top of page
Blog: Blog2
Writer's pictureForint Ltd

Cyber Security Briefing - 24th April 2023

Please see below the latest update in our regular Monday Cyber Security Briefings:



Security News 2 April 2023 Leaks and Breaches: Breaches: American Bar Association data breach hits 1.4 million members https://www.bleepingcomputer.com/news/security/american-bar-association-data-breach-hits-14-million-members/ IN: ICICI Bank Data Leak – Millions of Customers’ Sensitive Data Exposed https://gbhackers.com/icici-bank-data-leak/ US: CFPB Employee Sends 256,000 Consumers' Data to Personal Email https://www.infosecurity-magazine.com/news/cfpb-employee-sends-consumers-data/ https://financialservices.house.gov/uploadedfiles/2023-04-18_huizenga_to_chopra_re_breach.pdf US says top Chinese fashion brands Shein and Temu mishandled customer data https://www.techradar.com/news/us-says-top-chinese-fashion-brands-shein-and-temu-mishandled-customer-data https://www.uscc.gov/sites/default/files/2023-04/Issue_Brief-Shein_Temu_and_Chinese_E-Commerce.pdf IE: Hackers steal ‘goldmine of personal data’ [from Fermanagh and Omagh District Council] in cyber attack https://www.wearetyrone.com/news/hackers-steal-goldmine-of-personal-data-in-cyber-attack/ IN: RentoMojo security breach exposes user data; hackers claim financial details leaked https://www.thehindu.com/sci-tech/technology/rentomojo-security-breach-exposes-user-data-hackers-claim-financial-details-leaked/article66758904.ece Philippines Police Employee Records Leaked Online in a Massive Data Breach https://www.vpnmentor.com/news/report-philippine-police-breach/ CN: Company Selling Social Media, Gaming Accounts, and Software Licenses Worldwide [Z2U] Suffered a Data Breach https://www.vpnmentor.com/news/report-z2u-breach/ US: Hackers Stole School Data. The District Left Teachers in the Dark https://www.bloomberg.com/news/articles/2023-04-18/hackers-took-16-000-arizona-teacher-social-security-numbers-in-ransomware-attack?leadSource=uverify%20wall Ransomware: Tank storage company Vopak hacked, Ransomware groups report https://nltimes.nl/2023/04/22/tank-storage-company-vopak-hacked-ransomware-groups-report Medusa ransomware crew brags about spreading Bing, Cortana source code https://www.theregister.com/2023/04/19/medusa_microsoft_data_dump/ New Ransomware Attack Hits Health Insurer Point32Health https://informationsecuritybuzz.com/new-ransomware-attack-hits-insurer-point32health/ The Week in Ransomware - April 21st 2023 - Macs in the Crosshairs https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-21st-2023-macs-in-the-crosshairs/ Other Breaches: Capita has 'evidence' customer data was stolen in digital burglary https://www.theregister.com/2023/04/20/capita_admits_to_evidence_that/ https://www.computerweekly.com/news/365535508/Capita-customer-data-was-stolen-in-March-ransomware-attack https://doublepulsar.com/russian-hackers-exfiltrated-data-from-capita-over-a-week-before-outage-b67453e0bd59 Criminal Records Service still disrupted 4 weeks after hack https://www.bbc.co.uk/news/technology-65324125 3CX Breach Was a Double Supply Chain Compromise https://krebsonsecurity.com/2023/04/3cx-breach-was-a-double-supply-chain-compromise/ Japan’s cybersecurity nightmare also everyone else’s problem too https://businessmirror.com.ph/2023/04/23/japans-cybersecurity-nightmare-also-everyone-elses-problem-too/ Accidental ‘write’ Permissions In Alibaba PostgreSQL Let Attackers Access Sensitive Data https://gbhackers.com/accidental-write-permissions-in-alibaba-postgresql/ DateMySchool, an online dating platform targeted toward university students and alumni userbase exposed for 4+ months and no one cares https://twitter.com/MayhemDayOne/status/1648433613460094977 Identity News: Stop This Dangerous Bill That Would Normalize Face Surveillance in California https://www.eff.org/deeplinks/2023/04/stop-dangerous-bill-would-normalize-face-surveillance-california Canadian Tire stores in B.C. broke privacy laws on facial ID technology, privacy commissioner says https://www.cbc.ca/news/canada/british-columbia/canadian-tire-bc-facial-id-technology-privacy-commissioner-1.6817039 Coalition on digital ID can drive fintech relations between India and the UK https://paymentexpert.com/2023/04/21/coalition-on-digital-id-can-drive-fintech-relations-between-india-and-the-uk/ An Identity for Digital Transformation https://www.bcs.org/articles-opinion-and-research/an-identity-for-digital-transformation/ Calls intensify for payments to be removed from scope of the Digital Identity Regulation https://paymentexpert.com/2023/04/17/calls-intensify-for-payments-to-be-removed-from-scope-of-the-digital-identity-regulation/ Face biometrics increasing importance for travel and financial services draws big bucks https://www.biometricupdate.com/202304/face-biometrics-increasing-importance-for-travel-and-financial-services-draws-big-bucks TSA wants automated ID verification, ML detection algorithms at security gates https://fcw.com/acquisition/2023/04/tsa-wants-automated-id-verification-ml-detection-algorithms-security-gates/385495/ Smart gun operating on facial recognition goes on sale in US https://www.reuters.com/technology/smart-gun-operating-facial-recognition-goes-sale-us-2023-04-21/?rpc=401& Virginia Passes Legislation Prohibiting the Use of Employees’ Social Security Numbers as Identifiers