Daily Brief
Find articles below, see 'DETAILS' for generated summaries
Total articles found: 12701
Checks for new stories every ~15 minutes
| Title | Summary | ROWS | |||
|---|---|---|---|---|---|
| 2024-03-12 18:34:18 | theregister | NATION STATE ACTIVITY | Biden Proposes $3B CISA Budget in Cybersecurity Push | US President Joe Biden's fiscal 2025 budget proposal includes substantial federal cybersecurity funding increases, requesting $3 billion for the Cybersecurity and Infrastructure Security Agency (CISA).
The proposed budget aims to enhance cybersecurity across various government departments with a $13 billion allocation.
CISA's budget increase will support the implementation of the Cyber Incident Reporting for Critical Infrastructure Act and improve critical infrastructure security coordination.
In response to rising cyber threats, the budget includes an additional $25 million for the Department of Justice to bolster intelligence and analysis and establishes a new focus on national security cyber threats with a $5 billion investment.
Healthcare cybersecurity is a key focus, with approximately $1.5 billion proposed to assist hospitals and medical facilities in countering ransomware and other cyber attacks, which have surged by 95% since 2018.
To promote advanced cybersecurity practices, Biden's proposal includes $800 million for hospital cybersecurity aid and $500 million for an incentive program related to healthcare security.
The spending plan also dedicates $141 million to the Department of Health and Human Services’ ongoing information security efforts, including HIPAA modernization. | Details |
| 2024-03-12 17:53:29 | bleepingcomputer | MISCELLANEOUS | Microsoft's Patch Tuesday Fixes 60 Vulnerabilities, Including 18 RCE | Microsoft’s March 2024 Patch Tuesday addresses 60 security issues, with updates tackling eighteen remote code execution (RCE) vulnerabilities.
Only two critical flaws were fixed: one Hyper-V RCE and a denial of service issue, signaling a focused yet significant patch rollout.
Notably absent were zero-day exploits; none were patched or disclosed in this month's update cycle.
High-profile fixes include an elevation of privilege in Microsoft Office and a security feature bypass in Microsoft Defender.
The Office vulnerability allowed authenticated users to gain SYSTEM privileges and was patched following the report from Iván Almuiña at Hacking Corporation Sàrl.
The Microsoft Defender vulnerability, which could stop the software from starting, was discovered by Manuel Feifel at Infoguard and is now fixed in Antimalware Platform version 4.18.24010.12.
A Skype for Consumer RCE flaw, which could be exploited via a malicious link or image, was another significant fix credited to researchers Hector Peralta and Nicole Armua from Trend Micro's Zero Day Initiative.
Security updates from other vendors in March 2024 are also highlighted, reflecting a broad industry response to emerging threats. | Details |
| 2024-03-12 16:52:09 | bleepingcomputer | MISCELLANEOUS | Tor Project Introduces WebTunnel to Counteract Censorship | The Tor Project has officially introduced WebTunnel, a new type of bridge designed to evade censorship by mimicking HTTPS traffic.
WebTunnel is developed to assist users in accessing the Tor network in restrictive regimes that actively block such connections.
Connections made using WebTunnel appear as normal HTTPS connections to observers, effectively hiding the user's use of the Tor network.
Compared to traditional Tor bridges and obfsproxy bridges, WebTunnel offers a more robust solution against censorship efforts by blending in with the majority of web traffic.
Currently, there are about 60 WebTunnel bridges globally, assisting over 700 daily users in countries with internet restrictions like China and Russia.
Implementation of WebTunnel has not been successful in some regions of Iran, indicating the need for further developments.
The Tor Project emphasizes the importance of internet access for communication, human rights defense, and global solidarity, especially during geopolitical conflicts. | Details |
| 2024-03-12 16:31:34 | theregister | CYBERCRIME | JetBrains Criticizes Rapid7 for Prompt Vulnerability Disclosure | JetBrains denounces Rapid7's immediate and detailed disclosure of security vulnerabilities in its TeamCity platform as unethical and damaging.
Rapid7's disclosure led to rapid exploitation by attackers, resulting in ransomware incidents and potential use of compromised accounts in DDoS campaigns.
