• 0 Posts
  • 13 Comments
Joined 1 year ago
cake
Cake day: August 4th, 2023

help-circle
  • This is the best summary I could come up with:


    A prolific espionage hacking group with ties to China spent over two years looting the corporate network of NXP, the Netherlands-based chipmaker whose silicon powers security-sensitive components found in smartphones, smartcards, and electric vehicles, a news outlet has reported.

    The intrusion, by a group tracked under names including “Chimera” and “G0114,” lasted from late 2017 to the beginning of 2020, according to Netherlands national news outlet NRC Handelsblad, which cited “several sources” familiar with the incident.

    “Once nested on a first computer—patient zero—the spies gradually expand their access rights, erase their tracks in between and secretly sneak to the protected parts of the network,” NRC reporters wrote in an English translation.

    According to the log files that Fox-IT finds, the hackers come every few weeks to see whether interesting new data can be found at NXP and whether more user accounts and parts of the network can be hacked.”

    NXP also provides chips for the MIFARE card used by transit companies, FIDO-compliant security keys, and tools for relaying data inside the networks of electric vehicles.

    Security firm Cycraft documented one two-year hacking spree that targeted semiconductor makers with operations in Taiwan, where NXP happens to have research and development facilities.


    The original article contains 989 words, the summary contains 199 words. Saved 80%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    The password authenticator was hit by a cyberattack in September and said earlier this month that just 1% of its customers were affected.

    David Bradbury, Okta’s chief security officer, said in the post: “While we do not have direct knowledge or evidence that this information is being actively exploited, there is a possibility that the threat actor may use this information to target Okta customers via phishing or social engineering attacks.”

    Bradbury advised all customers to use multi-factor authentication, which requires more than one security test, to keep their information safe online.

    San Francisco-based Okta offers companies identity management tools including single sign-in and multi-factor authentication for secure website logins.

    The company has more than 18,000 corporate clients including FedEx, S&P Global, T-Mobile and Zoom, per its website.

    Then in August hacking group Scatter Swine gained access to Okta customer data, it claimed in a blog post, breaching more than 100 companies including software firm Twilio.Okta didn’t immediately respond to a request for comment from Business Insider, made outside normal working hours.


    The original article contains 249 words, the summary contains 172 words. Saved 31%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    Underscoring the importance of their discovery, the researchers used their findings to calculate the private portion of almost 200 unique SSH keys they observed in public Internet scans taken over the past seven years.

    SSH is the cryptographic protocol used in secure shell connections that allows computers to remotely access servers, usually in security-sensitive enterprise environments.

    The vulnerability occurs when there are errors during the signature generation that takes place when a client and server are establishing a connection.

    Another reason for the surprise is that until now, researchers believed that signature faults exposed only RSA keys used in the TLS—or Transport Layer Security—protocol encrypting Web and email connections.

    The researchers noted that since the 2018 release of TLS version 1.3, the protocol has encrypted handshake messages occurring while a web or email session is being negotiated.

    The new findings are laid out in a paper published earlier this month titled “Passive SSH Key Compromise via Lattices.”


    The original article contains 596 words, the summary contains 157 words. Saved 74%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    While Amazon has always targeted European organizations with the promise of localized data storage and controls, it had previously distanced itself from the whole “sovereign cloud” concept.

    Amazon chief security officer (CSO) Stephen Schmidt called the sovereign cloud “a marketing term more than anything else,” but last November AWS unveiled its “digital sovereignty pledge,” going some way toward enshrining its data control commitments into stone.

    At the crux of the matter is a growing array of regulations — particularly in Europe — that stipulate how people and companies’ data should be handled.

    Though even without specific regulation, companies in many industries — such as healthcare and banking — have been slower to go all-in on the cloud due to concerns about how their data might be harnessed by the tech giants.

    The company confirmed to TechCrunch that this won’t be limited to the EU specifically, and organizations across the European continent (including the U.K.) will be able to access it.

    Meanwhile, efforts are underway elsewhere to bring a more native flavor of cloud to European markets — a Swedish startup called Evroc emerged from stealth this year with €13 million in funding to develop hyperscale data centers in Europe.


    The original article contains 527 words, the summary contains 198 words. Saved 62%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    The U.S. Securities and Exchange Commission has charged SolarWinds and its top cybersecurity executive Timothy Brown with fraud and internal control failures for allegedly misleading investors about the company’s cybersecurity practices prior to a cyberattack launched by Russian hackers in 2019.

    The SEC’s complaint accused the company of making claims, including about its own security practices, that were “at odds” with its internal assessments.

    But the federal regulator said that Brown failed to sufficiently raise security risks to the company or resolve them.

