Newsflash donderdag 21 november 2024
Toezichthouders op AI voor bescherming grondrechten benoemd
(agconnect.nl)

Het College voor de Rechten van de Mens is vastgesteld als één van de grondrechtenautoriteiten Artificiële Intelligentie (AI). Het College moet er in Nederland op toezien dat grondrechten worden gerespecteerd bij de inzet van AI.

Onder de AI-verordening zijn alle lidstaten verplicht om grondrechtenautoriteiten op het gebied van AI aan te stellen.

Artikel 77 van de AI-verordening omschrijft de grondrechtenautoriteiten als ‘Nationale overheidsinstanties of -organen die de nakoming van verplichtingen krachtens Unierecht ter bescherming van grondrechten, waaronder het recht op non-discriminatie, met betrekking tot het gebruik van de in bijlage III vermelde AI-systemen met een hoog risico controleren of handhaven.’

Nederlandse gemeenten waarschuwen voor QR-codes op parkeerautomaten
(tweakers.net)

Nederlandse gemeenten waarschuwen voor QR-codes op parkeerautomaten. Scans van die codes leiden naar nepsites om zogenaamd te betalen voor parkeren. De stickers staan door het hele land op parkeerautomaten.

Qr-codeDe stickers leiden naar een site die lijkt op die van parkeerapp EasyPark met de mogelijkheid om te betalen. Het gaat om een nepsite, meldt EDDasyPark.

Het gaat om phishing via QR-codes. Gemeenten raden mensen aan om te betalen bij de automaten zelf of via een vooraf ingestelde app.

CWE top 25 most dangerous software weaknesses
(helpnetsecurity.com)

The CWE list of the 25 most dangerous software weaknesses demonstrates the currently most common and impactful software flaws.

Identifying the root causes of these vulnerabilities provides insights to shape investments, policies, and practices that proactively prevent their occurrence.

The CWE top 25 most dangerous software weaknesses list was calculated by analyzing public vulnerability information in Common Vulnerabilities and Exposures (CVE) Records for CWE root cause mappings.

DDoS Attack Growing Bigger & Dangerous, New Report Reveals
(cybersecuritynews.com)

Distributed Denial of Service (DDoS) attacks are escalating at an alarming rate, as unveiled in a revelation by Cloudflare researchers and the recent data indicates that these attacks posing an increasingly severe threat to online services and infrastructure worldwide.

Cloudflare, a leading cybersecurity company, reports mitigating over 14.5 million DDoS attacks since the beginning of 2024, averaging an astounding 2,200 attacks per hour.

Analysis of DDoS attack metrics over the past decade reveals a concerning trend.

FBI says BianLian based in Russia, moving from ransomware attacks to extortion
(therecord.media)

BianLian ransomware actors are likely based in Russia and have multiple Russia-based affiliates, according to new information shared by the FBI and Australian law enforcement.

BianLian has drawn scrutiny for attacks on charities like Save The Children as well as healthcare firms like Boston Children’s Health Physicians.

On Tuesday, the gang took credit for an attack on Amherstburg Family Health Team — a Canadian healthcare company that said it is currently experiencing delays due to technical issues with its phone system.

Phishing emails using SVG attachments to help get away with attacks
(techradar.com)

Hackers are always looking for new ways to sneak phishing emails into people’s inboxes, and it seems SVG attachments are the next big thing.

Security researchers recently posted about SVG attachments on Twitter, claiming their nature allows them to bypass email protections and land malicious content in victim's inbox.

For the uninitiated, SVG is short for Scalable Vector Graphics - it’s a lossless image format used all across the web, especially for content that is designed to be viewed on screens of different sizes. Images are not created with pixels, but rather with XML-based code which defines graphics.

NodeStealer Malware Targets Facebook Ad Accounts, Harvesting Credit Card Data
(thehackernews.com)

Threat hunters are warning about an updated version of the Python-based NodeStealer that's now equipped to extract more information from victims' Facebook Ads Manager accounts and harvest credit card data stored in web browsers.

"They collect budget details of Facebook Ads Manager accounts of their victims, which might be a gateway for Facebook malvertisement," Netskope Threat Labs researcher Jan Michael Alcantara said in a report shared with The Hacker News.

"New techniques used by NodeStealer include using Windows Restart Manager to unlock browser database files, adding junk code, and using a batch script to dynamically generate and execute the Python script."

Trellix report reveals evolving ransomware ecosystem trends
(securitybrief.co.nz)

Trellix has released its latest CyberThreat Report, highlighting a developing ransomware ecosystem shaped by law enforcement actions, advancements in artificial intelligence, and a fragile geopolitical environment.

One of the primary findings from the report is the diversification of ransomware groups, with the top five most active groups causing less than 40% of all attacks.

RansomHub has emerged as the most active group, representing 13% of Trellix's detections.

Five Scattered Spider suspects indicted for phishing spree and crypto heists
(theregister.com)

The US Department of Justice has issued an indictment that names five people accused of stealing millions in cryptocurrency – and we are told they are suspected members of cyber-gang Scattered Spider.

