Don’t Let Your Domain Name Become a “sitting Duck”

Over a million domain names, including those from Fortune 100 companies, are vulnerable to cybercriminal takeover due to authentication flaws at major web hosting and registrar firms. These “Sitting Duck” domains can be exploited easily, as attackers can claim control without direct access to the original owner's account. Research indicates that at least 30,000 such domains have been hijacked since 2019, allowing criminals to use them for phishing and spam attacks. Key vulnerabilities stem from misconfigured DNS records and weak verification processes by DNS providers. Security experts urge better practices and coordination among stakeholders to mitigate these risks.

Don’t Let Your Domain Name Become a “Sitting Duck”

With Open Source Artificial Intelligence, Don’t Forget the Lessons of Open Source Software

Open source AI raises innovation and security concerns, similar to past debates about open source software. CISA emphasizes learning from open source software security to promote responsible development of open foundation models while addressing potential harms. Key lessons include sustainability in contributions to open source ecosystems and prioritizing secure design and transparency in AI model development. CISA advocates for dual-use tools, acknowledging that while risks exist, the benefits for cybersecurity outweigh them. Ensuring safe, secure, and trustworthy AI models is crucial for fostering innovation.

With Open Source Artificial Intelligence, Don’t Forget the Lessons of Open Source Software

Anyone Can Access Deleted and Private Repository Data on Github

GitHub allows access to data from deleted and private repositories due to its repository architecture. This includes data from deleted forks and commits linked to public repositories, leading to potential exposure of sensitive information. A new term, Cross Fork Object Reference (CFOR), describes vulnerabilities where one fork can access another's sensitive data. Examples highlight that such data remains accessible even after deletion, primarily through known commit hashes. GitHub policies confirm this design, posing serious security implications for public repository users, as misuse could lead to leakage of confidential information. Key rotation is advised for secure handling of exposed secrets.

Anyone can Access Deleted and Private Repository Data on GitHub

Payload Trends in Malicious Onenote Samples

Extreme TLDR: Attackers exploit Microsoft OneNote for phishing using embedded payloads, primarily through images and buttons that execute malicious scripts or binaries. Analysis of 6,000 samples shows various payload types like JavaScript, VBScript, and EXE files are used, with a trend towards smaller file sizes for stealth. Organizations are advised to block dangerous extensions and monitor embedded objects in OneNote files to mitigate risks.

Payload Trends in Malicious OneNote Samples

Are Your Passwords in the Green?

TLDR: The 2024 Hive Systems Password Table updates show how long it takes for hackers to brute force passwords, switching from MD5 to bcrypt for better security. The table has evolved since 2020 based on hardware advancements and data from breaches. It highlights the increased difficulty in cracking passwords due to more robust hashing methods, providing max time estimates for cracking various password complexities. Additionally, it emphasizes the impact of previously leaked passwords on security and the importance of using strong, randomly generated passwords.

Are Your Passwords in the Green?

The Drop in Ransomware Attacks in 2024 and What It Means

Ransomware attacks decreased by 22% in Q1 2024 after a 55.5% surge in 2023. Key factors for this drop include enhanced law enforcement actions against major groups like LockBit and ALPHV, leading to significant arrests and infrastructure takedowns. Additionally, a historic low in ransom payments and emerging new groups suggest changes in the landscape of cybercrime, with new entrants struggling to fill the void left by established ransomware operations.

The Drop in Ransomware Attacks in 2024 and What it Means

Protecting the Weakest Link: How Human Errors Can Put a Company in Risk

95% of cybersecurity breaches stem from human errors. Companies must prioritize cybersecurity training, implement Zero Trust strategies, and have an incident response plan to mitigate risks. Employees are the weakest link; common mistakes include weak passwords and falling for phishing scams. Advanced technological aids and behavioral insights can improve security by anticipating human errors. A comprehensive approach integrating training and technology is essential for effective protection.

Protecting the weakest link: how human errors can put a company in risk

Scroll to Top