Aggregator
Rockwell Automation Devices Flaw Let Hackers Gain Unauthorized Access
A critical security vulnerability in Rockwell Automation’s ControlLogix and GuardLogix controllers has been discovered. This vulnerability could potentially allow attackers to bypass security measures and gain unauthorized access to industrial control systems. Researchers at Claroty’s Team82 uncovered the flaw, which is identified as CVE-2024-6242. It affected various models of Rockwell’s 1756 ControlLogix devices. The vulnerability, […]
The post Rockwell Automation Devices Flaw Let Hackers Gain Unauthorized Access appeared first on Cyber Security News.
攻击者正滥用 Cloudflare 隧道传播恶意软件并逃避检测
Strategies for Mitigating LLM Risks in Cybersecurity
LLMs are different from other tools and different approaches are required to mitigate their risks involving new security technologies.
The post Strategies for Mitigating LLM Risks in Cybersecurity appeared first on Security Boulevard.
Maximizing Disk Imaging Speeds
俄 APT 组织利用虚假汽车销售广告传播 HeadLace 后门
Leaked Wallpaper Vulnerability Exposes Windows Users to Privilege Escalation Attacks
A newly discovered vulnerability in Windows File Explorer has raised alarms within the cybersecurity community. Identified as CVE-2024-38100, this security flaw allows attackers to escalate privileges by exploiting a seemingly innocuous wallpaper feature. CVE-2024-38100 – Windows File Explorer Elevation of Privilege Vulnerability Released on July 9, 2024, CVE-2024-38100 is a critical vulnerability that Microsoft has […]
The post Leaked Wallpaper Vulnerability Exposes Windows Users to Privilege Escalation Attacks appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
DNSSEC+ – Secure Model That Addresses Security And Downsides Of DNSSEC
The communication between DNS recursive resolvers and authoritative nameservers is largely unsecured, making it susceptible to on-path and off-path attacks. Though many security proposals have been put forward, they often face implementation challenges or lack adequate security features. This persistent vulnerability reveals the need for a new, widely deployable secure scheme that will overcome the […]
The post DNSSEC+ – Secure Model That Addresses Security And Downsides Of DNSSEC appeared first on Cyber Security News.
4.6 Million Voter Database & Election Documents Exposed Online
Cybersecurity researcher Jeremiah Fowler discovered and reported to VpnMentor about 13 non-password-protected databases containing 4.6 million documents, including sensitive voter records and election-related documents. This breach raises significant concerns about data protection and the security of election systems in the United States. Discovery of the Breach Jeremiah Fowler’s investigation began when he stumbled upon a […]
The post 4.6 Million Voter Database & Election Documents Exposed Online appeared first on Cyber Security News.
Threat Actor Groups Using Leaked Ransomware Variants To Launch Attacks
Ransomware operators often acquire malware through purchases on the dark web, group affiliations, and leaked source codes rather than developing themselves. They target victims by using common tools and modified samples to propagate attacks. Recent reports by the security analysts at Kaspersky Lab suggest that new emerging groups like SEXi utilize different leaked ransomware variants, […]
The post Threat Actor Groups Using Leaked Ransomware Variants To Launch Attacks appeared first on Cyber Security News.
Effective Third-Party Risk Management Under PCI DSS 4.0
The Payment Card Industry Data Security Standard (PCI DSS) aims to improve credit, debit and cash card transaction security and protect cardholders from breaches of their personal information.
The post Effective Third-Party Risk Management Under PCI DSS 4.0 appeared first on Security Boulevard.
