Author: rescue@crimefire.in

  • Toyota Suffers Data Breach from “Mistakenly” Exposed Access Key … – Spiceworks News and Insights

    Toyota discovered the leak after a third party was able to access a company server with credentials that they obtained from source code published on GitHub by a third party contractor.

    Japanese automaker Toyota suffered a breach of customer records after a hacker obtained credentials for one of its servers from source code published on GitHub by a website development subcontractor. The third party “mistakenly uploaded part of the source code to their GitHub account while it was set to be public”, the company said.
    As a result, the company said that email addresses and customer management numbers of as many as 296,019 customers were leaked. However, Toyota, one of the two biggest global automakers by revenue, seems to have caught a stroke of luck, considering the access key in the source code on GitHub was exposed for five years, between December 2017 and September 15, 2022.
    “It’s instructive just how much potential damage can come from a simple mistake and that the mistake can take years to identify,” Chris Clements, VP of solutions architecture at Cerberus Sentinel, told Spiceworks. “This is far from the first time an organization has had private information potentially exposed from uploading secret keys or passwords to public code repositories or exposed cloud storage buckets.”
    Toyota said a website development subcontractor “mistakenly uploaded part of the source code to their GitHub account while it was set to be public” in December 2017. This led the unknown hacker straight to the server containing customers’ data associated with the company’s infotainment system T-Connect.
    “This is a very common password theft scenario. It’s been estimated that hundreds of thousands of exposed passwords are up on GitHub waiting for anyone who can access the source code to reveal it,” Roger Grimes, defense evangelist at KnowBe4, told Spiceworks. “Example projects have revealed that passwords located in code uploaded to GitHub have been accessed and used against the victim in less than 30 minutes. It’s a big problem.”
    The silver lining to the leak is that customer names, phone numbers, credit cards, etc., remain unaffected. With no additional personal information about the user, threat actors cannot tailor their social engineering efforts while carrying out phishing attacks, making them a bit less severe.
    However, email IDs tend to be made up of names, and with the associated customer management numbers, phishing, even if weakened, certainly is a concern.
    See More: Intel Alder Lake CPU BIOS Source Code, Tools and Files Leaked on GitHub and 4chan
    Customers whose data was leaked should get an apology email from Toyota. The company has also set up a page for customers to check whether their email addresses have been leaked and has set up a call center to answer any questions.
    “It [the leak] points to just how difficult a challenge that data proliferation presents. Every copy of data from employees to subcontractors presents an additional avenue for inadvertent disclosure. It doesn’t matter if your main storage location is heavily secured and monitored if a user can just copy that data to a cloud service outside of your control,” Clements added.
    Grimes opined that developers need to be more careful in dealing with the complexities of the cloud. After all, the human element has proven to be a weak link in organizations’ cybersecurity. Human-centric activities are attacker favorites because they strengthen their social engineering efforts, or in Toyota’s case, lead them right into the server.
    In its 2022 Data Breaches Investigations ReportOpens a new window , Verizon noted that 82% of data breaches are caused due to a human element. “Developers need to know that putting active, production, passwords into source code is not allowed. We need to make developers realize that putting passwords into source code, even for testing purposes, is like running with scissors…nothing good can come up of it,” Grimes added.
    Toyota said it hasn’t noticed any unauthorized use of data but warned customers to remain vigilant of spoofing or phishing scams. To mitigate the fallout of the breach, the company removed third-party access to the server, changed the access keys, and changed the GitHub repository to private.
    Clements and Grimes suggested a policy-driven approach to minimizing similar errors. Clements said, “Like most things in cybersecurity, there are no easy answers because it’s not an easy problem.  Considering that truism, it’s imperative that organizations adopt a cultural approach to cybersecurity that is integral to every business process.  It’s still not an easy job, but it’s much more manageable when every person understands the need for secure operations and what their responsibilities are.”
    Grimes added, “The solution is the defense-in-depth combination of policies, technical tools, and education to prevent errant passwords from being left in source code.”
    Jordan Schroeder, managing CISO at Barrier Networks, spelled out some concrete steps regarding the use of access keys to avoid a similar situation.
    “Addressing these weaknesses requires implementing secrets management so that access keys are pulled from secured secrets servers and not hard coded into software, by locking down the development environment to prevent public access, and by setting up automated code repository security and access reviews, which includes searching the internet for code snippets that would indicate source code leakage,” Schroeder told Spiceworks.
    Let us know if you enjoyed reading this news on LinkedInOpens a new window , TwitterOpens a new window , or FacebookOpens a new window . We would love to hear from you!
    Image source: Shutterstock

    Asst. Editor, Spiceworks Ziff Davis

    source

  • Samsung says customer data stolen in July data breach – TechCrunch

    Electronics giant Samsung has confirmed a data breach affecting customers’ personal information.
    In a brief notice, Samsung said it discovered the security incident in late-July and that an “unauthorized third party acquired information from some of Samsung’s U.S. systems.” The company said it determined customer data was compromised on August 4.
    Samsung said Social Security numbers and credit card numbers were not affected, but some customer information — name, contact and demographic information, date of birth, and product registration information — was taken.
    “The information affected for each relevant customer may vary. We are notifying customers to make them aware of this matter,” said the statement.
    Samsung spokesperson Chris Langlois told TechCrunch by email via crisis communications firm Edelman that demographic data relates to customer information used for marketing and advertising, but didn’t specify what types of data this includes. Langlois added that registration data, provided by customers in order to access support and warranty information, includes product purchase date, model, and device ID.
    Langlois declined to say how many customers were affected or why it took Samsung more than a month to notify customers about the breach, which was announced just hours ahead of a U.S. holiday weekend marking Labor Day.
    “Even though the investigation is ongoing, we wanted to notify our customers to make them aware of this matter because we understand how important their privacy is,” Langlois said.
    The company noted that it has taken steps to secure its systems and has brought in an unnamed third-party cybersecurity firm. Samsung said it was coordinating with law enforcement.
    This is the second time Samsung has confirmed a data breach this year. In March, the company admitted that the Lapsus$ hacking group — the same group that infiltrated Nvidia, Microsoft and T-Mobile — obtained and leaked almost 200 gigabytes of confidential data, including source code for various technologies and algorithms for biometric unlock operations.
    If you know more about Samsung’s data breach, get in touch via Signal at +1 646.755.8849 or via SecureDrop.