https://www.workplaceprivacyreport.com/2023/04/articles/workplace-privacy/virginia-passes-legislation-prohibiting-the-use-of-employees-social-security-numbers-as-identifiers/ Privacy advocates upset at back-door tactics for Irish facial recognition law https://www.biometricupdate.com/202304/privacy-advocates-upset-at-back-door-tactics-for-irish-facial-recognition-law Post Office GOV.UK Verify service no longer available https://www.postoffice.co.uk/identity/government-verify Other News: Turkey: Protect end-to-end encrypted services https://www.article19.org/resources/turkey-protect-end-to-end-encrypted-services/ Encrypted messaging services - including WhatsApp - write to UK government urging Online Safety Bill rethink https://diginomica.com/encrypted-messaging-services-including-whatsapp-write-uk-government-urging-online-safety-bill https://blog.whatsapp.com/an-open-letter Crime agencies condemn Facebook and Instagram encryption plans https://www.theguardian.com/technology/2023/apr/20/crime-agencies-condemn-facebook-instagram-encryption-plans Following recent leaks, social media spells trouble for the US https://www.verdict.co.uk/social-media-trouble-us/ Cashless Britain is a sinister power-grab https://www.telegraph.co.uk/news/2023/04/18/cashless-britain-is-a-sinister-power-grab/ Digital pound will happen ‘sooner than many might expect’, says deVere CEO https://finbold.com/digital-pound-will-happen-sooner-than-many-might-expect-says-devere-ceo/ Bank of England Official Says Stablecoin Use May Need Limits https://www.bloomberg.com/news/articles/2023-04-17/bank-of-england-official-says-stablecoin-use-may-need-limits?leadSource=uverify%20wall How Website Tracking Technologies Are Transforming Risk Analysis Across Industries https://www.infosecurity-magazine.com/opinions/website-tracking-tech-risk-analysis/ Britain’s new emergency alert system 'can be hacked with £1,000 of equipment and YouTube tutorial' https://www.lbc.co.uk/news/britain-new-emergency-alert-system-can-be-hacked/ It’s not the end of privacy yet in Canada, but the threat remains https://theconversation.com/its-not-the-end-of-privacy-yet-in-canada-but-the-threat-remains-202659 Thousands of companies using user data such as location and financial info to target advertising, report finds https://inews.co.uk/news/technology/thousands-of-companies-using-user-data-such-as-location-and-financial-info-to-target-advertising-report-finds-2278148 https://demos.co.uk/wp-content/uploads/2023/04/accept-all-unacceptable-demos-march-2023.pdf Police leaves Mullvad offices empty handed after trying to gain access to customer data https://www.ghacks.net/2023/04/20/police-leaves-mullvad-offices-empty-handed-after-trying-to-gain-access-to-customer-data/ UK hospital uses NFC to pilot diabetes home-testing for pregnant women https://www.nfcw.com/2023/04/20/383199/uk-hospital-uses-nfc-to-pilot-diabetes-home-testing-for-pregnant-women/ UK-based DeepMind merges with Google Brain in transatlantic AI tie-up https://thenextweb.com/news/google-deepmind-merges-google-brain-ai-race UK biometrics watchdog questions police cloud deployments https://www.computerweekly.com/news/365535411/UK-biometrics-watchdog-questions-police-cloud-deployments QR-style "2D barcodes" will revolutionize retail as we know it https://www.axios.com/2023/04/17/2d-barcode-transition-2027 Apple rolls out support for contactless payments acceptance on iPhones to merchants in Taiwan https://www.nfcw.com/2023/04/21/383229/apple-rolls-out-support-for-contactless-payments-acceptance-on-iphones-to-merchants-in-taiwan/ The Ultimate Showdown: How Apple is Disrupting the Financial World with Digital Wallets https://medium.datadriveninvestor.com/how-apple-is-disrupting-the-financial-world-with-digital-wallets-dbd737e1ba88 Asda and Wayve lay claim to UK’s largest self-driving grocery home delivery trial https://retailtechinnovationhub.com/home/2023/4/17/asda-and-wayve-lay-claim-to-uks-largest-self-driving-grocery-home-delivery-trial Microsoft Defender update causes Windows Hardware Stack Protection mess https://www.bleepingcomputer.com/news/microsoft/microsoft-defender-update-causes-windows-hardware-stack-protection-mess/ Devon and Cornwall Police drones launched to monitor unsafe driving https://www.bbc.co.uk/news/uk-england-devon-65222222 RSA 2023 highlights a cybersecurity identity crisis in the age of AI Part 1: https://siliconangle.com/2023/04/15/rsa-2023-highlights-cybersecurity-identity-crisis-age-ai/ Part 2: https://siliconangle.com/2023/04/22/rsa-2023-security-identity-crisis-part-two/ SmartMetric Welcomes The Announced End Of The Credit Card Mag Stripe With It Being Replaced By Fingerprint Biometric Cards https://www.businesswire.com/news/home/20230421005114/en Is biometric technology secure? Exploring two scenarios https://www.electronicspecifier.com/industries/security/is-biometric-technology-secure-exploring-two-scenarios Will Apple take a big bite out of the banks? https://www.ft.com/content/fda76c42-0540-48a1-b1d9-259e1c2d6c3a ‘I’ve Never Hired A Writer Better Than ChatGPT’: How AI Is Upending The Freelance World https://www.forbes.com/sites/rashishrivastava/2023/04/20/ive-never-hired-a-writer-better-than-chatgpt-how-ai-is-upending-the-freelance-world/?sh=4a8dfdec62be Crooks’ Mistaken Bet on Encrypted Phones https://www.newyorker.com/magazine/2023/04/24/crooks-mistaken-bet-on-encrypted-phones