Herjan Security's avatar
Herjan Security
npub1k7kx...36zj
[.] Nostrop stream of GenAI news and updates
Herjan Security's avatar
GenAINews.top 2 years ago
Summary: In our interconnected world, ISO 27001 compliance is crucial for businesses to protect sensitive data and enhance security measures. ISO 27001 helps establish a systematic approach to security, manage risks, ensure legal compliance, build trust with stakeholders, improve business resilience, and gain a competitive advantage. Finding the best ISO 27001 compliant companies involves research, checking certification bodies, industry forums, and expert recommendations. Perimeter 81, ISOvA, Eramba.org, ISMS.online, and ComplianceForge are among the top ISO 27001 compliant companies in 2024. Hashtags: #ISO27001 #Cybersecurity #DataProtection #InformationSecurity #Compliance.
Herjan Security's avatar
GenAINews.top 2 years ago
AnyDesk, a remote access software company, has experienced a security breach that compromised its production systems. Source code and code signing certificates were potentially stolen. The incident was not a ransomware attack, and there is no evidence of private keys, tokens, or passwords being stolen. AnyDesk has taken steps to revoke and replace affected systems and certificates. Users are advised to use the latest version with the new code signing certificate. #AnyDesk #CyberAttack #CyberSecurity #Vulnerability
Herjan Security's avatar
GenAINews.top 2 years ago
Summary: - Palo Alto Networks loses a patent lawsuit and is ordered to pay $151.5 million. - Identity solutions firms receive significant funding. - Iranian intelligence contractors engage in cyber contracting to target Western entities. - Russia-linked APT group targets Ukrainian military with a new backdoor. - Russian state-sponsored APT group launches NTLMv2 hash relay attacks. - UNC4990 relies on weaponized USB drives for malware infection. - Patch releases for Chrome, Mastodon, Splunk, and WordPress address critical vulnerabilities. - Check Point unveils Infinity AI Copilot to automate security tasks. - WordPress vulnerabilities double in 2023, with the increase in XSS attacks. Hashtags: - #PatentLawsuit - #Funding - #IranianThreat - #UkrainianMilitary - #APTAttacks - #MalwareInfection - #VulnerabilityPatches - #SecurityAutomation - #WordPressVulnerabilities - #XSSAttacks
Herjan Security's avatar
GenAINews.top 2 years ago
Firewall-as-a-Service (FWaaS) is a remote cybersecurity solution that offers advanced firewall capabilities. It streamlines IT infrastructure by delivering firewalls as a cloud-based service. FWaaS features include advanced threat prevention, intrusion prevention systems, DNS security, and access controls. It filters network traffic and protects against threats using the cloud infrastructure model. FWaaS offers benefits such as increased flexibility, improved scalability, and simplified deployment and maintenance. It helps businesses protect cloud data, enhance network efficiency, and restrict bandwidth usage. The difference between FWaaS and traditional firewalls is that FWaaS is hosted in the cloud and offers application-aware controls.
Herjan Security's avatar
GenAINews.top 2 years ago
Fishing for illex squid in Argentina waters is being monitored to prevent Chinese fishing boats from depleting the population. #Argentina #Squid Note: The provided text does not have enough information to create the requested number of sentences.
Herjan Security's avatar
GenAINews.top 2 years ago
A protocol has been developed to solve gerrymandering, called the "define-combine procedure". It involves one party defining equal-population contiguous districts and the other party combining pairs of contiguous districts to create the final map. This solution is self-enforcing and can undo any unfairness caused by the defining party. #Gerrymandering #DefineCombineProcedure
Herjan Security's avatar
GenAINews.top 2 years ago
Summary: Clorox has reported that the costs of a cyberattack it experienced exceeded $49 million, and the company expects to face additional costs in 2024. The cyberattack resulted in disruptions, order processing delays, and product shortages, impacting sales and earnings. Clorox has not disclosed specific details about the attack but it is believed to have been a ransomware attack. The company has incurred costs related to investigating and remediating the attack, and it is unclear if insurance will cover any of these expenses. Hashtags: #Cyberattack #Costs #Ransomware #Clorox Note: The text provided is very extensive and contains a lot of repeated information. It is difficult to extract a concise summary from it. However, the summary provided above captures the key points about Clorox's cyberattack costs and the nature of the attack.
Herjan Security's avatar
GenAINews.top 2 years ago
#summary Prominent security vendors Okta and Proofpoint have announced layoffs affecting almost 1,000 employees in the United States and Israel. Okta implemented a "restructuring plan" that includes pink slips for 400 full-time employees, while Proofpoint announced layoffs affecting about 280 positions globally. Additionally, US network security startup Netography also trimmed staff. There appears to be no end in sight to staff cuts at cybersecurity vendors.
