STRRAT. The delivery method involves a phishing email with a malicious Java-based downloader posing as a payment verification button. VCURMS uses a Proton Mail address to communicate with its command-and-control server and conducts periodic mailbox checks for command execution instructions. The malware is equipped to steal sensitive data from applications and browsers, capture screenshots, and gather detailed hardware and network information. VCURMS bears resemblance to another Java-based infostealer known as Rude Stealer, which surfaced in the previous year. STRRAT, also Java-based and active since 2020, includes varied features such as keylogging and credential theft from browsers and applications. Darktrace has also uncovered a separate phishing campaign exploiting Dropbox's automated emails to distribute a malicious Microsoft 365 login mimic. The public hosting of malware and utilization of protected commercial services underscore the need for advanced detection and security practices to combat these elevated threats.
Details
2024-03-13 08:57:10 theregister MISCELLANEOUS Securing Multi-Cloud Environments with Collaborative Strategies
Enterprises are adopting multi-cloud strategies for data sovereignty and cost optimization, but this introduces complex security challenges. A lack of cohesive cloud security skills could lead to vulnerabilities, requiring continuous monitoring and skills in cloud infrastructure and operations. Misconfigurations in security settings of cloud providers, like in the case of AWS's S3 buckets, can lead to significant security breaches. The shared responsibility model in cloud security remains misunderstood by many organizations, leading to potential gaps in protection. A layered defense approach is necessary for cloud security, with a focus on shared responsibility across the organization's departments and personnel. Trend Micro advocates for a united approach to cloud security, emphasizing the role of SOC teams and the use of platforms like Vision One for extended detection and response. Integration with AWS and continuous improvement of cloud security features in response to the evolving threat landscape are key to maintaining a secure cloud infrastructure. Trend Micro's threat intelligence network plays a crucial role in keeping cloud assets safe and updated with the latest patches and threat data.
Details
2024-03-13 08:36:42 theregister CYBERCRIME Researchers Expose AI Hidden Layers Through Intrusive Queries
Researchers have successfully extracted information from closed AI services by probing the APIs of AI models from OpenAI and Google. By performing targeted attacks, the scientists recovered the embedding projection layer of transformer models, revealing model dimensions and potential capabilities. The cost of performing these attacks varied, with complete projection matrix extraction costing under $20 for some models. The findings by 13 computer scientists have been shared with the affected companies, prompting the implementation of new defenses. OpenAI's deprecated models' dimensions were disclosed in a research paper, while the dimensions of active models were withheld to prevent potential exploitation. The attack demonstrates that it is possible to recover significant aspects of a model without having direct access, raising intellectual property security concerns. A report commissioned by the US Department of State recommends restrictions on the release or sale of advanced AI models and increased security measures to protect intellectual property, including model weights. Advanced techniques to detect and prevent parameter extraction attempts are recommended, which may involve monitoring usage patterns or developing more sophisticated countermeasures.
Details
2024-03-13 05:43:47 thehackernews MISCELLANEOUS Microsoft's March Security Update Resolves 61 Vulnerabilities
Microsoft's March security update addresses 61 vulnerabilities, with critical fixes for Windows Hyper-V issues. Two critical flaws in Hyper-V could lead to denial-of-service and remote code execution. No exploits of the flaws were known or active at the time of the patch release, though six vulnerabilities were assessed as "Exploitation More Likely." The Azure Kubernetes Service, Windows Composite Image File System, and the Authenticator app had significant privilege escalation flaws patched. The Print Spooler and Exchange Server each had notable vulnerabilities that could allow attackers to gain SYSTEM privileges or execute malicious code, respectively. The most severe vulnerability, CVE-2024-21334 in Open Management Infrastructure, had a CVSS score of 9.8 and could be exploited by remote unauthenticated attackers. Microsoft's Q1 2024 patches showed a quieter trend with fewer CVEs addressed compared to the previous four-year average for the first quarter. Other vendors have also released security updates during the past few weeks to mitigate various vulnerabilities.
Details
2024-03-13 00:22:16 theregister CYBERCRIME Patch Tuesday: Microsoft, Adobe, SAP, and Others Release Security Fixes
Microsoft released patches addressing 61 vulnerabilities, with two critical bugs affecting Windows Hyper-V hypervisor not under active attack. Adobe patched 56 issues across several products, while SAP fixed a dozen vulnerabilities, including three rated as HotNews Notes. Intel and AMD disclosed vulnerabilities, with Intel pushing eight patches and AMD issuing guidance on mitigating Spectre-type attacks. Fortinet updated five security advisories, addressing critical issues in FortiOS and FortiProxy, among other products. No vulnerabilities were reported as currently under active exploitation, though experts warn some could become targets soon. Companies are advised to apply these security updates promptly to mitigate potential risks associated with these vulnerabilities.
Details
2024-03-12 22:45:09 theregister DATA BREACH Former Meta VP Sued for Alleged Theft of Trade Secrets
Former Meta VP, Dipinder Singh Khurana, is accused of stealing sensitive documents for his startup. The stolen data allegedly includes details on Meta's data centers, AI programs, and staffing information. Meta has filed a lawsuit claiming breach of contract, duty of loyalty, fiduciary duty, unjust enrichment, and violation of computer crime laws. Evidence suggests Khurana uploaded Meta's confidential information to personal cloud accounts, including Google Drive and Dropbox. Meta alleges that at least eight employees left to join Khurana's new employer, potentially through the use of insider knowledge. Khurana's new company is reportedly in stealth mode and aims to provide AI cloud computing services at scale. Meta is seeking damages and the return of any benefits Khurana gained from the alleged theft of company secrets. The allegations are still to be addressed in court, and neither Khurana nor his lawyers have responded publicly.
Details