UK says ‘Wagner-like cyber groups’ attacking critical infrastructure https://therecord.media/uk-ncsc-warning-cyber-groups-critical-infrastructure https://securityaffairs.com/145007/apt/apt28-targets-cisco-networking-equipment.html UK Government launches new cyber security measures to tackle ever growing threats https://www.gov.uk/government/news/government-launches-new-cyber-security-measures-to-tackle-ever-growing-threats--2 Red Alert: ICANN and Verisign Proposal Would Allow Any Government In The World To Seize Domain Names https://freespeech.com/2023/04/19/red-alert-icann-and-verisign-proposal-would-allow-any-government-in-the-world-to-seize-domain-names/ Would-be hitman busted after being fooled by parody website https://www.malwarebytes.com/blog/news/2023/04/fbi-nabs-and-charges-talented-air-national-guardsman-turned-would-be-hitman ICO reprimands Surrey Police and Sussex Police for recording more than 200,000 phone calls without people’s knowledge https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/04/ico-reprimands-surrey-police-and-sussex-police/ NCSC: Introducing Cyber Advisors... https://www.ncsc.gov.uk/blog-post/introducing-cyber-advisors NCSC: Data-driven cyber: transforming cyber security through an evidence-based approach https://www.ncsc.gov.uk/blog-post/data-driven-cyber-transforming-cyber-security-through-an-evidence-based-approach NCSC: The threat from commercial cyber proliferation https://www.ncsc.gov.uk/report/commercial-cyber-proliferation-assessment Technical: SB23-108: Vulnerability Summary for the Week of April 10, 2023 https://www.cisa.gov/news-events/bulletins/sb23-108 Goldoson: Privacy-invasive and Clicker Android Adware found in popular apps in South Korea https://www.mcafee.com/blogs/other-blogs/mcafee-labs/goldoson-privacy-invasive-and-clicker-android-adware-found-in-popular-apps-in-south-korea/ Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets https://www.microsoft.com/en-us/security/blog/2023/04/18/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets/ GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts https://astrix.security/ghosttoken-exploiting-gcp-application-infrastructure-to-create-invisible-unremovable-trojan-app-on-google-accounts/ https://www.bleepingcomputer.com/news/security/ghosttoken-gcp-flaw-let-attackers-backdoor-google-accounts/ First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters Dog Hunt: Finding Decoy Dog Toolkit via Anomalous DNS Traffic https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/dog-hunt-finding-decoy-dog-toolkit-via-anomalous-dns-traffic/ Daggerfly: APT Actor Targets Telecoms Company in Africa https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/apt-attacks-telecoms-africa-mgbot Trojanized Psiphon App Infects Android Phones with Ransomware https://restoreprivacy.com/trojanized-psiphon-app-infects-android-phones-with-ransomware/ Giving a Face to the Malware Proxy Service ‘Faceless’ https://krebsonsecurity.com/2023/04/giving-a-face-to-the-malware-proxy-service-faceless/ ChatGPT Can be Tricked To Write Malware When You Act as a Developer Mode https://gbhackers.com/chatgpt-can-be-tricked-to-write-malware/ CrossLock Ransomware Emerges: New GoLang-Based Malware On the Horizon https://blog.cyble.com/2023/04/18/crosslock-ransomware-emerges-new-golang-based-malware-on-the-horizon/ DAAM Android Botnet being distributed through Trojanized Applications https://blog.cyble.com/2023/04/20/daam-android-botnet-being-distributed-through-trojanized-applications/ Qakbot Malware Continues to Morph https://blog.cyble.com/2023/04/21/qakbot-malware-continues-to-morph/ QBot banker delivered through business correspondence https://securelist.com/qbot-banker-business-correspondence/109535/ Discarded, not destroyed: Old routers reveal corporate secrets https://www.welivesecurity.com/2023/04/18/discarded-not-destroyed-old-routers-reveal-corporate-secrets/ EvilExtractor – All-in-One Stealer https://www.fortinet.com/blog/threat-research/evil-extractor-all-in-one-stealer Compromising Garmin’s Sport Watches: A Deep Dive into GarminOS and its MonkeyC Virtual Machine https://www.anvilsecure.com/blog/compromising-garmins-sport-watches-a-deep-dive-into-garminos-and-its-monkeyc-virtual-machine.html Enrich your advanced hunting experience using network layer signals from Zeek https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/enrich-your-advanced-hunting-experience-using-network-layer/ba-p/3794693 Massive Abuse of Abandoned Eval PHP WordPress Plugin https://blog.sucuri.net/2023/04/massive-abuse-of-abandoned-evalphp-wordpress-plugin.html Direct Syscalls: A journey from high to low https://redops.at/en/blog/direct-syscalls-a-journey-from-high-to-low BlueNoroff APT group targets macOS with ‘RustBucket’ Malware https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/ Process injection in 2023, evading leading EDRs https://vanmieghem.io/process-injection-evading-edr-in-2023/ Architecture of AI-Driven Security Operations with a Low False Positive Rate https://towardsdatascience.com/architecture-of-ai-driven-security-operations-with-a-low-false-positive-rate-a33dbbad55b4 AWS Account ID: An Attacker's Perspective https://www.zeuscloud.io/post/aws-account-id-an-attackers-perspective The Definitive Guide To Process Cloning on Windows https://www.huntandhackett.com/blog/the-definitive-guide-to-process-cloning-on-windows LockBit for Mac | How Real is the Risk of macOS Ransomware? https://www.sentinelone.com/blog/lockbit-for-mac-how-real-is-the-risk-of-macos-ransomware/ SimpleHarm: Tracking MuddyWater’s infrastructure https://www.group-ib.com/blog/muddywater-infrastructure/ A Comparative Analysis of Threat Detection Capability of IoT Safeguards https://iotrim.github.io/safeguards.html Catching Threat Actors using honeypots Part 1: https://burningmalware.com/Catching-Threat-Actors-using-honeypots!