The arachnid-inspired crew is thought to have masterminded the ransomware attack on casino operators MGM Resorts and Caesars Entertainment, and to have cracked identity services vendor Okta – then attacked many of its customers. The crew uses SMS phishing and social engineering.

The five suspects have been named as:

UK warned of cyber threats from China-backed Volt Typhoon
(securitybrief.com.au)

The UK is at risk from cyberattacks on its critical infrastructure allegedly orchestrated by the People's Republic of China (PRC), according to Certes, a cybersecurity firm.

Certes has voiced concerns that the UK is not adequately prepared to handle sophisticated cyber threats, particularly those posed by a group known as Volt Typhoon, which has come under scrutiny by US intelligence agencies, including the FBI.

The group is reported to target crucial systems, leaving infrastructure such as energy grids and healthcare services susceptible to attacks. Though the scope of these activities is more extensively documented in the United States, experts caution that the UK may be equally at risk.

China's 'Liminal Panda' APT Attacks Telcos, Steals Phone Data
(darkreading.com)

A newly unveiled threat actor has been spying on mobile phones in Asia and Africa for more than four years.

On Nov. 19, Adam Meyers, senior vice president for counter-adversary operations at CrowdStrike, testified before the US Senate Judiciary Subcommittee on Privacy, Technology, and the Law, on the subject of Chinese cyber threats to critical infrastructure.

In the process, he unveiled Liminal Panda, an advanced persistent threat (APT) hyper-focused on gathering intelligence from telecommunications networks.

NHIs Are the Future of Cybersecurity: Meet NHIDR
(thehackernews.com)

The frequency and sophistication of modern cyberattacks are surging, making it increasingly challenging for organizations to protect sensitive data and critical infrastructure.

When attackers compromise a non-human identity (NHI), they can swiftly exploit it to move laterally across systems, identifying vulnerabilities and compromising additional NHIs in minutes.

While organizations often take months to detect and contain such breaches, rapid detection and response can stop an attack in its tracks.

Gang Shaking Down Pharmacy Group for Second Ransom Payment
(healthcareinfosecurity.com)

Ransomware group Embargo is threatening to publish nearly 1.5 terabytes of data allegedly stolen in an attack on American Associated Pharmacies, a collaborative of 2,000 independent pharmacies.

The gang is shaking down AAP for a second installment of an alleged agreed-up ransom deal.

The cybercriminal gang on its dark website claims AAP already paid a $1.3 million ransom for a decryptor key - but still owes another $1.3 million the association agreed to pay in exchange of an Embargo promise to delete the stolen data.

Mega US healthcare payments network restores system 9 months after ransomware attack
(theregister.com)

Still reeling from its February ransomware attack, Change Healthcare confirms its clearinghouse services are back up and running, almost exactly nine months since the digital disruption began.

In an ordinary year, the healthcare organization handles 15 billion transactions – the most of any clearinghouse in the US. It looks after payments and transactions between and among healthcare providers, hospitals, practitioners, and patients throughout the US healthcare system.

Its February ransomware attack by ALPHV/Blackcat led to a financial impact on a whopping 94 percent of hospitals the following month, according to the American Hospital Association (AHA).

Full recovery from breaches takes longer than expected
(helpnetsecurity.com)

In 2024, businesses reported taking an average of 7.3 months to recover from cybersecurity breaches – 25% longer than expected and over a month past the anticipated timeline of 5.9 months, according to Fastly.

Recovery times were even worse for companies that planned on cutting back cybersecurity spending.

They faced an average of 68 incidents each – 70% above the average – and their recovery times stretched to 10.9 months, more than five months longer than those maintaining or increasing their budgets.

My information was stolen. Now what?
(welivesecurity.com)

Back in May 2023, I wrote the blogpost You may not care where you download software from, but malware does as a call to arms, warning about the risks of running software downloaded from so-called “trusted sources” of pirated software.

Of course, those files were anything but trustworthy and contained malware, such as ransomware or infostealers, specifically targeted at that demographic.

My hope was that by educating the public about the risks involved, people would learn about how to avoid such dangerous apps and seek safer alternatives.

IMF Warns: CBDCs Could Enable State Surveillance Through Personal Data and Behavioral Insights
(hackernoon.com)

Programmable Central Bank Digital Currencies (CBDCs) could be used for state surveillance while posing risks to privacy and cybersecurity that could undermine trust in central bank money, according to an International Monetary Fund (IMF) policy brief.

The latest policy brief that “summarizes the main takeaways from a new wave” of chapters for the IMF’s CBDC Handbook warns that CBDCs could be perceived as an instrument for state surveillance where people’s transaction histories, demographics, and behavioral patterns are collected, processed, and stored.

