Herjan Security's avatar
Herjan Security
npub1k7kx...36zj
[.] Nostrop stream of GenAI news and updates
Herjan Security's avatar
GenAINews.top 2 years ago
#Summary: JetBrains TeamCity On-Premises software has a critical flaw (CVE-2024-23917) that could grant attackers administrative control over affected servers. Patched for TeamCity Cloud servers, On-Premises users should update to version 2023.11.3 or use a security patch plugin. Organizations must prioritize immediate patching and focus on vulnerability management. #Hashtags: #TeamCity #securityflaw #administrativecontrol #patched #vulnerabilitymanagement
Herjan Security's avatar
GenAINews.top 2 years ago
Governments and tech giants unite against commercial spyware in a joint agreement called the Pall Mall Process. The agreement aims to tackle the proliferation and irresponsible use of spyware and cyber intrusion tools. Signatories include the US, UK, France, and 22 other nations, as well as tech companies like Google, Microsoft, Apple, Meta, and BAE Systems. The UK National Cyber Security Centre estimates that the commercial cyber intrusion sector doubles every ten years. Some countries linked to spyware development or use, including Ireland, Greece, and Cyprus, have signed the agreement, while others such as Israel, Hungary, Mexico, Spain, and Thailand have not. The US State Department has also announced visa restrictions for individuals involved with dangerous spyware technology. #Spyware #TechGiants #Cybersecurity #PallMallProcess #GovernmentCollaboration
Herjan Security's avatar
GenAINews.top 2 years ago
Linux Shim Bootloader Flaw exposes most Linux distributions to code execution attacks. Shim, maintained by Red Hat, is used in various Linux distributions to support secure boot. It has been discovered with a new vulnerability related to out-of-bounds written in HTTP protocol handling. Other vulnerabilities have also been identified, including log error invocation, integer overflow, and out-of-bounds read. Attack vectors include Man-in-the-Middle attack, manipulation of EFI variables, and manipulation of PXE to load a vulnerable shim bootloader. Stay updated on cybersecurity news. #cybersecurity #linux #vulnerability
Herjan Security's avatar
GenAINews.top 2 years ago
Chinese state-sponsored hackers exploited a zero-day vulnerability in Fortinet's virtual private network to hack Dutch defense networks. The hackers used COATHANGER malware to establish persistence within the network. The breach was caused by Chinese state actors and the extent of the breach is unknown. The malware deployed can recover after every reboot and even after a firmware upgrade. The Netherlands' Joint Signal Cyber Unit shared indicators of compromise. US officials dismantled a botnet used by Chinese threat actors. #cybersecurity #vulnerability
Herjan Security's avatar
GenAINews.top 2 years ago
Meta, the parent company of Facebook and Instagram, will label AI-generated images on their platforms to distinguish between real and fake content. The labels will be implemented in the coming months and in different languages, with a focus on important elections worldwide. The tech industry is working on technical standards to identify AI-generated content, but it may not catch everything. The labels will apply to images created by various tools, including Google, OpenAI, Microsoft, Adobe, Midjourney, and Shutterstock. #AI #FakeContent #SocialMedia #DigitalAuthenticity
Herjan Security's avatar
GenAINews.top 2 years ago
Chinese state-backed spies infiltrated Dutch defense networks last year using malware called "Coathanger." The initial intrusion exploited a zero-day vulnerability, and the threat actors then used a remote access Trojan (RAT) called Coathanger. The RAT hides itself by hooking system calls and survives reboots and firmware upgrades. The intrusion had limited impact as the victim network was segmented from wider networks. The attack highlights the trend of threat actors targeting edge devices connected to the public internet. Organizations can mitigate these threats by regularly performing risk analysis on devices, limiting internet access, analyzing logs for anomalous activity, and installing security updates. #ChineseSpies #CoathangerMalware #ZeroDayVulnerability #RemoteAccessTrojan #EdgeDeviceThreats #Cybersecurity
Herjan Security's avatar
GenAINews.top 2 years ago
Google's open-source tool Bazel has a critical supply chain vulnerability that allows attackers to insert malicious code into the codebase. Many projects that use Bazel, including Kubernetes and LinkedIn, could have been affected. The vulnerability has been fixed. Hashtags: #Google #Bazel #vulnerability #supplychain #cybersecuritynews
Herjan Security's avatar
GenAINews.top 2 years ago
UK and France are hosting a conference to address the issue of "hackers for hire" and the cyberattack tools market. The conference aims to discuss the commercial market for cyber snooping and attack tools and the threats they pose to international security. Representatives from Apple, BAE Systems, Google, and Microsoft will attend the event. The Pall Mall process, an international agreement, has been signed by participants to pledge joint action. The demand for the capability to conduct malicious cyber operations is growing, making a thriving global cybersecurity sector essential. #Cybersecurity #HackersForHire #CyberAttackToolsMarket #InternationalSecurity #PallMallProcess #DigitalSociety
Herjan Security's avatar
GenAINews.top 2 years ago
Safer Internet Day: Enhance your online safety by limiting personal information on social media, strengthening online authentication, demanding better security and privacy protections, avoiding clicking on malicious websites, and keeping children safe online. #SaferInternetDay #OnlineSafetyTips
Herjan Security's avatar
GenAINews.top 2 years ago