    source

  • Cybersecurity jobs: Why are employers turning away talent? – Tech Monitor

    It’s not just cybersecurity talent that is in short supply, but also ideas on who to recruit and how.
    By Greg Noone
    Ian* had spent four years as a lorry driver before he decided to pursue jobs in cybersecurity. More people were needed in the sector than ever before, he’d heard. Besides which, Ian recalls, “I wanted more”; more money, more opportunities for career progression.
    And so, he began teaching himself the rudiments of computer science through courses he found online. “I started one, and it was brilliant,” says Ian. “I was like, ‘Yeah, you know what? I could do this as a career.”
    Finding time to study with a full-time job and a young family was difficult, but after he was put on furlough during the first national lockdown, Ian knuckled down on a £749 course for CompTIA Security+ certification (“That was the discounted price,” he says.)
    When it became clear his old job was no longer viable, Ian parleyed the resulting accreditation into a job as an IT technician at the school where his wife worked. Impressed by his enthusiasm, his manager allowed him to study for further qualifications on the job.
    Ian thought that this combination would put him in good stead with recruiters for entry-level cybersecurity jobs. He was wrong. After applying for dozens of vacancies for SOC analysts and junior pen testers, Ian saw that most recruiters were asking for two or three years’ experience in similar roles, in addition to a set of unfamiliar qualifications and skills. Progression would involve investing hundreds of pounds more into additional training courses, although it was difficult to know which ones were worthwhile enrolling onto.
    “I don’t know what skills these people are looking for,” says Ian. Even if he did know, it’s difficult to find the time to study. “I’m spending six hours a day going to fix a broken PC or replace a mouse that a student’s broken. It takes me away from sitting there [and] learning Python, learning SQL.”
    Ian’s story is all the more remarkable given the strength of demand for cybersecurity professionals in the UK. According to recent figures, 51% of all businesses have identified a shortage in basic cybersecurity skills, a reflection of the global estimate of 2.7 million vacancies for cybersecurity jobs.
    This shortage of talent is making businesses of all stripes more vulnerable to cyberattack. Earlier this month, a report from Fortinet estimated that up to 80% of breaches can be linked in some way to the cybersecurity skills crisis.
    But this isn’t just down to a general shortage of candidates in cybersecurity recruitment. Businesses themselves are making elementary mistakes in how they hire and retain talent.
    “They’re putting the job out there, and they’re requesting too much from these roles,” says Jason Nurse, a cybersecurity professor at the University of Kent. Simply put, businesses are envisioning an ideal candidate that simply doesn’t exist. Other firms, meanwhile, do not know what they want their new recruits to accomplish once they join and fail to ensure clear paths for career progression or even hint at supplementary in-house training.
    This leaves applicants like Ian high and dry. “There’s people out there that are willing to train, willing to even pay for it themselves, but they need to be in the job to learn it, as well,” he says. “And I think that’s what they’re missing out on.”
    It’s little wonder that a job in cybersecurity is attractive right now. Average salaries for cybersecurity jobs in the UK have ballooned, with some sectors seeing rises of between 30-45%. Many businesses, however, either cannot match this or simply aren’t aware that offering anything less than £50,000 is likely to result in the job advertisement being roundly ignored.
    The pandemic hasn’t made things any easier for the industry. Remote working has been a double-edged sword for businesses, vastly increasing their attack surfaces but allowing them to recruit for cybersecurity jobs from almost anywhere in the world.
    However, while this might be great for individuals, companies outside London and the South East are suffering, explains Andrew Rose, resident CISO at Proofpoint. “They can’t even afford the people who are local to them to come and work for them,” says Rose, “because they’re insisting on bigger wages from the bigger companies who can actually pay.”
    Even if they get the salary they want, new starters may not be inclined to stick around. “Stress levels have gone up,” says Rose, especially since the pandemic. An increased attack surface means bigger workloads for security teams, and it’s not unusual for cybersecurity personnel to burn out within months. Add in the general shortage of talent and highly competitive salaries, and it becomes much more difficult for businesses to retain staff.
    Unsurprisingly, specialist recruitment agencies have gotten bolder in poaching talent – leading to bizarre outcomes in some cases. “I had an experience with one organisation where a recruitment agent phoned up one of my staff to offer him a job in my team,” recalls Rose. 
    Not that companies themselves fare any better when it comes to recruiting. With HR departments bringing recruitment in-house, the risk that requirements for cybersecurity jobs get lost in translation has risen. When the GDPR came into force in 2018, recalls Gary Hibberd, a consultant with the Cyberfort Group, “you had recruiters asking for people who had GDPR experience of five years or more.”
    Then there are those companies that know exactly what they want from applicants and will not compromise on getting it. This is a symptom of increased specialisation in cybersecurity generally, explains Nash Squared’s global CISO Jim Tiller, but it also leads to unrealistic job advertisements. Unless you’re a massive organisation with money to burn, says Tiller, “it’s hard to hire a team that just does threat hunting.” 
