8 links
tagged with cybersecurity
Click any tag below to further narrow down your results
Links
The article discusses the discovery of GlassWorm, the first self-propagating worm targeting VS Code extensions on the OpenVSX marketplace, utilizing invisible Unicode characters to hide malicious code from developers and code review tools. This sophisticated attack collects credentials, drains cryptocurrency wallets, and employs blockchain for its command and control infrastructure, making it a significant security threat to developers.
Ransomware profits have significantly decreased as only 23% of victims now pay hackers, marking a continued decline in payment resolution rates. Factors contributing to this trend include improved cybersecurity measures and increased pressure from authorities on organizations not to pay. Additionally, ransomware groups are shifting focus to medium-sized firms, while the use of remote access and software vulnerabilities as attack vectors is on the rise.
A recent data breach has exposed 183 million Gmail passwords along with other login credentials, as confirmed by the Have I Been Pwned database. The breach, which includes a significant amount of previously unseen credentials, highlights risks associated with credential reuse and the importance of security measures like two-step verification. Google has provided guidance for users on how to protect their accounts and check for compromised credentials.
A breach at the Kansas City National Security Campus, a critical US nuclear weapons facility, was carried out by foreign hackers exploiting unpatched Microsoft SharePoint vulnerabilities. The incident highlights the need for improved security measures in federal IT and operational technology systems, with conflicting attribution pointing to either Chinese or Russian threat actors.
The article discusses a security vulnerability found in the FIA's driver categorization website, allowing unauthorized access to administrative roles through a simple HTTP PUT request. The authors, who participated in a cybersecurity event related to Formula 1, demonstrated that they could escalate privileges and gain full admin access, potentially exposing sensitive information like driver profiles and personal data. This is the first part of a three-part series on vulnerabilities in Formula 1 systems.
The article discusses Paul Hudson's initiative to teach kids aged 13 and up how to hack in a safe and engaging way through a game called Hacktivate. This game features 240 "capture the flag" challenges that cover various hacking techniques and computer science skills, aiming to inspire curiosity and provide structured learning in cybersecurity. Hudson emphasizes the importance of making hacking education exciting and accessible while addressing common issues found in existing learning materials.
Faculty at the University of California are protesting a new cybersecurity mandate that requires the installation of Trellix software on university and personal devices. They argue that this initiative infringes on academic freedom and privacy by potentially allowing administrators and federal agencies access to sensitive research and communications. Despite university officials defending the mandate as essential for cybersecurity, concerns persist about the intrusive nature of the software and its implications for faculty autonomy.
The Traffic Light Protocol (TLP) is a standardized framework developed by FIRST to facilitate the sharing of sensitive information among different recipients while maintaining clear sharing boundaries. TLP consists of four labels—RED, AMBER, GREEN, and CLEAR—each indicating the level of confidentiality and restrictions on information sharing. The protocol is designed for ease of use and is applicable in various communication formats and automated systems.