Security News

Cheating Automatic Toll Booths by Obscuring License Plates
2024-03-20 11:08

The Wall Street Journal is reporting on a variety of techniques drivers are using to obscure their license plates so that automatic readers can't identify them and charge tolls properly. Some drivers have power-washed paint off their plates or covered them with a range of household items such as leaf-shaped magnets, Bramwell-Stewart said.

Growing AceCryptor attacks in Europe
2024-03-20 11:00

ESET Research has recorded a considerable increase in AceCryptor attacks, with detections tripling between the first and second halves of 2023. In recent months, researchers registered a significant change in how AceCryptor is used, namely that the attackers spreading Rescoms started utilizing AceCryptor, which was not the case beforehand.

The most prevalent malware behaviors and techniques
2024-03-20 10:37

An analysis of 100,000+ Windows malware samples has revealed the most prevalent techniques used by malware developers to successfully evade defenses, escalate privileges, execute the malware, and assure its persistence. The analyzed malware samples were most often delivered via malicious email attachments featuring macro-enabled documents, Windows shortcut files, ISO/VHD containers, and MSI installers.

Five Eyes tell critical infra orgs: take these actions now to protect against China's Volt Typhoon
2024-03-20 10:15

The Feds and friends yesterday issued yet another warning about China's Volt Typhoon gang, this time urging critical infrastructure owners and operators to protect their facilities against destructive cyber attacks that may be brewing. The Tuesday alert - issued by the US Cybersecurity and Infrastructure Security Agency, the National Security Agency, FBI and eight other US and international partners - comes a little more than a month after the same groups from the same Five Eyes nations sounded the alarm on Volt Typhoon compromising "Multiple" critical infrastructure orgs' IT networks in America.

New BunnyLoader Malware Variant Surfaces with Modular Attack Features
2024-03-20 09:43

Cybersecurity researchers have discovered an updated variant of a stealer and malware loader called BunnyLoader that modularizes its various functions as well as allow it to evade detection....

Here's why Twitter sends you to a different site than what you clicked
2024-03-20 08:47

Users of the social media platform X have often been left puzzled when they click on a post with an external link but arrive at an entirely unexpected website from the one displayed in the post. Don't trust link previews on X. Security researcher Will Dormann spotted a Twitter post with a link to "Forbes.com."

Ukraine Arrests Trio for Hijacking Over 100 Million Email and Instagram Accounts
2024-03-20 06:48

The Cyber Police of Ukraine has arrested three individuals on suspicion of hijacking more than 100 million emails and Instagram accounts from users across the world. The suspects, aged between 20...

U.S. EPA Forms Task Force to Protect Water Systems from Cyberattacks
2024-03-20 05:48

The U.S. Environmental Protection Agency (EPA) said it's forming a new "Water Sector Cybersecurity Task Force" to devise methods to counter the threats faced by the water sector in the country....

Red teaming in the AI era
2024-03-20 05:30

To effectively safeguard these new environments, cybersecurity teams need to understand the shifting nuances of red teaming in the context of AI. Understanding what's changed with AI is an essential starting point to guide red teaming efforts in the years ahead. Why AI flips the red teaming script. Because the abilities of these models increase over time, cyber teams are no longer red teaming a static model.

#AI
1% of users are responsible for 88% of data loss events
2024-03-20 05:00

While organizations are investing in ​Data Loss Prevention solutions​, Proofpoint's report shows ​that those investments are often inadequate, with 85% of surveyed organizations experiencing data loss in the past year. "Careless, compromised, and malicious users are and will continue to be responsible for the vast majority of incidents, all while GenAI ​tools are​ absorbing common tasks-and ​gaining access to ​confidential data ​in the process​. Organizations need to rethink their ​DLP​ strategies to address the underlying cause of data loss-people's actions-so they can detect, investigate, and respond to threats across ​all ​channels​ their employees are using​ including cloud, endpoint, email, and web."