JetBrains insists it adheres to responsible disclosure norms, providing enough details to customers to mitigate risk without enabling simple exploitation.
The article contrasts the disclosure policies of different organizations, such as Google's Project Zero and Microsoft, as well as national cybersecurity authorities.
Rapid7's disclosure policy advocates for prompt public disclosure but permits a 60-day window for vendors to release a fix, with potential 30-day extensions.
The conflict over disclosure norms between JetBrains and Rapid7 underscores the need for balance between timely remediation and preventing exploitation.
The discussion on the timing of disclosures is significant in the context of ransomware attack costs, which can average around $1.5 million for remediation.
Both JetBrains and Rapid7 maintain their stances, with Rapid7 stating it follows its disclosure policies, highlighting ongoing debates in cybersecurity disclosure practices. | Details |
| 2024-03-12 16:00:36 | bleepingcomputer | MISCELLANEOUS | Google Invests $10 Million in Bug Bounty Rewards in 2023 | Google awarded $10 million to 632 researchers for reporting security flaws across its products and services in 2023.
The total paid by Google's Vulnerability Reward Program has reached $59 million since 2010, with $3.4 million awarded for Android vulnerabilities alone last year.
Google increased the maximum reward for critical Android vulnerabilities and tripled bounty payments for sandbox escape chain exploits in Chrome.
Notable payouts included $70,000 for 20 discoveries in Wear OS and Android Automotive OS and $116,000 for 50 reports in Nest, Fitbit, and Wearables.
Chrome browser attracted 359 bug reports, resulting in $2.1 million in rewards, including a significant $30,000 award for a JavaScript engine vulnerability.
Introduction of 'MiraclePtr' in Chrome M116 to protect against non-renderer Use-After-Free vulnerabilities, with separate rewards for bypassing this protection.
A focused effort on securing AI products resulted in $87,000 paid out during a bugSWAT live-hacking event featuring Google Bard.
Google maintains a dedicated Bug Hunters community to foster engagement and participation in the Vulnerability Reward Program. | Details |
| 2024-03-12 15:24:33 | bleepingcomputer | DATA BREACH | Over 12 Million Secrets Exposed on GitHub in 2023 | GitHub users inadvertently exposed 12.8 million authentication secrets across 3 million repositories in 2023, with most secrets remaining active after five days.
GitGuardian issued 1.8 million alerts to affected users but observed only a 1.8% swift response to secure the compromised data.
Exposed credentials include passwords, API keys, TLS/SSL certificates, and various tokens, posing risks for data breaches and financial loss.
A Sophos report indicated that compromised credentials were the root cause in 50% of attacks in the first half of the year, highlighting the significance of the GitHub leaks.
India, the United States, and Brazil lead the list of countries with the highest number of exposed secrets; the IT sector is the most affected, followed by education.
The report observed a 1,212-fold increase in leaked OpenAI API keys in 2023, emphasizing the risk associated with the popular use of AI services like ChatGPT.
Large language models (LLMs) show potential for detecting leaked secrets effectively, although scalability and cost factors pose challenges.
GitHub recently implemented push protection by default to help mitigate accidental secret exposures in the future. | Details |
| 2024-03-12 12:15:58 | thehackernews | CYBERCRIME | Stealthy PyPI Packages Lead to Crypto Wallet Thefts | Threat hunters identified seven malicious Python packages on PyPI, designed to steal crypto wallet recovery phrases.
Dubbed BIPClip, the attack campaign aimed at cryptocurrency wallet developers has been active since December 2022.
The packages, downloaded 7,451 times before removal, exfiltrated data to a control server under the attackers' command.
The threat actors involved used GitHub and social platforms like Telegram and YouTube to publicize their tools.
Sophisticated tactics were applied to avoid raising suspicion, such as mimicking legitimate package functions.
The campaign leveraged common software supply chain vulnerabilities and used legitimate services like GitHub to spread malware.