    This also points toward a wider ‘expectations gap’ in cybersecurity recruitment, says Hibberd, which assumes that those applicants who have the necessary qualifications but not the experience, and vice-versa, are unsuitable. “There are a lot of people out there who have the requisite skills,” he says. “They may be 20-year-olds, they may be 17-year-olds, they may be 25, they may be 45, but they’ve got the skills. What they may lack is experience.”
    By prioritising experience over expertise, argues Hibberd, companies risk missing out on recruiting truly talented individuals. “There’s hundreds of thousands of people who are developing skills in their own time,” he says, “but maybe lack the experience of working with an organisation or with a client to actually [use them.]”
    In-house training opportunities are also uneven, explains Tiller. In his experience, most cybersecurity tools “are not fully implemented,” he says. “They may be only leveraging 2%, or 3%, or even 20% of the feature capabilities.”
    This contributes toward an overall impression that such roles consist of little more than putting out fires. This negative impression of cybersecurity poses an existential threat to the profession, argues Rose. Computer scientists fresh out of university, after all, seem more likely to pursue more creative developer jobs if they think a career in cyber defence consists of playing whack-a-mole against hackers and little else. Ultimately, argues Rose, “they don’t see it as a thing that needs attention and support, and a big career option.”
    Where does this leave businesses? One thing hiring managers can do is broaden their definition of who suits a cybersecurity role, explains Tiller. “You need to think of similar skillsets that play into a specialist area,” he says. “Maybe somebody who does threat hunting would maybe also be interested in monitoring, forensics, or incident response.” 
    Businesses should also be open to hiring from a more diverse pool of candidates. One recent survey indicated that 70% and 61% of organisations have experienced difficulties in recruiting women and minorities respectively. Companies should also accommodate more neurodiverse candidates, says Hibberd.
    Raw enthusiasm should also count for more, he adds: “I want to hire that person who says to me, ‘Oh, I take computers apart, I like to learn how they work,’ you know? ‘I built my own lab at home,’ [or] ‘I go on hack-me websites and various other places, and I play.’”
    Once they’re hired, says Rose, businesses also need to work much harder at convincing new staff that it’s worthwhile staying. That doesn’t just involve regular reviews of salaries, but investing where possible in the latest software and in-house training, while ensuring that members of the cybersecurity team know there’s a path to promotion within the firm.
    Ultimately, says Rose, it comes down to building a corporate culture where new arrivals “feel part of a wider family, so they can actually feel like…they’re working as a real team, and they feel like they’re effective.”
    That’s easier said than done for many organisations, acknowledges Rose. Inevitably, firms with larger recruitment budgets will pull in a higher quality of talent. “You’ll find that the recruitment crisis at a charity will be a lot worse than the recruitment crisis at a top bank,” he says, which itself speaks to the increasingly shallow pool of talent that’s available.
    “What we really need is more people in the industry,” says Rose. “And that’s something we’ve been talking about for years and years, and we just don’t see that coming through.”
    There are signs, however, that that is beginning to change. The UK government, for example, is investing more in digital upskilling across the board, while “more and more universities [are] offering undergraduate security courses,” says Nurse.
    Big Tech is also pitching in. IBM has pledged to enhance cybersecurity skills training in its plan to digitally upskill some 30 million people worldwide by the end of 2030, while Microsoft has recently pledged to expand its existing cybersecurity skills partnerships with US community colleges to 23 additional countries.
    That effort also involves boosting the diversity of those applying for cybersecurity courses. “In the countries where we’re actually expanding the initiative, on average only about 17% of the workforce is female,” says Kate Behncken, vice-president and lead of Microsoft Philanthropies. “Leaving women out of the cybersecurity workforce leaves talent on the table and will only hurt our ability to close the skills gap.”
    Training takes time, however, and with millions of vacancies to fill, the demand for external cybersecurity consultants is only growing, with the UK’s cybersecurity sector reporting a 14% rise in revenues in 2021.
    Automation in cybersecurity may also advance as a result of the crisis, adds Rose, although most IT departments currently don’t have the time or the energy to even begin thinking how they can do it themselves. “They’re too busy fishing people out of the river to go and figure out who’s throwing the people in the river a bit further up,” he says.
    Ian, meanwhile, is still trying to find a way to break in. He was recently hired as a network manager at another educational institution, and hopes that the role will give him more time to pursue his studies. Even so, he remains jaded at the lack of mentorship opportunities for individuals seeking to transition into cybersecurity from other professions.
    What would make his life easier, and thousands of others like him, explains Ian, are more apprenticeship schemes – courses that would allow him to showcase his passion for solving cybersecurity problems more than a CV ever could. 
    “I’m a learn-on-the-job person,” he says. “Show me once, let me do it once, let me ask questions, and I’m good. That’s my theory. That’s how I learn.”