    Gurbir S. Grewal, who oversees the SEC’s enforcement unit, said SolarWinds and Brown “ignored repeated red flags” and “engaged in a campaign to paint a false picture of the company’s cyber controls environment, thereby depriving investors of accurate material information.”

    “Today’s enforcement action not only charges SolarWinds and Brown for misleading the investing public and failing to protect the company’s ‘crown jewel’ assets, but also underscores our message to issuers: implement strong controls calibrated to your risk environments and level with investors about known concerns,” said Grewal.

    The SEC told SolarWinds in November 2022 that it faced enforcement action following the cyberattack, warning that the company’s cybersecurity disclosures and public statements were under scrutiny.


    The original article contains 565 words, the summary contains 197 words. Saved 65%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    Operation Zero, which is based in Russia and launched in 2021, also added that “as always, the end user is a non-NATO country.” On its official website, the company says that “our clients are Russian private and government organizations only.”

    Zelenyuk also said that the bounties Operation Zero offer right now may be temporary, and a reflection of a particular time in the market, and the difficulty of hacking iOS and Android.

    “The price formation of specific items is heavily dependent on availability of the product on the zero-day market,” Zelenyuk said in an email.

    For at least a decade, various companies around the world have offered bounties to security researchers willing to sell the bugs and hacking techniques to exploit those flaws.

    Unlike traditional bug bounty platforms like Hacker One or Bugcrowd, companies like Operation Zero don’t alert the vendors whose products are vulnerable, but instead sell them to government customers.

    Crowdfense, a competitor based in the United Arab Emirates, offers up to $3 million for the same kind of chain of bugs on Android and iOS.


    The original article contains 700 words, the summary contains 178 words. Saved 75%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    Apple released security updates on Thursday that patch two zero-day exploits — meaning hacking techniques that were unknown at the time Apple found out about them — used against a member of a civil society organization in Washington, D.C., according to the researchers who found the vulnerabilities.

    Citizen Lab, an internet watchdog group that investigates government malware, published a short blog post explaining that last week they found a zero-click vulnerability — meaning that the hackers’ target doesn’t have to tap or click anything, such as an attachment — used to target victims with malware.

    The researchers said the vulnerability was used as part of an exploit chain designed to deliver NSO Group’s malware, known as Pegasus.

    “The exploit chain was capable of compromising iPhones running the latest version of iOS (16.6) without any interaction from the victim,” Citizen Lab wrote.

    Citizen Lab said it called the exploit chain BLASTPASS, because it involved PassKit, a framework that allows developers to include Apple Pay in their apps.

    “Once more, civil society, is serving as the cybersecurity early warning system for… billions of devices around the world,” John Scott-Railton, a senior researcher at the internet watchdog Citizen Lab, wrote on Twitter.


    The original article contains 357 words, the summary contains 199 words. Saved 44%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    Cloud host CloudNordic says most of its customers have “lost all data with us” following a ransomware attack on its datacenter systems, including its backups.

    In a notice on its website translated from Danish, CloudNordic said: “The attackers succeeded in encrypting all servers’ disks, as well as on the primary and secondary backup system, whereby all machines crashed and we lost access to all data.”

    The cloud host said that it believes the hackers had access to the company’s administrative systems “from which they could encrypt entire disks.”

    It’s not clear how the ransomware attack began, but the company said that the attack happened — or was at least exacerbated — by moving infected systems from one datacenter to another datacenter that was “unfortunately wired to access our internal network that is used to manage all of our servers.” CloudNordic said that it “had no knowledge that there was an infection.”

    At the time of writing, no ransomware group has appeared to publicly acknowledge or take credit for the cyberattack.

    Both CloudNordic and Azero said that they were working to rebuild customers’ web and email systems from scratch, albeit without their data.


    The original article contains 432 words, the summary contains 192 words. Saved 56%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    This request concerns legal experts who argue that powerful technology like the one Cellebrite builds and sells, and how it gets used by law enforcement agencies, ought to be public and scrutinized.

    “We don’t really want any techniques to leak in court through disclosure practices, or you know, ultimately in testimony, when you are sitting in the stand, producing all this evidence and discussing how you got into the phone,” the employee, who we are not naming, says in the video.

    “The results these super-secretive products spit out are used in court to try to prove whether someone is guilty of a crime,” Riana Pfefferkorn, a research scholar at the Stanford University’s Internet Observatory, told TechCrunch.

    “The accused (whether through their lawyers or through an expert) must have the ability to fully understand how Cellebrite devices work, examine them, and determine whether they functioned properly or contained flaws that might have affected the results.”