-(Part1)/ Part 2: https://burningmalware.com/Catching-Threat-Actors-using-honeypots!-(Part2)/ WINDOWS SECRETS EXTRACTION: A SUMMARY https://www.synacktiv.com/publications/windows-secrets-extraction-a-summary Dissecting Buffer Overflow Attacks in MongoDB https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/dissecting-buffer-overflow-attacks-in-mongodb/ Obfuscating C2 Traffic with Google Cloud Functions https://fortynorthsecurity.com/blog/obfuscating-c2-traffic-with-google-cloud-functions/ Generative AI Design Best Practices for Web Applications https://medium.com/@Kerberosmansour/generative-ai-design-best-practices-for-web-applications-integrating-explanations-and-code-702fb90e8a24 The Fuzzing Guide to the Galaxy: An Attempt with Android System Services https://blog.thalium.re/posts/fuzzing-samsung-system-services/ GCP Pentesting Guide https://slashparity.com/?p=938 Memory corruption in JCRE: An unpatchable HSM may swallow your private key https://hardenedvault.net/blog/2023-04-18-java-card-runtime-memory-corruption/ RASPBERRY ROBIN: ANTI-EVASION HOW-TO & EXPLOIT ANALYSIS https://research.checkpoint.com/2023/raspberry-robin-anti-evasion-how-to-exploit-analysis/ NCC: Public Report – Kubernetes 1.24 Security Audit https://research.nccgroup.com/2023/04/17/public-report-kubernetes-1-24-security-audit/ The strange case of Great honeypot of China https://isc.sans.edu/diary/rss/29750 Tools: EmailAddressExtractor - A project to rapidly extract all email addresses from any files in a given path https://github.com/HaveIBeenPwned/EmailAddressExtractor Shinigami - A dynamic unpacking tool https://github.com/buzzer-re/Shinigami/ Discord DLL hijacking - a simple example of DLL hijacking enabling proxy execution https://github.com/MitchHS/Discord-DLL-Hijacking Detect-It-Easy - Program for determining types of files for Windows, Linux and MacOS. https://github.com/horsicq/Detect-It-Easy adversary_emulation_library - An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs https://github.com/center-for-threat-informed-defense/adversary_emulation_library krang - Knowledge Report Alert & Normalization Generator https://github.com/carta/krang HackSpaceCon_Malware_Analysis_Course - Free training course offered at Hack Space Con 2023 https://github.com/archcloudlabs/HackSpaceCon_Malware_Analysis_Course Fiber - Using fibers to run in-memory code in a different and stealthy way https://github.com/Kudaes/Fiber InfraSpyder - Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex https://github.com/montysecurity/InfraSpyder Nuclearpond - A Utility Leveraging Nuclei To Perform Internet Wide Scans For The Cost Of A Cup Of Coffee https://github.com/DevSecOpsDocs/nuclearpond PowerMeUp - A Small Library Of Powershell Scripts For Post Exploitation That You May Need Or Use! https://github.com/ItsCyberAli/PowerMeUp Striker - A Command And Control (C2) https://github.com/4g3nt47/Striker UDPX - Fast A nd Lightweight, UDPX Is A Single-Packet UDP Scanner Written In Go That Supports The Discovery Of Over 45 Services With The Ability To Add Custom Ones https://github.com/nullt3r/udpx Katana - A Next-Generation Crawling And Spidering Framework https://github.com/projectdiscovery/katana C2 Search Netlas - a Java utility designed to detect Command and Control (C2) servers using the Netlas API https://github.com/michael2to3/c2-search-netlas DDosia Project: How NoName057(16) is trying to improve the efficiency of DDoS attacks https://decoded.avast.io/martinchlumecky/ddosia-project-how-noname05716-is-trying-to-improve-the-efficiency-of-ddos-attacks/ Papers: Biometrics-Finger: Introduction to Presentation Attack Detection in Fingerprint Biometrics https://arxiv.org/pdf/2304.06723.pdf Biometrics-Gait: GaitRef: Gait Recognition with Refined Sequential Skeletons https://arxiv.org/pdf/2304.07916.pdf Crypto: Algebraic cryptanalysis of POSEIDON https://eprint.iacr.org/2023/537.pdf Crypto: Dlog is Practically as Hard (or Easy) as DH – Solving Dlogs via DH Oracles on EC Standards https://eprint.iacr.org/2023/539.pdf Crypto: A MULTISTEP STRATEGY FOR POLYNOMIAL SYSTEM SOLVING OVER FINITE FIELDS AND A NEW ALGEBRAIC ATTACK ON THE STREAM CIPHER TRIVIUM https://eprint.iacr.org/2023/542.pdf Crypto: Horizontal Correlation Attack on Classic McEliece https://eprint.iacr.org/2023/546.pdf Crypto: Pseudorandomness with Proof of Destruction and Applications https://eprint.iacr.org/2023/543.pdf Crypto: Decentralized Threshold Signatures with Dynamically Private Accountability https://arxiv.org/pdf/2304.07937.pdf GDPR: Visualising Personal Data Flows: Insights from a Case Study of Booking.com https://arxiv.org/pdf/2304.09603.pdf Hacking: NCSC: Jaguar Tooth Malware Analysis Report https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/jaguar-tooth/NCSC-MAR-Jaguar-Tooth.pdf Identity: Measuring Re-identification Risk https://arxiv.org/pdf/2304.07210.pdf