    source

  • 5 Online Cybersecurity courses for free at U.S universities – Nairametrics

    Many American institutions provide free online courses which anyone, including non-students, can access if they want to venture in the cybersecurity field without investing too much time or money. There are also courses that will not cost an arm and a leg.
    The democratisination of these courses has to do with the yawning gap in cybersecurity skills and talents in the United States and around the world. It is not just a talent shortage issue, but also a major concern for executive leaders around the world.
    This is because, according to a recent report, 80% of organizations worldwide have experienced one or more data breaches in the last year which can be attributed to a lack of cybersecurity skills and/or awareness.
    In fact, a 2021 analysis from Accenture indicates that the number of attacks each year increased by 31% to 270 between 2020 and 2021. There were 29 successful attacks on average per organization.
    According to a 2022 research from Cybersecurity Ventures, the number of unfilled cybersecurity positions has increased by 350% from 1 million to 3.5 million since 2013. This booming cybersecurity field offers a variety of entry points, including a master’s degree program, employer-sponsored training programs, and certification programs.
    Some of the free and paid courses are listed below:
    This Network and Security Foundations course covers the elements of computer networks and the fundamental security principles related to networks. The course is recognized by Fortune as one of the top online master’s programs in cybersecurity in the United States.
    This introductory-level course also introduces students to network security, threat, risk mitigation, and security management concepts and practices.  The course instructors are Gerri Light, program chair of WGU’s College of IT, and Michelle Watt, a WGU instructor.
    Over the course of eight weeks, the self-paced course can be finished in as little as 10 hours each week. For $166.08, WGU also provides an unlimited-access version of the course that enables students to continue using the materials even after the course has ended. Students can also finish the course for free with just temporary access to the materials.
    This four-week online course offered by New York University will train you on cybersecurity risks, vulnerabilities, and threats.
    The courses are: Basic security frameworks and risk analysis in relation to cybersecurity and Introduction to Cyber attacks. The next session this year will be led by Edward G. Amoroso, a professor and researcher at NYU’s Tandon School of Engineering. Amoroso founded and serves as the CEO of the cybersecurity advising and consultancy firm TAG Cyber.
    Cryptography aids in the secure communication of only the sender and the intended recipient. In other words, this critical cybersecurity measure aids in the prevention of adversary interference. Students learn the inner workings of cryptographic systems and how to use them in practice.
    Participants in this Stanford University-hosted course will also have the opportunity to work on field practice problems. The course takes approximately 23 hours to complete over a seven-week period and has flexible assignment deadlines.
    Cryptography I is taught by professor Dan Boneh of Cryptography and Electrical Engineering at Stanford university.
    This course offered in 10 weeks introduces students to Internet History, Technology and Security. The course is taught by Charles Russel Severance who will teach on web security and encrypting to protect data. He will also cover an overview of the impact of technology in culture and society and network technology and internet commercialization.
    The University of Maryland’s online cybersecurity concentration program includes a course on hardware security that covers the basics of cybersecurity, as well as cryptography. The course is a 12-hour course which runs for over seven weeks.
    The course enables students to have an understanding of digital system design flow vulnerabilities and physical attacks on these systems.

    Interested in the course
    I want to be part of this online program
    I want to be a part of this online program
    I’m interested in the online cybersecurity course
    I’m interested in the online cyber security course
    I really want to be part of the online program.
    Hello, good piece you highlighted. According to your write up, does it mean the second to the fifth universities run free courses right? Thank you.
    How can one appy for the program?
    I’m interested in the free cyber security knowledge acquisition programs
    I am interested
    How do I apply..
    I want to be part of the cyber security training program.
    Am interested, how can I apply for the program
    No link to the course?
    Am interested in the online class from Nigeria
    I’m interested in the course
    I am interested how do i apply
    Am interested in recruitment of 2022 Npower program
    We are interested in the free program. However, no application links attached to the announcement.
    How do I apply please.
    I’m interested please
    I like challenges of this nature. I will like to be a nightmare to Cyber criminals.
    I am interested in the online cyber security course, how can I apply?
    How do I apply for the courses coz I’m very much interested in taking them.
    Am interested
    Please I’m interested
    I’m interested. How do I go about it?
    I’m Interested in the cyber security course. What is the way out
    How do I apply for the course I am interested
    I’m interested
    Please how do I apply
    I am Interested in the online cyber security force How can apply for this?









    Business News | Stock Market | Money Market | Cryptos | Financial Literacy | SME |
    Follow us on social media:
    © 2023 Nairametrics
    © 2023 Nairametrics

    source

  • Cybersecurity courses to watch out for in the year 2023 – India Today

    By India Today Web Desk:
    It might be a bit of an understatement to say that cybersecurity is a constantly evolving field. Cybersecurity professionals have to stay abreast of new developments constantly, and it’s one of the few jobs that’s practically guaranteed to never get dull.
    If you’re looking to launch a career in this exciting and lucrative field or to learn a new skill , then it can be hard to know where to start. In this era of advanced technology , there are many online ways to pursue the course without any hassle. Top institutes and colleges are offering the best cybersecurity courses in partnership with edtech platforms to help the learners upskill and to excel in the industry.
    IIT Roorkee recently launched the 4th batch of the Advanced Certification Programme in Cybersecurity along with Imarticus Learning. This 6-month online programme commencing on October 1st, 2022 is designed in collaboration with CEC, IIT Roorkee and industry stalwarts, and intends to offer the best learning outcome for aspiring Cybersecurity professionals.
    Overall, the programme will cover multiple cyber security processes and tools ranging from ethical hacking to incident handling. The participant will also get a chance to join in a 3-day campus immersion module and visit IIT Roorkee, which will provide them with valuable professional networking opportunities.
    This 6-month online programme provides a high-engagement learning experience with real-world applications and is designed for individuals who want to start a new, more fulfilling career. It will help you develop expertise in defensive cybersecurity, application security, malware analysis, ethical hacking, etc.
    In partnership with IIIT Bangalore and NPCI, the CyberSecurity program provides you with a deep understanding needed to spot the opportunities for disruption in the cybersecurity industry.

    IIT Kanpur, in association with TalentSprint has designed an Advanced Certification Programme in Cyber Security and Cyber Defence for current and aspiring professionals who are keen to explore and exploit the latest trends in Cyber Security Technologies.
    A combination of deep academic rigour and intense practical approach will allow participants to master in-demand skills and build world-class expertise.

    This online programme in Advance Cyber Defence is a blended training provided by top IIT faculty and Israeli experts. The module is a 6 months, 480 hours course with 1 year extended access to Israeli labs with cyber attack and defence simulated projects, open to all graduates with strong passion for a career in cyber security.

    The course provides 100% placement support in most challenging projects with top employers and 50% training on hands on personalised cloud based live labs.