产学研集聚ISC人工智能安全趋势发展论坛,共探大模型安全生态
8月1日,由360集团AI安全实验室、中国科大网络空间安全学院主办的人工智能安全趋势发展论坛在京圆满落幕。本次论坛汇聚了人工智能领域政府、学术界、产业界的代表和优秀专家学者,就人工智能安全挑战、最新研究成果及最佳实践进行深入交流,共同推动形成行业共识与标准,推动人工智能安全技术的创新与发展。
图 ISC人工智能安全趋势发展论坛现场
大模型已成为数智化系统的关键基础设施,其潜在的主体地位和应用广度,也带来了新的安全风险和安全挑战。360集团智脑总裁张向征在致辞指出,人工智能安全与发展的平衡,不仅需要法律法规的约束,更需要行业内各方力量共同推动和构建人工智能安全生态。会上,360作为数字安全领军企业,基于“安全、向善、可信、可控”安全四原则构建了系统化的大模型安全解决方案,通过技术革新,实现大模型风控效率提升100倍,幻觉比例下降50%,为全球大模型安全赋能;而运用全新技术路线构筑“看见—处置”安全大模型,创新性打造类脑框架,五大中枢可以类比人类大脑实现专家级安全能力,为企业打造7*24小时高级安全专家团队。
图 中国科学技术大学网络空间安全学院执行院长俞能海
中国科学技术大学网络空间安全学院执行院长俞能海教授在报告中指出,人工智能大模型安全问题的研究方兴未艾,有待于广大的学者和行业人士共同努力,为国家提供更多成熟可用的产品,能够真正地服务千行百业。此外,他还在报告中概述了生成式人工智能的发展脉络和安全风险,重点分享了人工智能大模型安全在数据采集与处理、模型训练与测试、内容生成与服务几个关键阶段的最新研究进展。
迈入大模型时代,更大规模的数据以及更强的任务处理能力,也带来了更大的安全与隐私风险。西安交通大学二级教授、副处长沈超认为,大模型能够更安全、可持续的发展,需要去关注大模型在完整性、可靠性方面存在的问题,以及在数据模型应用方面存在的安全隐私挑战。
图 中国信通院人工智能研究所安全部主任石霖
大模型带来生成方式的转变,推动生产领域交互体验革新和效率提升。中国信通院人工智能研究所安全部主任石霖表示,人工智能安全问题涌现,持续放大数字社会风险与挑战,信通院基于已有的安全评估测试等工作基础,设计了大模型价值对齐方法,对开源大模型自身进行安全防护加固,获得了明显的安全性能提升。
图 北京阿莱门科技有限公司CEO徐骅
北京阿莱门科技有限公司CEO、北京大学人工智能安全与治理中心大模型研究员、北大(临港)大模型对齐中心执行主任徐骅指出,AI安全成为大模型广泛应用的关键掣肘因素,价值对齐是AI安全的核心议题,也是大模型应用的最后一公里。为此,阿莱门推出覆盖大模型全生命周期的安全对齐方案,提供全方位的大模型安全对齐平台,提升大模型的安全性和能力。
图 华为可信AI安全解决方案专家唐文
AI创新发展与监管并重,华为可信AI安全解决方案专家唐文认为,安全可信的AI计算平台才能满足市场准入与监管合规的要求。华为可信业界首创“用AI保护AI”,依托昇腾AI算力平台,实现了物理对抗攻击检测和大语言模型(代码)提示注入攻击检测。
论坛最后,各位专家学者围绕政企研的角色定位、数据合规、幻觉现象、安全评测、安全和性能平衡、大模型安全领域的发展趋势等内容进行了圆桌研讨和交流。此次人工智能安全趋势发展论坛的举办,政府、学术界、产业界将共同努力,为构建一个更加稳健、更加透明、更加负责任的人工智能生态系统贡献力量。
产学研集聚ISC人工智能安全趋势发展论坛,共探大模型安全生态
How Strobes Uncover Hidden Cloud Risks Within Your Organization?
The cloud has revolutionized how businesses operate, offering unprecedented agility and scalability. However, this rapid adoption has also introduced a new wave of security challenges. A recent Checkpoint cloud security...
The post How Strobes Uncover Hidden Cloud Risks Within Your Organization? appeared first on Strobes Security.
The post How Strobes Uncover Hidden Cloud Risks Within Your Organization? appeared first on Security Boulevard.
Critical Vulnerability in Digital Video Recorders Exposes 400,000 Devices to Hackers
Multiple digital Video Recorder (DVR) devices have been identified with a critical security vulnerability, leaving over 408,000 units exposed to potential cyber-attacks. The flaw, primarily affecting models such as TVT DVR TD-2104TS-CL, TD-2108TS-HP, Provision-ISR DVR SH-4050A5-5L(MM), and AVISION DVR AV108T, allows unauthorized access to sensitive device information due to insufficient access controls on the devices’ web servers. […]
The post Critical Vulnerability in Digital Video Recorders Exposes 400,000 Devices to Hackers appeared first on Cyber Security News.
