Energy Department to Invest $30 Million in Clean Energy Cybersecurity Solutions

January 18, 2024 at 09:12AM The US Department of Energy (DoE) plans to invest $30 million in innovative cybersecurity tools to secure clean energy infrastructure from cyber threats. The funding, part of the Biden-Harris administration’s efforts, will support projects focused on identifying and mitigating threats to energy infrastructure, including cloud and renewable energy devices. Additional … Read more

Google TAG: Kremlin cyber spies move into malware with a custom backdoor

January 18, 2024 at 09:05AM Russian cyberspies, associated with the FSB, have developed a custom backdoor called SPICA, targeting academia, military, governmental orgs, NGOs, think tanks, and politicians in the US, the UK, and other NATO countries. They have recently escalated their attacks against Ukraine’s military and other Eastern European nations. The group employs sophisticated … Read more

Oleria Secures $33M Investment to Grow ID Authentication Business

January 18, 2024 at 08:18AM Seattle-based startup Oleria, founded by former Salesforce CISO Jim Alkove, secured a $33 million Series A round led by Evolution Equity Partners. The funding, supported by previous investors, aims to further develop its adaptive and autonomous identity security technology. Oleria’s approach emphasizes providing seamless access management and continuously assessing and … Read more

List Containing Millions of Credentials Distributed on Hacking Forum, but Passwords Old

January 18, 2024 at 08:18AM Australian researcher Troy Hunt discovered a credential stuffing list named Naz.API, consisting of over 70 million unique email addresses and passwords, sourced from malware and a defunct OSINT tool. One-third of the addresses were not previously known, and the data has been added to Have I Been Pwned and Pwned … Read more

TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks

January 18, 2024 at 08:03AM Misconfigurations in TensorFlow’s CI/CD system enabled potential supply chain attacks. GitHub-hosted runners are not vulnerable, but self-hosted runners executed without approval, permitting unauthorized code execution. Ephemeral runner security measures were bypassed, allowing for breaches of GitHub repository and PyPI registry integrity. Project maintainers addressed the issues post-disclosure, mitigating the risks. … Read more

MFA Spamming and Fatigue: When Security Measures Go Wrong

January 18, 2024 at 08:03AM Multi-factor authentication (MFA) is increasingly used by organizations to bolster security, as traditional password-only systems are vulnerable to cyberattacks. However, MFA spamming, a tactic where attackers inundate users with verification requests, poses a threat. Mitigation strategies include strong password policies, end-user training, rate limiting, and monitoring systems. Strengthening security measures … Read more

Customer Information of Toyota Insurance Company Exposed Due to Misconfigurations

January 18, 2024 at 07:24AM Security researcher Eaton Zveare gained unauthorized access to customer information in Toyota Tsusho Insurance Broker India’s email account due to misconfigurations and vulnerabilities. Zveare accessed the [email protected] email account, exposing customer data, OTPs, and access to TTIBI’s Microsoft cloud account. TTIBI took two months to address the issues, but the … Read more

InfoSec 101: Why Data Loss Prevention is Important to Enterprise Defense

January 18, 2024 at 07:00AM DLP is an infosec strategy to prevent data breaches and protect sensitive data by monitoring and controlling access. It includes monitoring perimeter resources, email, removable devices, and others. DLP uses policies, content inspection, contextual analysis, and user behavior analysis to prevent cyberattacks. Solutions include cloud-based, network-based, and endpoint-based DLP. After … Read more

Lock Down the Software Supply Chain With ‘Secure by Design’

January 18, 2024 at 06:38AM The concept of “secure by design” is crucial in the face of increasing supply chain attacks, with a shift towards proactive security measures. The Cybersecurity and Infrastructure Security Agency (CISA) is pushing for this in software development practices, emphasizing collective responsibility. It involves building security into software from the ground … Read more

Docker hosts hacked in ongoing website traffic theft scheme

January 18, 2024 at 06:15AM Attackers have launched a new campaign targeting vulnerable Docker services, deploying an XMRig miner and the 9hits viewer app on compromised hosts for dual monetization. They exploit resources of these systems to drive traffic as part of the 9hits traffic exchange system, showcasing a need for stricter security checks and … Read more