    This advanced certification programme aims at helping you gain expertise and knowledge in Cyber Security. The IIT Guwahati faculty will help you cover all the required Cyber Security skills such as cryptography, ethical hacking, application security, etc.
    Also, you will get to master tools such as Linux, SQL, Nikto, and Microsoft Baseline, among others.

    E&ICT, IIT Guwahati is an initiative of MeitY (Ministry of Electronics and Information Technology, Govt. of India) and formed with the team of IIT Guwahati professors to provide high quality education programmes.

    Add IndiaToday to Home Screen

    source

  • ChatGPT: A New Wave of Cybersecurity Concerns? – Infosecurity Magazine

    As 2022 ended, OpenAI made ChatGPT live to the world. It is an artificially intelligent research and deployment chatbot that interacts through text using realistic human responses. Its deep learning techniques can generate conversations that convince anyone they are interacting with an actual human. 
    Like opening the jar and releasing the genie, its impact is relatively unknown, but grave intrigue and curiosity surrounded it. How will it be used; how does it work; is it for good or evil? No, this is not the next Terminator sequel…
    Its intentions are certainly for positive use, and its articulate responses have led many to claim it as the best chatbot to be released. However, in a short period, ChatGPT has already been linked to cyber threats as cyber-criminals leverage its advanced capabilities for nefarious means. 
    How is this possible, you ask? Well, for starters, it is entirely possible to use an AI chatbot to create a completed infection chain that starts with a spear phishing email and uses convincing human language to dupe a victim into having their systems infected. 
    Security vendors have even explored this by creating phishing emails on ChatGPT and the results were worryingly accurate. For instance, CheckPoint created a phishing email with an attached Excel document containing malicious code that downloads a reverse shell to the victim’s system. 
    This is deeply concerning as the threshold and knowledge to create such a threat have been removed with AI. Of course, there is already phishing-as-a-service (PhaaS) and ransomware-as-a-service (RaaS) that provide tool kits for a fee that enable threat actors to carry out such attacks. However, we are seeing another evolution of cyber-criminal activity because many dangers can sprout from this genius creation, which is free and open to the public.
    Some of the most obvious threats that come to mind involving ChatGPT include the following:
    These are just some possible ways cyber-criminals can leverage ChatGPT, and as the technology advances, more will likely become prevalent. Therefore, organizations and the wider workforce must remain vigilant and become aware of these possible risks. 
    Unfortunately, the phishing messages created by ChatGPT are so convincing that it is significantly better at creating them than those that initially wrote them. The language and designs are of higher quality, especially when you consider many phishing campaigns are created by actors who are not proficient in American/British English.   
    Yes, it will likely become harder to spot these threats, but that doesn’t mean we can’t do it. We absolutely can, and tools are being tested that can detect ChatGPT’s written text. 
    Cybersecurity defenses will meet this test head-on like it always has. 
    From a human security perspective, organizations can take mitigating steps to provide individuals/the workforce with new-school cyber-awareness training to arm them with the knowledge of identifying a social engineering attack. We can then look to security technology to effectively remediate the threat.
    There would always be a host of new world opportunities and possibilities presented as AI was explored and increasingly provided to the masses. However, with reward also comes risk, and the cybersecurity industry must remain alert to the possible threats that will likely manifest from the wide adoption of technologies like ChatGPT. 

    source

  • Microsoft Confirms Server Misconfiguration Led to 65,000+ Companies' Data Leak – The Hacker News

    Microsoft this week confirmed that it inadvertently exposed information related to thousands of customers following a security lapse that left an endpoint publicly accessible over the internet sans any authentication.
    “This misconfiguration resulted in the potential for unauthenticated access to some business transaction data corresponding to interactions between Microsoft and prospective customers, such as the planning or potential implementation and provisioning of Microsoft services,” Microsoft said in an alert.
    Microsoft also emphasized that the B2B leak was “caused by an unintentional misconfiguration on an endpoint that is not in use across the Microsoft ecosystem and was not the result of a security vulnerability.”
    The misconfiguration of the Azure Blob Storage was spotted on September 24, 2022, by cybersecurity company SOCRadar, which termed the leak BlueBleed. Microsoft said it’s in the process of directly notifying impacted customers.
    The Windows maker did not reveal the scale of the data leak, but according to SOCRadar, it affects more than 65,000 entities in 111 countries. The exposure amounts to 2.4 terabytes of data that consists of invoices, product orders, signed customer documents, partner ecosystem details, among others.
    “The exposed data include files dated from 2017 to August 2022,” SOCRadar said.
    Microsoft, however, has disputed the extent of the issue, stating the data included names, email addresses, email content, company name, and phone numbers, and attached files relating to business “between a customer and Microsoft or an authorized Microsoft partner.”
    It also claimed in its disclosure that the threat intel company “greatly exaggerated” the scope of the problem as the data set contains “duplicate information, with multiple references to the same emails, projects, and users.”
    On top of that, Redmond expressed its disappointment over SOCRadar’s decision to release a public search tool that it said exposes customers to unnecessary security risks.
    SOCRadar, in a follow-up post on Thursday, likened the BlueBleed search engine to data breach notification service “Have I Been Pwned,” describing it as a way for organizations to search if their data was exposed in a cloud data leak.
    The cybersecurity vendor also said it has temporarily suspended all BlueBleed queries in the Threat Hunting module it offers to its customers as of October 19, 2022, following Microsoft’s request.
    “Microsoft being unable (read: refusing) to tell customers what data was taken and apparently not notifying regulators – a legal requirement – has the hallmarks of a major botched response,” security researcher Kevin Beaumont tweeted. “I hope it isn’t.”
    Beaumont further said the Microsoft bucket “has been publicly indexed for months” by services like Grayhat Warfare and that “it’s even in search engines.”
    There is no evidence that the information was improperly accessed by threat actors prior to the disclosure, but such leaks could be exploited for malicious purposes such as extortion, social engineering attacks, or a quick profit.
    “While some of the data that may have been accessed seems trivial, if SOCRadar is correct in what was exposed, it could include some sensitive information about the infrastructure and network configuration of potential customers,” Erich Kron, security awareness advocate at KnowBe4, told The Hacker News in an email.
    “This information could be valuable to potential attackers who may be looking for vulnerabilities within one of these organizations’ networks.”
    Sign up for free and start receiving your daily dose of cybersecurity news, insights and tips.

