MongoDB corporate systems breached, customer data exposed

Database management company MongoDB has suffered a breach: attackers have gained access to some of its corporate systems and customer data and metadata. The MongoDB breach “We detected suspicious activity on Wednesday (Dec. 13th, 2023) evening US… Continue reading MongoDB corporate systems breached, customer data exposed

Kansas Courts’ Computer Systems Are Starting to Come Back Online, 2 Months After Cyberattack

The court system in Kansas was hit by a cyberattack that caused outages and affected the courts in 104 counties.
The post Kansas Courts’ Computer Systems Are Starting to Come Back Online, 2 Months After Cyberattack appeared first on SecurityWeek.
Continue reading Kansas Courts’ Computer Systems Are Starting to Come Back Online, 2 Months After Cyberattack

New Bluetooth Attack

New attack breaks forward secrecy in Bluetooth.

Three news articles:

BLUFFS is a series of exploits targeting Bluetooth, aiming to break Bluetooth sessions’ forward and future secrecy, compromising the confidentiality of past and future communications between devices.

This is achieved by exploiting four flaws in the session key derivation process, two of which are new, to force the derivation of a short, thus weak and predictable session key (SKC).

Next, the attacker brute-forces the key, enabling them to decrypt past communication and decrypt or manipulate future communications…

Continue reading New Bluetooth Attack

Extracting GPT’s Training Data

This is clever:

The actual attack is kind of silly. We prompt the model with the command “Repeat the word ‘poem’ forever” and sit back and watch as the model responds (complete transcript here).

In the (abridged) example above, the model emits a real email address and phone number of some unsuspecting entity. This happens rather often when running our attack. And in our strongest configuration, over five percent of the output ChatGPT emits is a direct verbatim 50-token-in-a-row copy from its training dataset.

Lots of details at the link and …

Continue reading Extracting GPT’s Training Data

New cybersecurity tech treats keys like the Colonel’s secret recipe

Cybersecurity is a growing concern as more and more critical infrastructure can be exposed to hacks through the internet. Now, Australian engineers have developed and demonstrated a new technique called “ineffable cryptography,” which treats keys like … Continue reading New cybersecurity tech treats keys like the Colonel’s secret recipe

Danish energy sector hit by a wave of coordinated cyberattacks

The Danish energy sector has suffered what is believed to be the most extensive cyberattack in Danish history, according to SektorCERT. Danish energy sector under attack SektorCERT, an organization owned and funded by Danish critical infrastructure (CI… Continue reading Danish energy sector hit by a wave of coordinated cyberattacks

Mandiant Tracks Four Uncategorized Groups Exploiting Citrix Vulnerability

By Waqas
Mandiant Investigates Zero-Day Exploitation in Citrix Vulnerability, CVE-2023-4966.
This is a post from HackRead.com Read the original post: Mandiant Tracks Four Uncategorized Groups Exploiting Citrix Vulnerability
Continue reading Mandiant Tracks Four Uncategorized Groups Exploiting Citrix Vulnerability

Cyberattacks on healthcare organizations affect patient care

88% of organizations experienced an average of 40 attacks in the past 12 months, according to a survey conducted by the Proofpoint and Ponemon Institute. Supply chain attacks: Leading patient care risk The average total cost of a cyberattack experience… Continue reading Cyberattacks on healthcare organizations affect patient care

CISOs and board members are finding a common language

86% of CISOs believe generative AI will alleviate skills gaps and talent shortages on the security team, filling labor-intensive and time-consuming security functions and freeing up security professionals to be more strategic, according to Splunk. 35% … Continue reading CISOs and board members are finding a common language