Summary: A group called "ResumeLooters" has been stealing user information from employment agency and retail websites in the APAC region. The group compromised 65 websites using SQL injection attacks and injected XSS scripts into additional sites. The stolen data includes names, phone numbers, emails, dates of birth, employment history, and other personal data. Over two million email addresses were stolen and the data was sold in Chinese-speaking hacking groups. The attacks primarily targeted India, Taiwan, Thailand, and Vietnam. The report recommends using web application firewalls and implementing input validation/sanitization as protection against these attacks. Hashtags: #ResumeLooters #DataTheft #APAC #Cybersecurity #SQLInjection #XSSAttacks #UserPrivacy #WebSecurity
Herjan Security's avatar
GenAINews.top 2 years ago
Hackers are selling AnyDesk users' login credentials on cybercriminal forums. Over 18,000 credentials were leaked and offered for sale on the Dark Web. The leaked information includes usernames, passwords, number of active connections, session duration, and associated email addresses. AnyDesk recommends immediately updating passwords and enabling multi-factor authentication to enhance security. #cyberattack #cybersecurity #cybersecuritynews
Herjan Security's avatar
GenAINews.top 2 years ago
Summary: 1. SOC 2 Type 2 certification confirms secure data management and privacy protection. 2. SOC 2 compliance is based on trust service principles: security, availability, processing integrity, confidentiality, and privacy. 3. SOC 2 accreditation demonstrates dedication to high-level security and data protection. 4. Leading SOC 2 Type 2 compliant providers include Perimeter 81, Deloitte, Vanta, Drata, and Sprinto. 5. SOC 2 compliance includes Type I and Type II evaluations. 6. SOC 2 and ISO 27001 differ in scope and methodology. 7. Benefits of SOC 2 certification include enhanced trust, competitive advantage, improved security measures, and compliance with regulatory requirements. 8. SOC 2 certification supports market expansion, risk management, customer confidence, and operational efficiency. 9. Perimeter 81, Deloitte, Vanta, Drata, and Sprinto offer key features as SOC 2 Certificate Providers. Hashtags: #SOC2 #Certification #Cybersecurity #DataProtection #Compliance #Privacy #Security #RiskManagement #BusinessSafety
Herjan Security's avatar
GenAINews.top 2 years ago
Text summary: The Pennsylvania Courts system was hit by a denial of service (DoS) attack, causing certain web systems to become inaccessible. The incident is currently under investigation and there is no evidence of data compromise. Hashtags: #PennsylvaniaCourts #DoSattack #cybersecurity
Herjan Security's avatar
GenAINews.top 2 years ago
HIPAA Compliance Service Providers: Perimeter81, Sprinto, Updox, Weave, Paubox, OhMD, Spruce Health, Luma Health, LuxSci, Arka Softwares. Hashtags: #HIPAACompliance #CyberSecurity #DataProtection #HealthcareIT #Privacy #HIPAA #HIPAAComplianceProviders #HealthcareSecurity #RiskManagement #PatientPrivacy.
Herjan Security's avatar
GenAINews.top 2 years ago
LockBit ransomware group demands $11 million from the government to unlock files. #LockBit #ransomware #cybersecurity LockBit recently targeted the city of Calvià in Majorca, Spain, with a devastating ransomware attack. #Calvià #Majorca #ransomware The attack led to IT outages and administrative deadlines were suspended until January 31, 2024. #IToutages #administrativedeadlines #cyberattack LockBit ransomware poses a growing threat to Linux and MacOS users. #Linux #MacOS #ransomware LockBit operates as a RaaS model, making ransomware attacks more accessible. #RaaS #cybercrime LockBit offers pre-built tools and infrastructure to its affiliates, lowering the technical barrier to entry. #prebuilttools #cyberattacks LockBit has a professional website and a bug bounty program. #professionalwebsite #bugbounty #LockBit LockBit breaches a system by siphoning credentials, disarming defenses, lateral movement, data exfiltration, and file encryption. #breachedsystem #dataexfiltration #fileencryption LockBit is currently ranked as the 19th most popular malware overall. #malware #ranking Possible causes of the Calvià attack include phishing, unpatched software, and brute-forcing techniques. #phishing #unpatchedsoftware #bruteforce Organizations must prioritize cybersecurity basics to fortify their defenses against ransomware attacks. #cybersecuritybasics #defenses #ransomware
Herjan Security's avatar
GenAINews.top 2 years ago
Hackers are using Google search ads to target IT and system admins. They use hacked WordPress websites to host malicious PHP shell scripts. The attackers manipulate search engine algorithms to redirect users to fake websites hosting malware. The ads target commonly searched keywords for software programs used by IT professionals and system administrators. The hackers employ complex Python scripts to identify potential targets for future attacks. Cybersecurity news. #Hackers #GoogleSearchAds #ITAdmins #SystemAdmins #Malware
Herjan Security's avatar
GenAINews.top 2 years ago
Summary: A recent malware campaign called "Commando Cat" is targeting exposed Docker API endpoints, posing a threat to cloud environments. The malware exploits Docker API instances, creates backdoors, steals credentials, and deploys a crypto miner. It uses sophisticated evasion techniques and focuses on profit-driven motives. Users and organizations are urged to patch vulnerabilities and secure Docker API endpoints. #cybersecurity #malware Hashtags: #cybersecurity #malware
Herjan Security's avatar
GenAINews.top 2 years ago
Summary: In our interconnected world, ISO 27001 compliance is crucial for businesses to protect sensitive data and enhance security measures. ISO 27001 helps establish a systematic approach to security, manage risks, ensure legal compliance, build trust with stakeholders, improve business resilience, and gain a competitive advantage. Finding the best ISO 27001 compliant companies involves research, checking certification bodies, industry forums, and expert recommendations. Perimeter 81, ISOvA, Eramba.org, ISMS.online, and ComplianceForge are among the top ISO 27001 compliant companies in 2024. Hashtags: #ISO27001 #Cybersecurity #DataProtection #InformationSecurity #Compliance.