Cases like MavenGate and CocoaPods demonstrate the risks associated with abandoned digital assets in open-source ecosystems. | Details |
| 2024-03-12 11:50:26 | theregister | CYBERCRIME | Leicester City Council Targeted in Suspected Ransomware Attack | Leicester City Council experienced a "cyber incident" leading to IT systems and crucial service phone lines being taken offline.
Despite the use of vague terms, security experts suspect the attack could be ransomware, although there is no official confirmation yet.
The incident led to the shutdown of some network services, including Citrix Netscaler and Cisco AnyConnect VPN appliances.
The council is collaborating with cybersecurity experts and law enforcement to understand the attack and has consulted other councils for recovery strategies.
Recovery efforts are focused on prioritizing critical services with hopes to commence the process by mid-week.
Emergency phone numbers have been established for essential services, with online forms for reporting currently disabled.
The attack on Leicester is not an isolated incident; other UK councils have recently endured cyberattacks, disrupting services for extended periods.
There is some confidence that sensitive data held by Leicester City Council is protected and that the impact on personal data will be minimal. | Details |
| 2024-03-12 11:09:35 | thehackernews | MISCELLANEOUS | Essential Guide to Implementing Continuous Threat Exposure Management | Continuous Threat Exposure Management (CTEM) is a proposed strategy to effectively manage cyber risks by combining attack simulation, risk assessment, and remediation.
The CTEM framework is becoming increasingly significant as organizations seek an integrated approach to improve security posture and risk management.
XM Cyber highlights the importance of obtaining an "attacker's view" of an environment to prioritize vulnerabilities according to the risk they pose to crucial assets.
A CTEM program operates in five stages to systematically de-escalate cyber threats and is distinguished from other security approaches by its continual, dynamic nature.
Key benefits of CTEM include the ability to effectively prioritize and address the most critical exposures, thereby streamlining and enhancing organizational security efforts.
Establishing a CTEM program requires organizational commitment, a shared understanding of risk, and a prioritization process tailored to an organization's unique needs.
XM Cyber encourages organizations to adopt the CTEM framework and provides further insights in a whitepaper discussing the operationalization of the CTEM framework by Gartner®. | Details |
| 2024-03-12 09:22:28 | thehackernews | MALWARE | Malware Campaign Impacts Over 3,900 Websites via WordPress Plugin Flaw | A new malware campaign has exploited a serious security vulnerability in the Popup Builder WordPress plugin, affecting over 3,900 websites.
The campaign uses recently created domains, some registered as recently as February 12th, 2024, to insert malicious JavaScript through CVE-2023-6000.
Attackers can generate rogue admin accounts and install unwanted plugins using the exploited flaw, leading to site redirections to phishing or scam pages.
Website owners using WordPress are advised to update plugins and scan their websites for any unusual code or users to mitigate the threat.
The threat emphasizes the critical importance of regularly updating and patching website software to avoid security vulnerabilities.
Additionally, Wordfence has identified a high-severity bug in the Ultimate Member plugin that allows the injection of malicious scripts due to insufficient input sanitization.
The XSS flaw in Ultimate Member, CVE-2024-2123, has been fixed in the most recent update, with prior versions of the plugin being susceptible to unauthenticated attacker exploits.
The issue follows previous plugin and theme vulnerabilities within WordPress, highlighting the platform's ongoing challenge with securing against malicious activities. | Details |
| 2024-03-12 06:34:25 | thehackernews | NATION STATE ACTIVITY | South Korean National Arrested in Russia for Alleged Espionage | Russia has detained a South Korean citizen, Baek Won-soon, on charges of cyber espionage and transferred him from Vladivostok to Moscow for further investigation.
Won-soon is accused of transferring classified "top secret" information to unnamed foreign intelligence agencies.
Initially detained in Vladivostok earlier this year, Won-soon's arrest has now been extended until June 15, 2024, and he has been relocated to Lefortovo pretrial detention center in Moscow.
The same detention facility is currently holding American journalist Evan Gershkovich, who is awaiting trial on suspicion of espionage, charges he has denied.
The arrest comes at a time of increasing geopolitical collaboration between Russia and North Korea, the latter known for its state-sponsored hacking efforts targeting Russia for intelligence.