Sitting Ducks 攻击,超过 35000 个域名被劫持
ISC.AI 2024:360携手共青团发布数字安全科技人才激励计划
近日,ISC.AI 2024漏洞生态与实战人才发展论坛在北京国家会议中心顺利召开。论坛上,360与中国光华科技基金会共同发布“数字时代青年力量”数字安全科技人才激励计划并开启“时代青年榜样”评选,进一步鼓励青年人才加入网络安全队伍。同时,安全KER社区1.0正式上线,为我国的实战型人才培养与数字安全建设保驾护航。
共建漏洞生态,共育实战人才
漏洞是网络防御的基础,人才是安全发展的基石。中国互联网协会副秘书长裴玮在致辞中表示,必须高度重视网络安全人才的培养,不断提升技术水平和实战能力,这需要政府、企业、学术界和社会各界的共同努力,更需要不断创新人才培养模式、优化人才成长环境、激发人才的创新潜力。
中国互联网协会副秘书长 裴玮
共青团中央直属中国光华科技基金会基金管理部副主任陈诚在致辞中表示,近年来,实战型技术人才的社会价值逐渐凸显。中国光华科技基金会和360集团以“提升青年科技素养”为宗旨,以“数字安全”为关键词,针对青年科技人才和创业者群体,联合开展一系列科技素养培训和创业扶持活动。
共青团中央直属中国光华科技基金会基金管理部副主任 陈诚
数字技术的广泛应用极大地推动了社会经济的进步和转型,但也带来了前所未有的安全挑战。360漏洞云总经理,HackingClub发起人胡晓娜主持本次论坛,她表示,实战攻防对抗的根本是人,安全研究员不仅仅是网络安全的守护者,更是推动行业创新和发展的关键力量。
随后,在“实战型网安人才进阶论”圆桌对话环节,中国信息通信研究院安全研究所安全响应与运行维护部副主任薛涛,国家互联网应急中心运行部严定宇博士,国家信息安全漏洞库战略研究员杨诗雨,去哪儿网安全总监郑宇宁和武汉科锐创始人、《C++反汇编与逆向分析技术揭秘》作者钱林松从宏观政策、企业生态、实战应用等视角对网安人才培养展开讨论。
弘扬数字时代青年力量,人才激励计划发布
当前,实战型技术人才社会价值逐渐凸显,成为国内外各大漏洞平台、企业及社会争相抢夺的资源。为了进一步发掘网络安全人才,让人才的创造活力竞相迸发、聪明才智充分涌流,360集团联合中国光华科技基金会,特设“数字安全科技人才激励计划”项目。
据悉,数字安全科技人才激励计划分为两个部分。首先,成立数字安全科技人才激励计划,对做出贡献的白帽黑客给予肯定和激励,享受激励计划的个人所得部分将获得税收优惠;第二,每三年进行时代青年榜样评选,设置先锋攻坚者、安全戍边者和桃李引路人三大赛道,为优秀青年代表颁发荣誉奖章。论坛上,胡晓娜与陈诚共同启动“数字时代青年力量”数字安全科技人才激励计划及“时代青年榜样”评选。
集结网安人才,安全KER社区1.0上线
在网络安全行业,热情与伙伴是持续前行的动力,数字安全领域的新型实战型人才应当携手共建自己的大本营,共同培育一个充满活力的网络安全生态系统,让知识与经验得以传承。论坛上,360漏洞云高级经理、安全KER负责人TNT介绍并启动上线“网安人才集结新阵地——安全KER社区1.0”。
360漏洞云高级经理、安全KER负责人TNT
TNT介绍,安全KER社区致力于打造数字安全新型实战性人才大本营,面向安全技术爱好者、高校和机构技术人才、企业安全团队和政府机构,提供价值共享、生态互动、思维碰撞和成长扶持的平台。目前,安全KER社区1.0已形成安全资讯、项目中心、漏洞情报、交流社区、安全课程、实战训练六大核心功能。
漏洞安全管理离不开实战人才的培养,本次漏洞生态与实战人才发展论坛的召开,将为网络安全发展注入新的活力,为构建更加安全、智能、高效的发展环境贡献智慧和力量!
ISC.AI 2024:360携手共青团发布数字安全科技人才激励计划
Ловушка в обновлениях: путь бэкдора Evasive Panda через провайдера
Leaked Wallpaper Exploit Let Attackers Escalate Privilege on Windows Systems
A critical security flaw in Windows’ wallpaper handling mechanism has been uncovered. It allows attackers to gain system-level privileges on affected machines. Security researcher Andrea Pierini disclosed the vulnerability, which is tracked as CVE-2024-38100 and dubbed “FakePotato.” The FakePotato exploit takes advantage of a flaw in how Windows processes wallpaper files. By manipulating certain properties […]
The post Leaked Wallpaper Exploit Let Attackers Escalate Privilege on Windows Systems appeared first on Cyber Security News.