    source

  • Embark on a Cybersecurity Career with the Top Three Free Online Cybersecurity Courses – CISO Mag

    Free online cybersecurity courses are a great place to start your learning journey if you’re considering a career in this field. Enrolling in a cybersecurity course will build a strong foundational base, and you will gain highly advanced technical skills.
    With the unprecedented rise in data breaches and theft, cybersecurity has become one of the top priorities for organizations and governments. Cyberattacks can cost companies millions and even disrupt economies and business operations. With these incredibly high stakes, the demand for skilled security professionals is increasing every day.
    The growing intensity and sophistication of the threat landscape has forced companies to spend a fortune on strengthening their defenses. According to a Markets and Markets report, the cybersecurity market is estimated to rise from USD 240.27 billion in 2022 to USD 345.38 billion by 2026 (Markets and Markets). EC-Council’s Essential Series offers free online cybersecurity courses to help cybersecurity aspirants break into this field and prepare them for real-world industry challenges.
    This blog explores how the top 3 free online cybersecurity courses offered as a part of the Essentials Series by EC-Council can help kickstart your cybersecurity career.
    The Ethical Hacking Essentials (E|HE), Digital Forensics Essentials (D|FE), and Network Defense Essentials (N|DE) teach students a range of baseline cybersecurity skills across industry verticals; this essential knowledge includes ethical hacking, penetration testing, conducting forensic investigations, data security, threats and vulnerabilities, web application attacks, IoT and OT attacks, information security, and more.
    These foundational courses contain detailed manuals, expert videos, and lab tutorials. Each Essentials Series course includes 12 modules with learning exercises and lab ranges (optional add-on) that provide practical, hands-on experience to help you gain proficiency in network defense, ethical hacking, and digital forensics. The series prepares students for entry-level job roles such as a cybersecurity technician. The Essentials Series courses include:
    Industry experts have designed EC-Council’s Essential Series with the goal of training students in the best industry practices, tools, and methodologies to enable them to defeat threat actors from a theoretical and tactical perspective. This initiative includes three free online cybersecurity courses with certifications to educate learners in network security, digital forensics, and ethical hacking.
    The curriculum offers an unbiased learning approach and exposure to industry standards. The courses are tailored for IT and early-career professionals and cybersecurity enthusiasts looking to build their skills and get first-hand experience using the technologies and techniques of the trade. Students can expect to receive industry-recognized certifications with each course.
    Network Defense Essentials (N|DE) provides a holistic view of network defense and information security concepts. The interactive labs will enable you to gain foundational knowledge in cybersecurity and core competency in defending networks and investigating them.
    Wireshark, AWS, Miradore MDM, HashCalc, Docker Bench for security, MD5 calculator, VeraCrypt, HashMyFiles, and Data Recovery Wizard.
    Boost your resume by gaining expertise in digital forensics fundamentals and the digital forensics investigation process. Digital Forensics Essentials (D|FE) will enhance your knowledge base, and the add-on labs will prepare you for industry-ready jobs.
    Linux, Windows, Wireshark, Sleuth Kit, TOR browser, Splunk, ESEDatabaseView
    Gain a comprehensive understanding of ethical hacking and penetration testing fundamentals with Ethical Hacking Essentials (E|HE). Master fundamental ethical hacking concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, and cloud computing.
    Netcraft, L0phtCrack, Web Application Security Scanners, ARP Spoofing Detection Tools, and SQL Injection Detection Tools
    The Essentials Series is EC-Council’s massive open online course (MOOCs) initiative to fill the cybersecurity skills gap for entry-level job roles. The series aims to train tomorrow’s cybersecurity workforce and equip them with industry-relevant knowledge. These self-paced, free online cybersecurity courses teach students the latest security standards and how to apply best practices while remaining up to date on changes and trends in the field. With the Essentials Series, you will develop the skills you need for a successful cybersecurity career. Everyone is welcome—there are no eligibility criteria to enroll in the Essentials Series.
    MarketsandMarkets. (2021, June 21). Cybersecurity market by component (software, hardware, and services), software (IAM, encryption, APT, firewall), security type, deployment mode, organization size, vertical, and region (2022 – 2026). https://www.marketsandmarkets.com/Market-Reports/cyber-security-market-505.html

    source

  • Looking to use your cyber powers for good? CISA is seeking cyber … – CISA

    An official website of the United States government
    Here’s how you know
    Official websites use .gov
    A .gov website belongs to an official government organization in the United States.
    Secure .gov websites use HTTPS
    A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
    Search
    By: Matt Hartman, Deputy Executive Assistant Director for Cybersecurity and Infrastructure Security Agency (CISA)
    Got tech skills? Talent? Motivation? How about a desire to use those skills for good? If so, then Cybersecurity and Infrastructure Security Agency (CISA) is looking for you. We have nearly 150 open cybersecurity positions that we need to fill fast so we can meet the equally fast-evolving range of cybersecurity threats to our nation.  
     
