Tag: threats

  • The Register: UN’s aviation agency confirms attack on recruitment database

    Source URL: https://www.theregister.com/2025/01/08/uns_aviation_agency_confirms_attack/ Source: The Register Title: UN’s aviation agency confirms attack on recruitment database Feedly Summary: Various data points compromised but no risk to flight security The International Civil Aviation Organization (ICAO), the United Nations’ aviation agency, has confirmed to The Register that a cyber crim did indeed steal 42,000 records from its recruitment…

  • CSA: How Can Strong IAM Prevent Data Breaches?

    Source URL: https://cloudsecurityalliance.org/blog/2025/01/08/adapting-strong-iam-strategies-to-combat-ai-driven-cyber-threats Source: CSA Title: How Can Strong IAM Prevent Data Breaches? Feedly Summary: AI Summary and Description: Yes Summary: The text highlights significant data breaches at T-Mobile and Coinbase due to weak Identity and Access Management (IAM) controls, emphasizing the importance of a robust IAM strategy to prevent unauthorized access and data breaches.…

  • Alerts: CISA Adds Three Known Exploited Vulnerabilities to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/01/07/cisa-adds-three-known-exploited-vulnerabilities-catalog Source: Alerts Title: CISA Adds Three Known Exploited Vulnerabilities to Catalog Feedly Summary: CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2024-41713 Mitel MiCollab Path Traversal Vulnerability CVE-2024-55550 Mitel MiCollab Path Traversal Vulnerability CVE-2020-2883 Oracle WebLogic Server Unspecified Vulnerability Users and administrators are also encouraged to…

  • Hacker News: A Day in the Life of a Prolific Voice Phishing Crew

    Source URL: https://krebsonsecurity.com/2025/01/a-day-in-the-life-of-a-prolific-voice-phishing-crew/ Source: Hacker News Title: A Day in the Life of a Prolific Voice Phishing Crew Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text delves into the disturbing and sophisticated tactics utilized by voice phishing gangs, primarily focusing on a group known as “Crypto Chameleon.” It highlights how these criminals…

  • The Register: Turbulence at UN aviation agency as probe into potential data theft begins

    Source URL: https://www.theregister.com/2025/01/07/icao_data_theft_investigation/ Source: The Register Title: Turbulence at UN aviation agency as probe into potential data theft begins Feedly Summary: Crime forum-dweller claims to have leaked 42,000 documents packed with personal info The United Nations’ aviation agency is investigating “a potential information security incident" after a cybercriminal claimed they had laid hands on 42,000…

  • Anchore: All Things SBOM in 2025: a Weekly Webinar Series

    Source URL: https://anchore.com/blog/all-things-sbom-in-2025-a-weekly-webinar-series/ Source: Anchore Title: All Things SBOM in 2025: a Weekly Webinar Series Feedly Summary: Software Bills of Materials (SBOMs) have quickly become a critical component in modern software supply chain security. By offering a transparent view of all the components that make up your applications, SBOMs enable you to pinpoint vulnerabilities before…

  • Embrace The Red: AI Domination: Remote Controlling ChatGPT ZombAI Instances

    Source URL: https://embracethered.com/blog/posts/2025/spaiware-and-chatgpt-command-and-control-via-prompt-injection-zombai/ Source: Embrace The Red Title: AI Domination: Remote Controlling ChatGPT ZombAI Instances Feedly Summary: At Black Hat Europe I did a fun presentation titled SpAIware and More: Advanced Prompt Injection Exploits. Without diving into the details of the entire talk, the key point I was making is that prompt injection can impact…

  • The Register: Charter, Consolidated, Windstream reportedly join Salt Typhoon victim list

    Source URL: https://www.theregister.com/2025/01/06/charter_consolidated_windstream_salt_typhoon/ Source: The Register Title: Charter, Consolidated, Windstream reportedly join Salt Typhoon victim list Feedly Summary: The slow drip of compromised telecom networks continues The list of telecommunications victims in the Salt Typhoon cyberattack continues to grow as a new report names Charter Communications, Consolidated Communications, and Windstream among those breached by Chinese…

  • The Register: After China’s Salt Typhoon, the reconstruction starts now

    Source URL: https://www.theregister.com/2025/01/06/opinion_column_cybersec/ Source: The Register Title: After China’s Salt Typhoon, the reconstruction starts now Feedly Summary: If 40 years of faulty building gets blown down, don’t rebuild with the rubble Opinion When a typhoon devastates a land, it takes a while to understand the scale of the destruction. Disaster relief kicks in, communications rebuilt,…