HomeBlog Comments vas pup • April 21, 2023 5:38 PM ChatGPT sparks AI investment bonanza https://www.dw.com/en/chatgpt-sparks-ai-investment-bonanza/a-65368393 “The artificial intelligence (AI) gold rush is truly underway. After...
Day: April 22, 2023
How Secure is Code Generated by ChatGPT ? by Khoury-Avila-Brunelle-Mamadou
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
GitHub now allows enabling private vulnerability reporting at scale
GitHub announced that private vulnerability reporting is now generally available and can be enabled at scale, on all repositories belonging to an organization. Once toggled on,...
EvilExtractor malware activity spikes in Europe and the U.S.
Researchers are seeing a rise in attacks spreading the EvilExtractor data theft tool, used to steal users’ sensitive data in Europe and the U.S. EvilExtractor is...
Google ads push BumbleBee malware used by ransomware gangs
The enterprise-targeting Bumblebee malware is distributed through Google Ads and SEO poisoning that promote popular software like Zoom, Cisco AnyConnect, ChatGPT, and Citrix Workspace. Bumblebee is...
CISA adds MinIO, PaperCut, and Chrome bugs to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini. US Cybersecurity and Infrastructure Security Agency (CISA) added MinIO, PaperCut, and Chrome vulnerabilities to its Known Exploited Vulnerabilities catalog. U.S....
At least 2 critical infrastructure orgs breached by North Korea-linked hackers behind 3CX attack – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini. North Korea-linked APT group behind the 3CX supply chain attack also broke into two critical infrastructure organizations in the energy...
American Bar Association (ABA) suffered a data breach,1.4 million members impacted – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini. The American Bar Association (ABA) disclosed a data breach, threat actors gained access to older credentials for 1,466,000 members. The...
Greening your security: Earth Day tips for cyber security experts
EXECUTIVE SUMMARY: Celebrate Earth Day 2023! Cyber security professionals are recognizing the role that they can play in supporting environmental sustainability initiatives and realizing how sustainability...
RSAC Fireside Chat: Here’s why companies are increasingly turning to MSSPs for deeper help
By Byron V. Acohido Managed Security Service Providers, MSSPs, have been around for some time now as a resource to help companies operate more securely. Related:...
North Korean APT Group Now Deploying Linux Malware Variant – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Cyberwarfare / Nation-State Attacks , Endpoint Security , Fraud Management & Cybercrime Eset Says Discovery Solidifies North Korea’s Ties to 3CX...
Why Health Entities Need to Implement NIST Cyber Framework – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. NIST Standards , Standards, Regulations & Compliance Bob Bastani of HHS ASPR Describes Perks of a Strategic Approach to Managing Risk...
HHS OCR Leader: Agency Is Cracking Down on Website Trackers – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Governance & Risk Management , HIPAA/HITECH , Privacy Director Melanie Fontes Rainer on Top HIPAA Rule-Making, Enforcement Priorities Marianne Kolbasuk McGee...
ISMG Editors: Cryptocurrency Special – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Cryptocurrency Fraud , Fraud Management & Cybercrime , Video Also; 2023 DeFi Illicit Finance Risk Assessment; FinCEN’s FATF Travel Rule Anna...
Symantec: More X_Trader Supply Chain Attacks Uncovered – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. 3rd Party Risk Management , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Energy and Financial Sector Firms Breached by...
Authentication Vendor Yubico to Go Public at $800M Valuation – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Multi-factor & Risk-based Authentication , Security Operations 80% Growth & Turning a Profit in 2022 Set Up Yubico Well While SPACs...
Shields Health Breach Exposes 2.3M Users’ Data
An unauthorized actor gained access to the systems of Shields Health Care Group (SHCG) in March, exposing driver’s license numbers as well as other identification information...
North Korea’s Kimsuky APT Keeps Growing, Despite Public Outing
Globally, interest has surged around North Korea’s Kimsuky advanced persistent threat group (a.k.a. APT43) and its hallmarks. Still, the group is showing no signs of slowing...
US Facebook users can now claim their share of $725 million Cambridge Analytica settlement
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Symantec: North Korean 3CX Hackers Also Hit Critical Infrastructure Orgs – Source: www.securityweek.com – Author: Ryan Naraine –
Source: www.securityweek.com – Author: Ryan Naraine. Category & Tags: Nation-State,Threat Intelligence,3CX,Supply Chain – Nation-State,Threat Intelligence,3CX,Supply Chain The North Korean hacking group behind the cascading supply chain...
Halcyon Secures $50M Funding for Anti-Ransomware Protection Platform – Source: www.securityweek.com – Author: Ryan Naraine –
Source: www.securityweek.com – Author: Ryan Naraine. Category & Tags: Endpoint Security,Ransomware – Endpoint Security,Ransomware Halcyon, a Texas startup building an AI-powered anti-ransomware engine to help organizations...
Abandoned WordPress Plugin Abused for Backdoor Deployment – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Malware & Threats – Malware & Threats Threat actors are installing the abandoned Eval PHP plugin on...
Five Eyes Agencies Issue Cybersecurity Guidance for Smart Cities – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Uncategorized – Uncategorized Five Eyes agencies this week issued cybersecurity guidance and best practices for smart cities....
Google Cloud Platform Vulnerability Led to Stealthy Account Backdoors – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Vulnerabilities,vulnerability – Vulnerabilities,vulnerability A vulnerability in Google Cloud Platform (GCP) could have allowed attackers to maliciously change...
GitHub Announces New Security Improvements – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Application Security,GitHub – Application Security,GitHub Microsoft-owned code hosting platform GitHub this week introduced NPM package provenance and...
House Committee Hears Testimony on DC Health Data Breach – Source: www.securityweek.com – Author: Associated Press –
Source: www.securityweek.com – Author: Associated Press. Category & Tags: Data Breaches,data breach,data leak,healthcare – Data Breaches,data breach,data leak,healthcare A top administrator with Washington’s health insurance exchange...
Capita Confirms Data Breach After Ransomware Group Offers to Sell Stolen Information – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Data Breaches,Ransomware,data breach,Featured,ransomware – Data Breaches,Ransomware,data breach,Featured,ransomware UK-based business process outsourcing and professional services company Capita has...
DevSecOps: AI is reshaping developer roles, but it’s not all smooth sailing
Image: Murrstock/Adobe Stock New DevSecOps research by GitLab suggests that 65% of developers are using artificial intelligence and machine learning in their code testing efforts or...
3CX Breach Was a Double Supply Chain Compromise
We learned some remarkable new details this week about the recent supply-chain attack on VoIP software provider 3CX. The lengthy, complex intrusion has all the makings of...
Training New Hires on Security: Strategies for Success
The rise of cyberthreats and the growing complexity of the IT threat landscape means security training for all organizations must be a paramount concern. Instilling a...