Additionally, the article mentions the recent arrest of a former Google engineer in the U.S. for allegedly stealing proprietary information while working for China-based companies. | Details |
| 2024-03-12 06:29:11 | theregister | DDOS | French Government Sites Hit by Major DDoS Attack | Several French government websites experienced significant disruption due to a distributed denial of service (DDoS) attack.
Cloudflare's Radar detected the onset of the attack on early Sunday, which escalated quickly, and saw fluctuations before sustaining an intense six-hour period of activity.
France's digital transformation agency, DINUM, responded by deploying defensive measures against the attack amidst claims of ongoing disruptions by Anonymous Sudan.
Anonymous Sudan claimed responsibility for the attack, which information security firm FalconFeeds suggests was likely assisted by Russian actors and other threat groups.
The motive behind the DDoS attack remains unclear, but it comes after French President Macron suggested sending troops to support Ukraine against Russia's invasion, a move criticized by President Putin.
The attacks targeted critical departments, including the prime minister's office, the civil aviation authority, and the Ministry of the Economy. However, at the time of reporting, the affected sites are accessible without obvious issues. | Details |
| 2024-03-12 00:08:10 | theregister | CYBERCRIME | US Officials Demand Swift Action After Healthcare Ransomware Attack | The Biden administration and US lawmakers are pushing for UnitedHealth Group to quicken payments to medical providers after a ransomware attack by ALPHV/BlackCat affiliates.
Senator Ron Wyden criticized the cyber attack on Change Healthcare as inexcusable, stressing that the healthcare sector has been a known target for cybercriminals for years.
The ransomware attack disrupted patient care and created severe cash-flow issues due to Change Healthcare's significant role in processing healthcare transactions.
Health secretaries from the DHHS and DOL urged UnitedHealth and insurance companies to mitigate the impact on providers by expediting funds, accepting paper claims, and simplifying electronic interactions.
Senator Wyden has called for mandatory cybersecurity standards in the healthcare industry and regular auditing to protect patient data.
The criticism extends to federal regulators for not mandating minimum security requirements amidst a rise in cyber attacks against healthcare organizations.
Concerns are also being raised about the systemic risks posed by large healthcare entities, such as the $13 billion merger of Optum and Change Healthcare.
Senator Mark Warner sees the need for legislation, including mandatory cyber hygiene standards for healthcare providers, to ensure patient care and safety against future cyber threats. | Details |
| 2024-03-11 22:01:07 | theregister | NATION STATE ACTIVITY | Kremlin Accuses U.S. of Planning Cyberattack on Russia's Election | The Kremlin has alleged that the U.S. is plotting a cyberattack against Russia's electronic voting system.
Russian intelligence claims that American NGOs are instructed to lower voter turnout.
No evidence was provided by the Russian Foreign Intelligence Service to back up the accusations.
Russia warns that any foreign meddling would be seen as an act of aggression, offering a potential pretext for election discrepancies.
The claims follow Russia's recent assurance that it will not interfere in U.S. elections, countering past allegations of meddling in 2016 and 2020.
U.S. officials have not observed any significant threats or irregularities in their own ongoing election processes. | Details |
| 2024-03-11 21:25:25 | bleepingcomputer | CYBERCRIME | Tuta Mail Unveils Quantum-Resistant Encryption Protocol TutaCrypt | Tuta Mail introduces TutaCrypt, a new encryption protocol designed to resist quantum decryption.
The Germany-based email service aims to secure communications against future "harvest now, decrypt later" attacks.
TutaCrypt combines quantum-safe algorithms like CRYSTALS-Kyber with traditional ones such as X25519 for robust encryption.
Existing AES 256/Argon2 cryptography layers enhance protection from current threats, without requiring user action for migration.
Tuta's initiative addresses a growing concern over quantum computing's potential impact on current cryptographic standards.
TutaCrypt generates dual key pairs for both quantum-resistant key encapsulation and traditional ECDH, stored securely on German servers.
Current and future users will be transitioned to TutaCrypt automatically, signaling a proactive step in email security advancement.
While the protocol currently has limitations regarding message integrity and key compromise risk, further improvements are planned. | Details |