“CBDC could be perceived as an instrument for state surveillance. Some may worry that the government or the central bank could use it to control or restrict payments users can make with CBDC, thereby undermining public trust in central bank money. This can be a particular concern in countries with severe governance and corruption vulnerabilities”

We Can Do Better Than Free Credit Monitoring After a Breach
(darkreading.com)

Individual companies and entire industries alike must take responsibility for protecting customer data — and doing the right thing when they fail.

Having a long career in cybersecurity doesn't stop me from being included in the same data breaches and mass involuntary disclosures of consumer information as everyone else.

And like everyone else, I probably have now collected enough years of "free" credit monitoring that some of it could be passed on to my kids upon my death — maybe there will be some left for my grandkids, too.

How to create a secure password policy
(itpro.com)

Passwords have been on their way out for years – and it’s no surprise. Alone, passwords are a flawed means of security, partly because people often choose weak credentials and repeat them across services.

In an enterprise scenario, this is especially problematic when coupled with IT policies that mandate changing passwords regularly. It is with this in mind that attitudes are starting to change.

Passwords no longer need to be changed every year and three random words can be better than lots of characters, according to new guidance from the US National Institute of Standards and Technology (NIST).

The Urgent And Critical Need To Prioritize Mobile Security
(securityweek.com)

The modern enterprise is far more mobile than it used to be. Trends like Bring Your Own Device (BYOD) and Company Owned, Personally Enabled (COPE), hybrid working and enterprise mobility initiatives have been picking up pace, allowing mobile devices to access and interact with enterprise data systems like never before.

According to Verizon, more than half (55%) of organizations have more mobile device users than they did 12 months ago, and Zimperium claims more than 70% of employees use smartphones for work-related tasks.

The mobile app sprawl is also exploding. The average smartphone user has about 80 apps installed, clicking those icons 144 times daily.

Put your usernames and passwords in your will, advises Japan's government
(theregister.com)

Japan's National Consumer Affairs Center on Wednesday suggested citizens start "digital end of life planning" and offered tips on how to do it.

The Center's somewhat maudlin advice is motivated by recent incidents in which citizens struggled to cancel subscriptions their loved ones signed up for before their demise, because they didn't know their usernames or passwords.

The resulting "digital legacy" can be unpleasant to resolve, the agency warns, so suggested four steps to simplify ensure our digital legacies aren't complicated.

AxoSyslog: Open-source scalable security data processor
(helpnetsecurity.com)

AxoSyslog is a syslog-ng fork, created and maintained by the original creator of syslog-ng, Balazs Scheidler, and his team.

“We first started by making syslog-ng more cloud-ready: we packaged syslog-ng in a container, added helm charts, and made it more suitable for use in cloud-native environments.

We’ve also improved the monitoring and operational experience to help AxoSyslog better integrate with modern telemetry pipelines,” Balazs Scheidler, CEO of Axoflow, told Help Net Security.

GitHub Secure Open Source Fund: Project maintainers, apply now!
(helpnetsecurity.com)

GitHub is calling on maintainers of open source projects to apply for the newly opened Secure Open Source Fund, to get funding and knowledge to improve the security and sustainability of their software.

The program is funded by companies (AmEx Chainguard, Microsoft, 1Password, Shopify, Stripe, etc.), venture funds (e.g., Mayfield Fund) and nonprofits (e.g., the Alfred P. Sloan Foundation).

“Anyone who is a current maintainer of an open source project with a valid open source license and located in one of the regions supported by GitHub Sponsors can apply,” says Martin Woodward, VP of Developer Relations at GitHub.

Security and AI: The CIO's Dual Imperative
(cio.inc)

Artificial intelligence is now on par with cybersecurity as a critical priority for CIOs worldwide.

But despite growing interest, a Lenovo report found that most organizations are still in the early stages of AI readiness, facing hurdles that extend beyond technical capabilities to include talent acquisition, organizational culture and governance.

Finding skilled AI talent is particularly difficult, often more challenging than hiring for technical roles, the report said.

Six ways to balance security, privacy, and innovation in the GenAI era
(scworld.com)

The rise of generative AI (GenAI) has reshaped business processes, decision-making, and how we interact with data. While the benefits are clear—improved efficiencies, enhanced creativity, and new growth opportunities—the risks are just as significant, particularly when it comes to security and privacy.

For C-suite leaders, the challenge lies in navigating these complex trade-offs and implementing a framework that balances innovation with responsible governance.

At the heart of the challenge and the risk around AI lies the fundamental uncertainty surrounding how large language models (LLMs) handle data.

Google's AI bug hunters sniff out two dozen-plus code gremlins that humans missed
(theregister.com)

Google's OSS-Fuzz project, which uses large language models (LLMs) to help find bugs in code repositories, has now helped identify 26 vulnerabilities, including a critical flaw in the widely used OpenSSL library.

The OpenSSL bug (CVE-2024-9143) was reported in mid-September and fixed a month later. Some, but not all, of the other vulnerabilities have also been addressed.

Google believes its AI-driven fuzzing tool – which injects unexpected or random data into software to catch errors – found something that's unlikely to have ever been caught by human-driven fuzzing.