Identity: Eudaemon: A peer-to-peer electronic identity system https://eud.ninja IoT: BS-GAT:Behavior Similarity Based Graph Attention Network for Network Intrusion Detection https://arxiv.org/pdf/2304.07226.pdf IoT: Energy Attacks in the Battery-less Internet of Things https://arxiv.org/pdf/2304.08224.pdf Location-Based Systems: Location Privacy Protection Game against Adversary through Multi-user Cooperative Obfuscation https://arxiv.org/pdf/2304.10477.pdf Machine-Learning: Evil from Within: Machine Learning Backdoors through Hardware Trojans https://arxiv.org/pdf/2304.08411.pdf Machine-Learning: BadVFL: Backdoor Attacks in Vertical Federated Learning https://arxiv.org/pdf/2304.08847.pdf Machine-Learning: Practical Differentially Private and Byzantine-resilient Federated Learning https://arxiv.org/pdf/2304.09762.pdf Machine-Learning: OUTCENTR: A NOVEL SEMI-SUPERVISED FRAMEWORK FOR PREDICTING EXPLOITS OF VULNERABILITIES IN HIGH DIMENSIONAL DATASETS https://arxiv.org/pdf/2304.10511.pdf Networking: Maybenot: A Framework for Traffic Analysis Defenses https://arxiv.org/pdf/2304.09510.pdf Neural Nets: RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks https://arxiv.org/pdf/2304.07980.pdf Neural Nets: ProGAP: Progressive Graph Neural Networks with Differential Privacy Guarantees https://arxiv.org/pdf/2304.08928.pdf Neural Nets: Secure Split Learning against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks https://arxiv.org/pdf/2304.09515.pdf Privacy: Challenges towards the Next Frontier in Privacy https://arxiv.org/pdf/2304.06929.pdf Privacy: Obfuscation of Discrete data https://arxiv.org/pdf/2304.07092.pdf Privacy: Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple’s Count Mean Sketch in Practice https://arxiv.org/pdf/2304.07134.pdf Privacy: Separating Key Agreement and Computational Differential Privacy https://arxiv.org/pdf/2304.07239.pdf Privacy: A Randomized Approach for Tight Privacy Accounting https://arxiv.org/pdf/2304.07927.pdf Privacy: Sensitivity estimation for differentially private query processing https://arxiv.org/pdf/2304.09546.pdf Quantum: Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge) https://arxiv.org/pdf/2304.10480.pdf Reports: Google: Threat Horizons April 2023 Threat Horizons Report https://services.google.com/fh/files/blogs/gcat_threathorizons_full_apr2023.pdf Reports: Mandiant: M-Trends 2023 Mandiant Special Report https://mandiant.widen.net/s/dlzgn6w26n/m-trends-2023 RFID: UHF RFID and NFC Point-of-Care – Architecture, Security, and Implementation https://arxiv.org/pdf/2304.08015.pdf SecMisc: A Survey of Access Control Misconfiguration Detection Techniques https://arxiv.org/pdf/2304.07704.pdf SecMisc: A Decentralized Authorization and Security Framework for Distributed Research Workflows https://arxiv.org/pdf/2304.08557.pdf SecMisc: In ChatGPT We Trust? Measuring and Characterizing the Reliability of ChatGPT https://arxiv.org/pdf/2304.08979.pdf SecMisc: An Analysis of How Many Undiscovered Vulnerabilities Remain in Information Systems https://arxiv.org/pdf/2304.09259.pdf SecMisc: Security and Privacy Problems in Voice Assistant Applications: A Survey https://arxiv.org/pdf/2304.09486.pdf SecMisc: Cyber Security in Smart Manufacturing (Threats, Landscapes & Challenges) https://arxiv.org/pdf/2304.10180.pdf SecMisc: A Secure Co-Processor to Accelerate Real-Time AntiViruses via Inspection Breakpoints https://marcusbotacin.github.io/files/marcus_coproc.pdf SecMisc: Five Eyes: Cybersecurity Best Practices for Smart Cities https://www.cisa.gov/sites/default/files/2023-04/cybersecurity-best-practices-for-smart-cities_508.pdf SecMisc: The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders https://www.usenix.org/system/files/sec23fall-prepub-506-vasquez.pdf SecMisc: KeePassXC Application Security Review https://keepassxc.org/assets/pdf/KeePassXC-Review-V1-Molotnikov.pdf TLS: We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets https://upb-syssec.github.io/blog/2023/session-tickets/ https://www.usenix.org/system/files/sec23fall-prepub-333-hebrok.pdf Wearables: IoT-based Wearables: A comprehensive Survey https://arxiv.org/pdf/2304.09861.pdfSecurity News 23 April 2023 Leaks and Breaches: Breaches: American Bar Association data breach hits 1.4 million members https://www.bleepingcomputer.com/news/security/american-bar-association-data-breach-hits-14-million-members/ IN: ICICI Bank Data Leak – Millions of Customers’ Sensitive Data Exposed https://gbhackers.com/icici-bank-data-leak/ US: CFPB Employee Sends 256,000 Consumers' Data to Personal Email https://www.infosecurity-magazine.com/news/cfpb-employee-sends-consumers-data/ https://financialservices.house.gov/uploadedfiles/2023-04-18_huizenga_to_chopra_re_breach.pdf US says top Chinese fashion brands Shein and Temu mishandled customer data https://www.techradar.com/news/us-says-top-chinese-fashion-brands-shein-and-temu-mishandled-customer-data https://www.uscc.gov/sites/default/files/2023-04/Issue_Brief-Shein_Temu_and_Chinese_E-Commerce.pdf IE: Hackers steal ‘goldmine of personal data’ [from Fermanagh and Omagh District Council] in cyber attack https://www.wearetyrone.com/news/hackers-steal-goldmine-of-personal-data-in-cyber-attack/ IN: RentoMojo security breach exposes user data; hackers claim financial details leaked https://www.thehindu.com/sci-tech/technology/rentomojo-security-breach-exposes-user-data-hackers-claim-financial-details-leaked/article66758904.ece