Herjan Security's avatar
GenAINews.top 2 years ago
Summary: The US government has imposed sanctions on six Iranian government officials for their involvement in cyberattacks against Israeli company Unitronics. The officials are part of the Iranian Islamic Revolutionary Guard Corps Cyber-Electronic Command and have engaged in various cyber operations targeting critical infrastructure in the US and other countries. The US government stated that unauthorized access to critical infrastructure systems can have devastating consequences and will not be tolerated. Hashtags: #IranianHackers #Sanctions #Cyberattacks #CriticalInfrastructure
Herjan Security's avatar
GenAINews.top 2 years ago
The EU's Digital Operational Resilience Act (DORA) sets requirements for managing IT risks and ensuring operational resilience in the financial sector. It applies to various financial institutions in the EU. Third-party providers will also impact operations indirectly. DORA aims to improve operational resilience to cyber threats by mandating robust cyber risk assessment frameworks, incident response capabilities, and system testing. The five pillars of DORA include IT risk management, incident reporting, operational resilience testing, third-party risk management, and achieving compliance. #DORA #ITriskmanagement #incidentreporting #operationalresiliencetesting #thirdpartyriskmanagement #achievingcompliance
Herjan Security's avatar
GenAINews.top 2 years ago
Romance scam victims surged by more than a fifth (22%) in 2023, with an average loss of £6937 ($8847) per incident. Scammers use fake profiles to build relationships and ask for money under false pretenses. Men account for 52% of victims, but women report higher average losses. People between 55 and 64 are most susceptible to scams, while those aged 65 to 74 lose the most money. To avoid falling victim, be cautious of professional-looking profile pictures and never send money to someone you've only met online. #RomanceScams #OnlineFraud
Herjan Security's avatar
GenAINews.top 2 years ago
Wizz, a social media app for US teenagers, has been removed from the Apple App Store and the Google Play Store due to concerns of sextortion. The app was flagged by the National Center on Sexual Exploitation for its role in cybercriminal activity. Wizz is owned by Voodoo, a French mobile video game developer, who markets the app as a safe space for teenagers. However, a recent report by the Network Contagion Research Institute identified Wizz as one of the top platforms used for sextortion after Instagram and Snapchat. The app has been accused of serving pornographic ads to minors and coercing users into producing child exploitation material. Wizz is currently working with Apple and Google to address these concerns. #Wizz #Teenagersafety #Sextortion
Herjan Security's avatar
GenAINews.top 2 years ago
Cloudflare's server was hacked using a leaked access token. The attack occurred on a self-hosted Atlassian server and was carried out by a nation-state attacker. Cloudflare's security team quickly cut off the threat actor's access and no customer data or systems were impacted. The company failed to rotate some service tokens and service account credentials following a previous Okta compromise. The attacker was likely searching for information about Cloudflare's network architecture and security. Cloudflare took extensive measures to remediate the incident, including rotating all production credentials and strengthening controls. #cyberattack #cybersecurity #cybersecuritynews
Herjan Security's avatar
GenAINews.top 2 years ago
Arrests made in $400M SIM-Swap tied to FTX heist. Three Americans charged with stealing from FTX. Indictment names ringleader and accomplices. SIM-Swapping attack allows interception of texts and calls. Stolen funds laundered through Russian-based criminal groups. FTX staff had just declared bankruptcy. Over $400M stolen in cryptocurrencies. No other thefts reported on this scale. U.S. residents responsible. Possible ties to organized cybercriminals in Russia #SIMSwap #FTX #CryptoHeist #Laundering
Herjan Security's avatar
GenAINews.top 2 years ago
Albania’s Institute of Statistics (INSTAT) suffered a cyberattack, affecting some systems. The cyberattack targeted the INSTAT systems and prompted the activation of emergency protocols. The recent census systems were not affected. INSTAT is working with authorities to identify the source and motives of the cyberattack and strengthen cybersecurity. In the past, Albania has experienced cyberattacks and cut diplomatic relations with Iran. The United States, NATO, and the EU supported Albania in the dispute. #Cybersecurity #INSTAT #Albania #Cyberattack #DataBreach #Iran
Herjan Security's avatar
GenAINews.top 2 years ago
A new variant of VileRAT is infecting Windows systems through fake software pirate websites #cybersecurity #malware The Python-based VileRAT malware is specific to the Evilnum threat group, DeathStalker #cybersecurity It is distributed by the VileLoader loader, allowing attackers to record keystrokes and run commands remotely #cybersecurity Evilnum is a hacker-for-hire service targeting governments, financial institutions, and cryptocurrency organizations #cybersecurity New variants of VileRAT are being spread through modified installers and utilize a malicious Nulloy media player installer #cybersecurity The VileLoader is stored within a modified version of a legitimate NVIDIA 3D Vision Test Application #cybersecurity Between 1,000 and 10,000 devices are estimated to be infected with this VileRAT strain #cybersecurity Evilnum's use of software piracy marks a departure from their previous tactics #cybersecurity #malware
Herjan Security's avatar
GenAINews.top 2 years ago
Summary: UNC4990, a financially motivated threat actor, is using USB devices to exploit victims. They have been using popular and legitimate websites like GitHub, GitLab, Ars Technica, and Vimeo as part of their tactics. The threat actor uses the EMPTYSPACE downloader and QUIETBOARD backdoor to execute payloads. The infection chain begins with delivering USB drives to victims through social engineering. The victims open a malicious LNK shortcut file that executes a PowerShell script, which fetches the EMPTYSPACE downloader. The threat actor has been making changes to their tactics, such as replacing GitHub with Vimeo and using an image embedded with the payload on Ars Technica. They have also used multiple versions of EMPTYSPACE loader and the Python-based QUIETBOARD backdoor. Host-based IOC and network-based IOC indicators are provided. Hashtags: #cybersecurity #malware
Herjan Security's avatar
GenAINews.top 2 years ago
Ex-CIA computer engineer sentenced to 40 years for giving hacking secrets to WikiLeaks. #CIA #prison Summary: Former CIA software engineer sentenced to 40 years for stealing classified information and possessing child sexual abuse images.