    “And anyone testifying about those products under oath must not hide important information that could help exonerate a criminal defendant solely to protect the business interests of some company,” said Pfefferkorn.

    “It’s super important to keep all these capabilities as protected as possible, because ultimately leakage can be harmful to the entire law enforcement community globally,” the Cellebrite employee says in the video.


    The original article contains 821 words, the summary contains 217 words. Saved 74%. I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    Researchers have discovered a suite of vulnerabilities that largely break a next-generation protocol that was designed to prevent the hacking of access control systems used at secure facilities on US military bases and buildings belonging to federal, state, and local governments and private organizations.

    Like an earlier protocol, known as Wiegand, OSDP provides a framework for connecting card readers, fingerprint scanners, and other types of peripheral devices to control panels that check the collected credentials against a database of valid personnel.

    When surreptitiously inserted by a would-be intruder into the wiring behind a peripheral device, Gecko performed an adversary-in-the-middle attack that monitors all communications sent to and from the control panel.

    Secure Channel allowed OSDP-based communications between peripheral devices and control panels to be encrypted with 128-bit AES, a tried and tested algorithm that is virtually impossible to break when used correctly.

    While all but four of the vulnerabilities can be effectively eliminated, mitigations require configuration settings that aren’t described in the official OSDP specification (available here for $200) and differ depending on the manufacturer of each device.

    OSDP works over RS-485, a serial communication protocol designed to provide relatively high bandwidth (up to 10 megabits per second), the ability to span reasonably long distances (up to 4,000 feet), tolerance for lots of radio frequency noise, and capacity for 32 devices on a single line.


    I’m a bot and I’m open source!







  • This is the best summary I could come up with:


    New Zealand’s intelligence service has accused China of foreign interference in its democracy, amid increasing tensions and geopolitical competition in the region.

    Friday’s public threat assessment points to “increased strategic competition” in the Indo-Pacific region as driving the interference from China.

    Beijing’s “efforts to advance its political, economic, military and security involvement in the Pacific is a major factor driving strategic competition in our home region,” it says.

    In previous security overview reports, NZSIS has spoken broadly about having gathered evidence of interference and espionage activities in New Zealand by foreign states and agents, but not named specific countries or governments.

    In one case study – not attributed to a specific state – it said “an undeclared foreign intelligence officer … targeted and sought to cultivate a New Zealander with access to information and people networks of interest to the foreign state [and] almost certainly sought to obtain political, economic and national security intelligence through the relationship.”

    On the threat from Iran, the agency said it had detected state actors “monitoring and providing reporting on Iranian communities and dissident groups”.


    I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    New Zealand’s intelligence service has accused China of foreign interference in its democracy, amid increasing tensions and geopolitical competition in the region.

    Friday’s public threat assessment points to “increased strategic competition” in the Indo-Pacific region as driving the interference from China.

    Beijing’s “efforts to advance its political, economic, military and security involvement in the Pacific is a major factor driving strategic competition in our home region,” it says.

    In previous security overview reports, NZSIS has spoken broadly about having gathered evidence of interference and espionage activities in New Zealand by foreign states and agents, but not named specific countries or governments.

    In one case study – not attributed to a specific state – it said “an undeclared foreign intelligence officer … targeted and sought to cultivate a New Zealander with access to information and people networks of interest to the foreign state [and] almost certainly sought to obtain political, economic and national security intelligence through the relationship.”

    On the threat from Iran, the agency said it had detected state actors “monitoring and providing reporting on Iranian communities and dissident groups”.


    I’m a bot and I’m open source!


  • This is the best summary I could come up with:


    Illinois state representative Jennifer Gong-Gershowitz told the Daily Herald that she introduced the anti-doxxing law as “a way to hold accountable those who perpetuate hate online.”

    The ADL’s ultimate goal is to see a federal anti-doxxing law passed, but right now, Congress is only taking small steps in that direction by mulling the Doxing Threat Assessment Act introduced in May.

    ACLU of Illinois’ director of communications and public policy, Ed Yohnka, told the Daily Herald that his organization remained opposed because the law could infringe on free speech rights.

    “Arming our national security officials and law enforcement with knowledge of how these groups operate and for identifying vulnerabilities and preventing attacks is a first step to protect our communities from harm.”

    Since the Doxing Threat Assessment Act was introduced, the number of co-sponsors has doubled, suggesting the bipartisan bill is gaining popular support and has a decent chance of passing.

    ), said that persecuted religious groups and businesses appeared most vulnerable and "with more information, our law enforcement will be able to develop a more robust approach to the protections of Americans and their data.”


    I’m a bot and I’m open source!