Philippines Police Employee Records Leaked Online in a Massive Data Breach https://www.vpnmentor.com/news/report-philippine-police-breach/ CN: Company Selling Social Media, Gaming Accounts, and Software Licenses Worldwide [Z2U] Suffered a Data Breach https://www.vpnmentor.com/news/report-z2u-breach/ US: Hackers Stole School Data. The District Left Teachers in the Dark https://www.bloomberg.com/news/articles/2023-04-18/hackers-took-16-000-arizona-teacher-social-security-numbers-in-ransomware-attack?leadSource=uverify%20wall Ransomware: Tank storage company Vopak hacked, Ransomware groups report https://nltimes.nl/2023/04/22/tank-storage-company-vopak-hacked-ransomware-groups-report Medusa ransomware crew brags about spreading Bing, Cortana source code https://www.theregister.com/2023/04/19/medusa_microsoft_data_dump/ New Ransomware Attack Hits Health Insurer Point32Health https://informationsecuritybuzz.com/new-ransomware-attack-hits-insurer-point32health/ The Week in Ransomware - April 21st 2023 - Macs in the Crosshairs https://www.bleepingcomputer.com/news/security/the-week-in-ransomware-april-21st-2023-macs-in-the-crosshairs/ Other Breaches: Capita has 'evidence' customer data was stolen in digital burglary https://www.theregister.com/2023/04/20/capita_admits_to_evidence_that/ https://www.computerweekly.com/news/365535508/Capita-customer-data-was-stolen-in-March-ransomware-attack https://doublepulsar.com/russian-hackers-exfiltrated-data-from-capita-over-a-week-before-outage-b67453e0bd59 Criminal Records Service still disrupted 4 weeks after hack https://www.bbc.co.uk/news/technology-65324125 3CX Breach Was a Double Supply Chain Compromise https://krebsonsecurity.com/2023/04/3cx-breach-was-a-double-supply-chain-compromise/ Japan’s cybersecurity nightmare also everyone else’s problem too https://businessmirror.com.ph/2023/04/23/japans-cybersecurity-nightmare-also-everyone-elses-problem-too/ Accidental ‘write’ Permissions In Alibaba PostgreSQL Let Attackers Access Sensitive Data https://gbhackers.com/accidental-write-permissions-in-alibaba-postgresql/ DateMySchool, an online dating platform targeted toward university students and alumni userbase exposed for 4+ months and no one cares https://twitter.com/MayhemDayOne/status/1648433613460094977 Identity News: Stop This Dangerous Bill That Would Normalize Face Surveillance in California https://www.eff.org/deeplinks/2023/04/stop-dangerous-bill-would-normalize-face-surveillance-california Canadian Tire stores in B.C. broke privacy laws on facial ID technology, privacy commissioner says https://www.cbc.ca/news/canada/british-columbia/canadian-tire-bc-facial-id-technology-privacy-commissioner-1.6817039 Coalition on digital ID can drive fintech relations between India and the UK https://paymentexpert.com/2023/04/21/coalition-on-digital-id-can-drive-fintech-relations-between-india-and-the-uk/ An Identity for Digital Transformation https://www.bcs.org/articles-opinion-and-research/an-identity-for-digital-transformation/ Calls intensify for payments to be removed from scope of the Digital Identity Regulation https://paymentexpert.com/2023/04/17/calls-intensify-for-payments-to-be-removed-from-scope-of-the-digital-identity-regulation/ Face biometrics increasing importance for travel and financial services draws big bucks https://www.biometricupdate.com/202304/face-biometrics-increasing-importance-for-travel-and-financial-services-draws-big-bucks TSA wants automated ID verification, ML detection algorithms at security gates https://fcw.com/acquisition/2023/04/tsa-wants-automated-id-verification-ml-detection-algorithms-security-gates/385495/ Smart gun operating on facial recognition goes on sale in US https://www.reuters.com/technology/smart-gun-operating-facial-recognition-goes-sale-us-2023-04-21/?rpc=401& Virginia Passes Legislation Prohibiting the Use of Employees’ Social Security Numbers as Identifiers https://www.workplaceprivacyreport.com/2023/04/articles/workplace-privacy/virginia-passes-legislation-prohibiting-the-use-of-employees-social-security-numbers-as-identifiers/ Privacy advocates upset at back-door tactics for Irish facial recognition law https://www.biometricupdate.com/202304/privacy-advocates-upset-at-back-door-tactics-for-irish-facial-recognition-law Post Office GOV.UK Verify service no longer available https://www.postoffice.co.uk/identity/government-verify Other News: Turkey: Protect end-to-end encrypted services https://www.article19.org/resources/turkey-protect-end-to-end-encrypted-services/ Encrypted messaging services - including WhatsApp - write to UK government urging Online Safety Bill rethink https://diginomica.com/encrypted-messaging-services-including-whatsapp-write-uk-government-urging-online-safety-bill https://blog.whatsapp.com/an-open-letter Crime agencies condemn Facebook and Instagram encryption plans https://www.theguardian.com/technology/2023/apr/20/crime-agencies-condemn-facebook-instagram-encryption-plans Following recent leaks, social media spells trouble for the US https://www.verdict.co.uk/social-media-trouble-us/ Cashless Britain is a sinister power-grab https://www.telegraph.co.uk/news/2023/04/18/cashless-britain-is-a-sinister-power-grab/ Digital pound will happen ‘sooner than many might expect’, says deVere CEO