    If you think this may be “just” another federal job—think again. CISA isn’t your typical agency. We do things differently here. We like pushing boundaries smartly and using imagination and innovation to get things done. We have a culture that not only embraces—but actively seeks—diversity. (Looking at you, ethical hackers and people of all backgrounds).  Whether you’re just entering the workforce or have decades of experience, we have vacancies at all levels. 
      
    Sound Like You? Then Let’s Meet Up! 
    On June 29, 2022, CISA will host a virtual Cyber Hiring event from 11 a.m. to 4 p.m.  The event will provide an opportunity for qualified applicants to interview with CISA hiring managers on the spot for more than 150 CISA cybersecurity positions.      
     
    Are these positions competitive? Heck yeah-We have already received more than 1,000 resumes that we are pre-screening prior to the event to help match applicants for vacant cyber positions across our workforce.  
      
    We offer a diverse set of career prospects, from ethical hackers, who are engaged in penetration testing or “red team” activities, to malware analysts, who study the functionality and potential origins of malware samples. We also have jobs focused on cybersecurity operational planning, partnerships, and program management. A job at CISA means that you would be working at the forefront of the cybersecurity challenges facing our nation and be able to collaborate with other US Government agencies, state and local government organizations, private industry, and top-tier researchers. 
      
    At the event, jobseekers can speak with hiring managers and Office of the Chief Human Capital Officer (OCHCO) representatives in division-specific virtual booths, learn about our inclusive culture at CISA, and acquire additional knowledge and understanding about opportunities at the agency. Or come chat with me at the CSD Information Booth, where I’ll be for the duration of the event meeting interested applicants and directing them to hiring managers based on their skills and interests. Rumor has it CISA Jen may stop by, too. 
     
    Applicants can participate online through CISA’s portal at: https://app.brazenconnect.com/events/A3nJDHw 
      
    For more information about the event, please visit: https://www.cisa.gov/hiring
     
    Heard Rumors About the Federal Hiring? We’ve Beat that System, Too. 
    Let’s be real – federal hiring can be a drag, the result of interaction of multiple human resources processes and rules.  BUT there is great news on this front for positions in cybersecurity. Specific to this event, we’ve already begun qualifying candidates to reduce the timeframe to job offers. We’d like to have 100+ offers out within two weeks of the 6/29 event. 
    Additionally, last summer the Department of Homeland Security, CISA, and our interagency partners, started rolling out an innovative new approach to hiring and retaining top cyber talent, using a new federal personnel system called the DHS Cybersecurity Talent Management System (CTMS).   
      
    CTMS is designed to be agile and adaptable, with a variety of hiring and compensation flexibilities intended to enable DHS to compete in the cybersecurity labor market. It is also intended to address recruitment and retention challenges comprehensively.  With CTMS, we expect DHS will be able to streamline hiring, improve the quality of hires, and improve the competitiveness of compensation packages—while ensuring legal defensibility.    
     
    We (the Nation) have a problem: About a 500,000+ person gap in the cyber talent pool. 
    Today there are hundreds of thousands more vacancies than people with the right skills. CISA is working to address this broader issue by promoting cyber education for K-12 and higher education students, so we can grow our pipeline of future talent.  
     
    CISA is also committed to diversity in cybersecurity. The agency has set a goal of 50% women in the cyber workforce by 2030. We work with organizations that represent underserved communities, HBCUs, and others to raise interest and build capability in the cybersecurity field.  These are just a few examples of our commitment to diversity and to working with others to solve a critical national need. 
     
    To be the cyber defense agency that the nation deserves, it’s critical that we bring qualified, excited people into CISA that bring the right skills. We need cyber professionals who can work in a fast-pace environment to solve the most pressing and complex problems in our cyber threat landscape. 
      
    Not to brag, but we’re a pretty awesome place to work, too.   
    Flexible schedules. Cyber Pay. Generous benefit packages. Telework or remote work. A cool mission. Yup, we pretty much have it all.  
    The bottom line – A career at CISA will give you a rewarding work/life balance that includes working with great people on challenging projects all aimed at securing our nation’s cyber landscape. If you like puzzles, if you like to solve problems, if you like working in an inclusive culture with diverse teams to solve crazy challenges—then check us out at our hiring fair next Wednesday, June 29.     
     
    Applicants can participate online through CISA’s portal at https://app.brazenconnect.com/events/A3nJDHw. For more information about the event, please visit: https://www.cisa.gov/hiring 

