Tag: emerging threats

  • Microsoft Security Blog: 3 takeaways from red teaming 100 generative AI products

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/01/13/3-takeaways-from-red-teaming-100-generative-ai-products/ Source: Microsoft Security Blog Title: 3 takeaways from red teaming 100 generative AI products Feedly Summary: Since 2018, Microsoft’s AI Red Team has probed generative AI products for critical safety and security vulnerabilities. Read our latest blog for three lessons we’ve learned along the way. The post 3 takeaways from red teaming…

  • Microsoft Security Blog: Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/01/13/analyzing-cve-2024-44243-a-macos-system-integrity-protection-bypass-through-kernel-extensions/ Source: Microsoft Security Blog Title: Analyzing CVE-2024-44243, a macOS System Integrity Protection bypass through kernel extensions Feedly Summary: Microsoft discovered a macOS vulnerability allowing attackers to bypass System Integrity Protection (SIP) by loading third party kernel extensions, which could lead to serious consequences, such as allowing attackers to install rootkits, create persistent…

  • Alerts: CISA Releases the JCDC AI Cybersecurity Collaboration Playbook and Fact Sheet

    Source URL: https://www.cisa.gov/news-events/alerts/2025/01/14/cisa-releases-jcdc-ai-cybersecurity-collaboration-playbook-and-fact-sheet Source: Alerts Title: CISA Releases the JCDC AI Cybersecurity Collaboration Playbook and Fact Sheet Feedly Summary: Today, CISA released the JCDC AI Cybersecurity Collaboration Playbook and Fact Sheet to foster operational collaboration among government, industry, and international partners and strengthen artificial intelligence (AI) cybersecurity. The playbook provides voluntary information-sharing processes that, if adopted,…

  • CSA: What Are the Top Cybersecurity Threats of 2025?

    Source URL: https://cloudsecurityalliance.org/blog/2025/01/14/the-emerging-cybersecurity-threats-in-2025-what-you-can-do-to-stay-ahead Source: CSA Title: What Are the Top Cybersecurity Threats of 2025? Feedly Summary: AI Summary and Description: Yes **Summary:** The text outlines the top 10 emerging cybersecurity threats anticipated for 2025, emphasizing the evolving tactics of cybercriminals and the necessity for organizations to adopt proactive security measures. Key threats include sophisticated ransomware,…

  • Unit 42: One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery With Graph Neural Networks

    Source URL: https://unit42.paloaltonetworks.com/graph-neural-networks/ Source: Unit 42 Title: One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery With Graph Neural Networks Feedly Summary: Graph neural networks aid in analyzing domains linked to known attack indicators, effectively uncovering new malicious domains and cybercrime campaigns. The post One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery…

  • The Register: Microsoft sues ‘foreign-based’ criminals, seizes sites used to abuse AI

    Source URL: https://www.theregister.com/2025/01/13/microsoft_sues_foreignbased_crims_seizes/ Source: The Register Title: Microsoft sues ‘foreign-based’ criminals, seizes sites used to abuse AI Feedly Summary: Crooks stole API keys, then started a hacking-as-a-service biz Microsoft has sued a group of unnamed cybercriminals who developed tools to bypass safety guardrails in its generative AI tools. The tools were used to create harmful…

  • Alerts: CISA Releases Four Industrial Control Systems Advisories

    Source URL: https://www.cisa.gov/news-events/alerts/2025/01/10/cisa-releases-four-industrial-control-systems-advisories Source: Alerts Title: CISA Releases Four Industrial Control Systems Advisories Feedly Summary: CISA released four Industrial Control Systems (ICS) advisories on January 10, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-010-01 Schneider Electric PowerChute Serial Shutdown ICSA-25-010-02 Schneider Electric Harmony HMI and Pro-face HMI…

  • The Register: Zero-day exploits plague Ivanti Connect Secure appliances for second year running

    Source URL: https://www.theregister.com/2025/01/09/zeroday_exploits_ivanti/ Source: The Register Title: Zero-day exploits plague Ivanti Connect Secure appliances for second year running Feedly Summary: Factory resets and apply patches is the advice amid fortnight delay for other appliances The cybersecurity industry is urging those in charge of defending their orgs to take mitigation efforts “seriously" as Ivanti battles two…

  • Hacker News: A Day in the Life of a Prolific Voice Phishing Crew

    Source URL: https://krebsonsecurity.com/2025/01/a-day-in-the-life-of-a-prolific-voice-phishing-crew/ Source: Hacker News Title: A Day in the Life of a Prolific Voice Phishing Crew Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text delves into the disturbing and sophisticated tactics utilized by voice phishing gangs, primarily focusing on a group known as “Crypto Chameleon.” It highlights how these criminals…

  • The Register: Telemetry data from 800K VW Group EVs exposed online

    Source URL: https://www.theregister.com/2025/01/06/volkswagen_ev_data_exposed/ Source: The Register Title: Telemetry data from 800K VW Group EVs exposed online Feedly Summary: PLUS: DoJ bans data sale to enemy nations; Do Kwon extradited to US; Tenable CEO passes away; and more Infosec in Brief Welcome to 2025: hopefully you enjoyed a pleasant holiday season and returned to the security…