https://finbold.com/digital-pound-will-happen-sooner-than-many-might-expect-says-devere-ceo/ Bank of England Official Says Stablecoin Use May Need Limits https://www.bloomberg.com/news/articles/2023-04-17/bank-of-england-official-says-stablecoin-use-may-need-limits?leadSource=uverify%20wall How Website Tracking Technologies Are Transforming Risk Analysis Across Industries https://www.infosecurity-magazine.com/opinions/website-tracking-tech-risk-analysis/ Britain’s new emergency alert system 'can be hacked with £1,000 of equipment and YouTube tutorial' https://www.lbc.co.uk/news/britain-new-emergency-alert-system-can-be-hacked/ It’s not the end of privacy yet in Canada, but the threat remains https://theconversation.com/its-not-the-end-of-privacy-yet-in-canada-but-the-threat-remains-202659 Thousands of companies using user data such as location and financial info to target advertising, report finds https://inews.co.uk/news/technology/thousands-of-companies-using-user-data-such-as-location-and-financial-info-to-target-advertising-report-finds-2278148 https://demos.co.uk/wp-content/uploads/2023/04/accept-all-unacceptable-demos-march-2023.pdf Police leaves Mullvad offices empty handed after trying to gain access to customer data https://www.ghacks.net/2023/04/20/police-leaves-mullvad-offices-empty-handed-after-trying-to-gain-access-to-customer-data/ UK hospital uses NFC to pilot diabetes home-testing for pregnant women https://www.nfcw.com/2023/04/20/383199/uk-hospital-uses-nfc-to-pilot-diabetes-home-testing-for-pregnant-women/ UK-based DeepMind merges with Google Brain in transatlantic AI tie-up https://thenextweb.com/news/google-deepmind-merges-google-brain-ai-race UK biometrics watchdog questions police cloud deployments https://www.computerweekly.com/news/365535411/UK-biometrics-watchdog-questions-police-cloud-deployments QR-style "2D barcodes" will revolutionize retail as we know it https://www.axios.com/2023/04/17/2d-barcode-transition-2027 Apple rolls out support for contactless payments acceptance on iPhones to merchants in Taiwan https://www.nfcw.com/2023/04/21/383229/apple-rolls-out-support-for-contactless-payments-acceptance-on-iphones-to-merchants-in-taiwan/ The Ultimate Showdown: How Apple is Disrupting the Financial World with Digital Wallets https://medium.datadriveninvestor.com/how-apple-is-disrupting-the-financial-world-with-digital-wallets-dbd737e1ba88 Asda and Wayve lay claim to UK’s largest self-driving grocery home delivery trial https://retailtechinnovationhub.com/home/2023/4/17/asda-and-wayve-lay-claim-to-uks-largest-self-driving-grocery-home-delivery-trial Microsoft Defender update causes Windows Hardware Stack Protection mess https://www.bleepingcomputer.com/news/microsoft/microsoft-defender-update-causes-windows-hardware-stack-protection-mess/ Devon and Cornwall Police drones launched to monitor unsafe driving https://www.bbc.co.uk/news/uk-england-devon-65222222 RSA 2023 highlights a cybersecurity identity crisis in the age of AI Part 1: https://siliconangle.com/2023/04/15/rsa-2023-highlights-cybersecurity-identity-crisis-age-ai/ Part 2: https://siliconangle.com/2023/04/22/rsa-2023-security-identity-crisis-part-two/ SmartMetric Welcomes The Announced End Of The Credit Card Mag Stripe With It Being Replaced By Fingerprint Biometric Cards https://www.businesswire.com/news/home/20230421005114/en Is biometric technology secure? Exploring two scenarios https://www.electronicspecifier.com/industries/security/is-biometric-technology-secure-exploring-two-scenarios Will Apple take a big bite out of the banks? https://www.ft.com/content/fda76c42-0540-48a1-b1d9-259e1c2d6c3a ‘I’ve Never Hired A Writer Better Than ChatGPT’: How AI Is Upending The Freelance World https://www.forbes.com/sites/rashishrivastava/2023/04/20/ive-never-hired-a-writer-better-than-chatgpt-how-ai-is-upending-the-freelance-world/?sh=4a8dfdec62be Crooks’ Mistaken Bet on Encrypted Phones https://www.newyorker.com/magazine/2023/04/24/crooks-mistaken-bet-on-encrypted-phones UK says ‘Wagner-like cyber groups’ attacking critical infrastructure https://therecord.media/uk-ncsc-warning-cyber-groups-critical-infrastructure https://securityaffairs.com/145007/apt/apt28-targets-cisco-networking-equipment.html UK Government launches new cyber security measures to tackle ever growing threats https://www.gov.uk/government/news/government-launches-new-cyber-security-measures-to-tackle-ever-growing-threats--2 Red Alert: ICANN and Verisign Proposal Would Allow Any Government In The World To Seize Domain Names https://freespeech.com/2023/04/19/red-alert-icann-and-verisign-proposal-would-allow-any-government-in-the-world-to-seize-domain-names/ Would-be hitman busted after being fooled by parody website https://www.malwarebytes.com/blog/news/2023/04/fbi-nabs-and-charges-talented-air-national-guardsman-turned-would-be-hitman ICO reprimands Surrey Police and Sussex Police for recording more than 200,000 phone calls without people’s knowledge https://ico.org.uk/about-the-ico/media-centre/news-and-blogs/2023/04/ico-reprimands-surrey-police-and-sussex-police/ NCSC: Introducing Cyber Advisors... https://www.ncsc.gov.uk/blog-post/introducing-cyber-advisors NCSC: Data-driven cyber: transforming cyber security through an evidence-based approach https://www.ncsc.gov.uk/blog-post/data-driven-cyber-transforming-cyber-security-through-an-evidence-based-approach