    source

  • Twitter's mushrooming data breach crisis could prove costly – CSO Online

    By
    CSO |
    Since Elon Musk purchased Twitter in late October, non-stop turmoil and controversy have dogged the company, from massive staff firings and resignations to reputational damage from Musk’s careless and often bizarre tweets. Now, mushrooming concern around a possible data breach stemming from a now-fixed Twitter flaw is poised to drive the company further down unless Twitter takes quick action.
    Even as regulators in Europe begin to probe what appears to be a massive Twitter data breach, Twitter and Elon Musk have failed to comment publicly on the true extent of the breach. Experts say that unless Twitter gets ahead of the curve, informs regulators of the facts, and notifies users of how much of their public and private information has been exposed, the company could suffer serious financial and operating consequences.
    In keeping with the nature of dark web data merchants, the picture surrounding Twitter’s data breach is murky. This latest headache for the company began in July when an actor known as “devil” put up for sale on a breached data forum a database of phone numbers and email addresses belonging to 5.4 million Twitter accounts. Devil demanded payment of $30,000 for the data and claimed to have swiped it via a vulnerability disclosed to Twitter on January 1, 2022. Twitter fixed the flaw on January 13, 2022.
    The vulnerability affected Android users and allowed anyone without authentication to obtain a Twitter ID for any user by submitting a phone number or email handle, even if the user prohibited this action in the privacy setting. About a month after devil’s posting, Twitter confirmed that a bad actor had taken advantage of the vulnerability and said it would send out notices to account owners affected by the breach.
    The data containing the 5.4 million users’ data was released for free on November 27, 2022. However, another database allegedly containing details on 17 million users was also circulating privately in November.
    Then, in late December, Alon Gal, the co-founder and CTO of Israeli cybercrime intelligence company Hudson Rock spotted on a criminal data breach forum a posting by a user called “Ryushi” offering to sell the emails and phone numbers of 400 million Twitter users. After another threat actor released a massive database related to 235 million Twitter users for free, Gal said that the initial figure of 400 million users included duplicates. However, the breach was still one of the “most significant” he’d ever seen.
    Gal said that two different threat actors corroborated the 235 million figure. He also said the database likely contains the email addresses and public information of Twitter users but not their phone numbers, although a database of phone numbers of an unknown number of Twitter users likely exists.
    Troy Hunt, who runs the data breach reporting site HaveIBeenPwned, says he found 211.5 million unique email addresses in the leaked database. Possibly yet another threat actor released a data set consisting of 200 million Twitter profiles on the Breached hacking forum for eight credits of the forum’s currency, worth approximately $2.
    During the year-end holidays and shortly after the New Year, the Twitter accounts of high-profile celebrities in the UK, India, and Australia were hacked. Among the hacked profiles were TV commentator Piers Morgan, UK education secretary Gillian Keegan, Northern Ireland secretary Chris Heaton-Harris, singer Ed Sheeran, and Indian TV star Salman Khan.
    Although it’s possible these hacks were unrelated to the sample files released by Ryushi, Gal thinks they’re connected. “This is likely not a coincidence: The reveal of the email address may have been just what the hacker needed to find passwords for the account, or social engineer his way,” Gal said in a tweet.
    As conflicting reports about the Twitter breach continue to mount, cybersecurity experts call on Musk to clear up the confusion. Cybersecurity journalist Brian Krebs said in a tweet, “Hey @elonmusk , since you don’t seem to have much of a media/comms team anymore, can you address the apparently legitimate claim that someone scraped and is now selling data on hundreds of millions of Twitter accounts? Maybe it didn’t happen on your watch, but you owe Twitter a reply.”
    Gal tells CSO, “Twitter failed to acknowledge this breach, and it is a shame. They should acknowledge it as soon as possible, so users are alert to the risks they are now facing. I urge Twitter users to change passwords and be suspicious of phishing attempts and for Twitter to acknowledge this breach as soon as possible.”
    Douglas J. McNamara, Partner in Cohen Milstein’s Consumer Protection practice, tells CSO he assumes that Twitter has “engaged and looked at some of this. But they may not be doing it publicly, and they may not want to share this publicly.” But as far as the law in the US is concerned, “it’s kind of fuzzy,” McNamara says, given the differences in state laws surrounding breach notifications. “You would have to see who is in there, what PII [personally identifiable information] is in there. Is it the kind of PII that would trigger a reporting requirement [under typical risk of harm analysis required by state data breach notification laws]?”
    Moreover, at this point, “It really isn’t clear if this was a couple of different breaches, or if this was somebody using scripts to pull this information and add it to what was out there by mixing and matching or if somebody bought different things on the dark web and put them together. It’s just not clear,” McNamara says. “To say this is squishy is an understatement.”
    But he says from a good corporate governance perspective, Twitter would be in a better position if it came clean. “If I cared about my customers, the first thing I would do is check to see if it was legit or not and then assuage their concerns.” It does not matter if the data breach preceded Musk’s tenure as Twitter owner, he still must deal with the breach responsibly. “He bought the company. He bought the liability,” says McNamara.
    Even if Twitter were to take comfort in the currently squishy nature of the data breach under US state laws, European regulations might be able to inflict the most damage on Twitter. European authorities have a wider range of factors to analyze in determining whether and the degree to which Twitter faces liability related to the breach. 
    On December 23, 2022, even before news hit that potentially hundreds of millions of Twitter users’ data might have been breached, the Irish Data Protection Commission (DPC) launched a probe into the initial incident involving 5.4 million Twitter users. The DPC said Twitter had furnished several responses to its queries and believes the company may have violated one or more of the EU’s General Data Protection Regulation (GDPR) provisions.
    Amy Worley, managing director and associate general counsel at Berkeley Research, tells CSO that “The GDPR has very strict data breach reporting requirements. It also has a very broad definition of what is a data breach. So, it’s much broader than what exists under most of the US statutes.”
    Worley says that “the GDPR is not limited to economic harms the way US laws have been interpreted. So, privacy is a fundamental right in the EU, and it is tied to the rights and freedoms of data subjects.”
    Under the GDPR, companies have 72 hours to report a data breach and must report significant changes in their assessments of how many users have been affected. “If they think a company is just ignoring or flouting the law, then the company is likely to get into trouble for that,” Worley says. Fines under the GDPR can reach up to 4% of the company’s global revenue, although that fine level is rare.
    Perhaps what should be even more concerning to Twitter is that the European Union could force Twitter to effectively shut down operations in Europe if evidence of an egregious violation emerges. “The European Union can also revoke their ability to process European resident data,” says Worley. “They also have the ability to stop international internet data transfers. And they have the ability to say, ‘You’re not permitted to process the personal data of European residents.’”
    Her advice to Twitter or any organization in similar circumstances is: “Understand what happened as quickly as possible. Then really be mindful of that analysis. Is this reasonably likely to impact the rights and freedoms of the data subject? Understand the fulsome way that the EU interprets that. It is not just economic harm.”
    Copyright © 2023 IDG Communications, Inc.
    Copyright © 2023 IDG Communications, Inc.

    source