A network of fake Twitter accounts are impersonating crypto security firms to phish panicked victims, stealing over $300,000 in assets so far.
Despite repeated warnings, developers continue to embed sensitive credentials such as keys, tokens, and passwords in their source code, leading to security breaches, as evidenced by Uber's 2015 incident and the thousands of secrets found in Python projects on PyPI. This widespread issue persists across various programming languages and repositories, with some exposed credentials still active and posing security risks. Secure alternatives for credential management do exist, such as environment files and secret management services provided by cloud platforms.
Google is adjusting their search rankings to prioritize first-hand knowledge and personal experiences, rather than just relying on information that's been gathered and aggregated from other sources. This means that when you search for something, you'll be more likely to see results from people who have firsthand knowledge or personal experience with the topic, rather than just information that's been repackaged and rehashed from other sources. This should make it easier to find authentic, relevant information on the things you're searching for.
Living off the land attacks, or LOTL attacks, are a growing concern for IT departments because they are particularly difficult to detect and prevent. These attacks use legitimate software and functions already present in a system to perform malicious actions, making them harder to identify and stop than traditional malware attacks. This type of attack is particularly effective against organizations with limited security resources or those that have not implemented robust security protocols. IT departments need to be aware of LOTL attacks and take steps to protect their systems against them, such as implementing multifactor authentication, limiting user privileges, and regularly updating security software.
Scientists at UT Southwestern Medical Center have developed a device that keeps a brain alive and functioning independently from the body. The device, called extracorporeal pulsatile circulatory control, successfully maintained brain activity for five hours in an experiment with a pig brain isolated from the body. This breakthrough could lead to new research opportunities for studying the brain and potential advancements in brain transplants.
Kaspersky predicts that in 2024, cyber threats will evolve to target mobile and smart devices, involve more advanced botnets and kernel rootkits, and include cyber elements in geopolitical conflicts as well as advancements in AI-assisted spear-phishing. https://securelist.com/kaspersky-security-bulletin-apt-predictions-2024/111048/
On November 14, 2023, Microsoft's security update addressed 57 vulnerabilities, including three critical zero-day flaws affecting Windows systems and Microsoft Office. Among the vulnerabilities, CVE-2023-36033 and CVE-2023-36036 allow elevation of privilege, while CVE-2023-36025 can bypass Windows Defender SmartScreen. Cisco Talos identified a remote code execution vulnerability in Excel, and new Snort rules have been released to help detect and prevent exploitation of these security issues.
The Australian Taxation Office has recently clarified its stance on capital gains #tax treatment of decentralized finance and wrapped #cryptocurrency tokens. According to the guidance, CGT will apply to wrapped tokens and #DeFi activities, such as lending and borrowing. This means that individuals who engage in these activities will be required to report capital gains and losses to the ATO. The move is aimed at increasing #transparency and #compliance in the #cryptocurrency space, and ensuring that taxpayers pay their fair share of #taxes.
Oh man, the #CacheWarp attack is serious business! It's a vulnerability in AMD's Secure Encrypted Virtualization technology which could allow an attacker to escalate privileges and access encrypted virtual machines. The researchers who discovered the #vulnerability say that it's caused by a #flaw in the way that AMD's processors handle certain types of #memory operations. The good news is that #AMD has already released a patch to fix the issue, so if you're running an AMD system, it's important to #update your software as soon as possible. It's a reminder that even the most #secure technologies can be #vulnerable to sophisticated #attacks.
Bitcoin #wallets older than 2016 could be #vulnerable to critical #security flaws, potentially putting over $1 billion at risk. Many wallets were built on open-source software with weak random number generators, making them susceptible to brute-force #attacks. Unciphered has contacted over a million people to address the issue, but millions more may be affected with no direct way to notify them.