Security News

SAP AI Core Vulnerabilities Expose Customer Data to Cyber Attacks
2024-07-18 09:33

Cybersecurity researchers have uncovered security shortcomings in SAP AI Core cloud-based platform for creating and deploying predictive artificial intelligence workflows that could be exploited to get hold of access tokens and customer data. "The vulnerabilities we found could have allowed attackers to access customers' data and contaminate internal artifacts - spreading to related services and other customers' environments," security researcher Hillai Ben-Sasson said in a report shared with The Hacker News.

TAG-100: New Threat Actor Uses Open-Source Tools for Widespread Attacks
2024-07-18 09:10

Unknown threat actors have been observed leveraging open-source tools as part of a suspected cyber espionage campaign targeting global government and private sector organizations. Recorded Future's Insikt Group is tracking the activity under the temporary moniker TAG-100, noting that the adversary likely compromised organizations in at least ten countries across Africa, Asia, North America, South America, and Oceania, including two unnamed Asia-Pacific intergovernmental organizations.

Cisco fixes critical flaws in Secure Email Gateway and SSM On-Prem (CVE-2024-20401, CVE-2024-20419)
2024-07-18 09:02

Cisco has fixed two critical vulnerabilities that may allow attackers to overwrite files on its Secure Email Gateways and change the password of any user on its Smart Software Manager On-Prem license servers. Cisco Secure Email Gateways aim to protect businesses against emails laden with malware, malicious links and scams, and against exfiltration of sensitive data via email.

Firms skip security reviews of major app updates about half the time
2024-07-18 07:28

Cyber security workers only review major updates to software applications only 54 percent of the time, according to a poll of tech managers. Twenty-two percent of respondents confessed they did a security review under half of the time, and the same percentage claim to have reviewed code 50 to 74 percent of the time.

Meta Halts AI Use in Brazil Following Data Protection Authority's Ban
2024-07-18 06:14

The company said it has decided to suspend the tools while it is in talks with Brazil's National Data Protection Authority to address the agency's concerns over its use of GenAI technology. The decision stems from "The imminent risk of serious and irreparable damage or difficult-to-repair damage to the fundamental rights of the affected data subjects," the agency said.

Cisco Warns of Critical Flaw Affecting On-Prem Smart Software Manager
2024-07-18 06:01

Cisco has released patches to address a maximum-severity security flaw impacting Smart Software Manager On-Prem that could enable a remote, unauthenticated attacker to change the password of any users, including those belonging to administrative users. "An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user."

Fighting AI-powered synthetic ID fraud with AI
2024-07-18 04:30

Aided by the emergence of generative artificial intelligence models, synthetic identity fraud has skyrocketed, and now accounts for a staggering 85% of all identity fraud cases. Anomaly detection algorithms analyze transaction data to flag irregularities indicative of synthetic identity fraud, continuously learning from new data and evolving fraud tactics to enhance effectiveness over time.

Laying the groundwork for zero trust in the military
2024-07-18 04:00

Arnold provides insights into the DoD's Zero Trust Overlays guide and the future evolution of zero-trust principles in a military context. Where should the military begin its training process for zero trust principles? Should specific tools or technologies be implemented first to support this training?

Grype: Open-source vulnerability scanner for container images, filesystems
2024-07-18 03:30

Grype is an open-source vulnerability scanner designed for container images and filesystems that seamlessly integrates with Syft, a powerful Software Bill of Materials tool. Find vulnerabilities for major operating system packages Find vulnerabilities for language-specific packages Ruby Java JavaScript Python Dotnet Golang PHP Rust.

Signatures should become cloud security history
2024-07-18 03:00

It's becoming evident that the legacy practice of signature-based threat detection needs to be improved for cloud security challenges. In this Help Net Security video, Jimmy Mesta, CTO at RAD Security, discusses a new proposed standard for creating behavioral fingerprints of open-source image behavior at runtime.