NCSC: The threat from commercial cyber proliferation https://www.ncsc.gov.uk/report/commercial-cyber-proliferation-assessment Technical: SB23-108: Vulnerability Summary for the Week of April 10, 2023 https://www.cisa.gov/news-events/bulletins/sb23-108 Goldoson: Privacy-invasive and Clicker Android Adware found in popular apps in South Korea https://www.mcafee.com/blogs/other-blogs/mcafee-labs/goldoson-privacy-invasive-and-clicker-android-adware-found-in-popular-apps-in-south-korea/ Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets https://www.microsoft.com/en-us/security/blog/2023/04/18/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets/ GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts https://astrix.security/ghosttoken-exploiting-gcp-application-infrastructure-to-create-invisible-unremovable-trojan-app-on-google-accounts/ https://www.bleepingcomputer.com/news/security/ghosttoken-gcp-flaw-let-attackers-backdoor-google-accounts/ First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters https://blog.aquasec.com/leveraging-kubernetes-rbac-to-backdoor-clusters Dog Hunt: Finding Decoy Dog Toolkit via Anomalous DNS Traffic https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/dog-hunt-finding-decoy-dog-toolkit-via-anomalous-dns-traffic/ Daggerfly: APT Actor Targets Telecoms Company in Africa https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/apt-attacks-telecoms-africa-mgbot Trojanized Psiphon App Infects Android Phones with Ransomware https://restoreprivacy.com/trojanized-psiphon-app-infects-android-phones-with-ransomware/ Giving a Face to the Malware Proxy Service ‘Faceless’ https://krebsonsecurity.com/2023/04/giving-a-face-to-the-malware-proxy-service-faceless/ ChatGPT Can be Tricked To Write Malware When You Act as a Developer Mode https://gbhackers.com/chatgpt-can-be-tricked-to-write-malware/ CrossLock Ransomware Emerges: New GoLang-Based Malware On the Horizon https://blog.cyble.com/2023/04/18/crosslock-ransomware-emerges-new-golang-based-malware-on-the-horizon/ DAAM Android Botnet being distributed through Trojanized Applications https://blog.cyble.com/2023/04/20/daam-android-botnet-being-distributed-through-trojanized-applications/ Qakbot Malware Continues to Morph https://blog.cyble.com/2023/04/21/qakbot-malware-continues-to-morph/ QBot banker delivered through business correspondence https://securelist.com/qbot-banker-business-correspondence/109535/ Discarded, not destroyed: Old routers reveal corporate secrets https://www.welivesecurity.com/2023/04/18/discarded-not-destroyed-old-routers-reveal-corporate-secrets/ EvilExtractor – All-in-One Stealer https://www.fortinet.com/blog/threat-research/evil-extractor-all-in-one-stealer Compromising Garmin’s Sport Watches: A Deep Dive into GarminOS and its MonkeyC Virtual Machine https://www.anvilsecure.com/blog/compromising-garmins-sport-watches-a-deep-dive-into-garminos-and-its-monkeyc-virtual-machine.html Enrich your advanced hunting experience using network layer signals from Zeek https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/enrich-your-advanced-hunting-experience-using-network-layer/ba-p/3794693 Massive Abuse of Abandoned Eval PHP WordPress Plugin https://blog.sucuri.net/2023/04/massive-abuse-of-abandoned-evalphp-wordpress-plugin.html Direct Syscalls: A journey from high to low https://redops.at/en/blog/direct-syscalls-a-journey-from-high-to-low BlueNoroff APT group targets macOS with ‘RustBucket’ Malware https://www.jamf.com/blog/bluenoroff-apt-targets-macos-rustbucket-malware/ Process injection in 2023, evading leading EDRs https://vanmieghem.io/process-injection-evading-edr-in-2023/ Architecture of AI-Driven Security Operations with a Low False Positive Rate https://towardsdatascience.com/architecture-of-ai-driven-security-operations-with-a-low-false-positive-rate-a33dbbad55b4 AWS Account ID: An Attacker's Perspective https://www.zeuscloud.io/post/aws-account-id-an-attackers-perspective The Definitive Guide To Process Cloning on Windows https://www.huntandhackett.com/blog/the-definitive-guide-to-process-cloning-on-windows LockBit for Mac | How Real is the Risk of macOS Ransomware? https://www.sentinelone.com/blog/lockbit-for-mac-how-real-is-the-risk-of-macos-ransomware/ SimpleHarm: Tracking MuddyWater’s infrastructure https://www.group-ib.com/blog/muddywater-infrastructure/ A Comparative Analysis of Threat Detection Capability of IoT Safeguards https://iotrim.github.io/safeguards.html Catching Threat Actors using honeypots Part 1: https://burningmalware.com/Catching-Threat-Actors-using-honeypots!-(Part1)/ Part 2: https://burningmalware.com/Catching-Threat-Actors-using-honeypots!-(Part2)/ WINDOWS SECRETS EXTRACTION: A SUMMARY https://www.synacktiv.com/publications/windows-secrets-extraction-a-summary Dissecting Buffer Overflow Attacks in MongoDB https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/dissecting-buffer-overflow-attacks-in-mongodb/ Obfuscating C2 Traffic with Google Cloud Functions https://fortynorthsecurity.com/blog/obfuscating-c2-traffic-with-google-cloud-functions/ Generative AI Design Best Practices for Web Applications https://medium.com/@Kerberosmansour/generative-ai-design-best-practices-for-web-applications-integrating-explanations-and-code-702fb90e8a24 The Fuzzing Guide to the Galaxy: An Attempt with Android System Services https://blog.thalium.re/posts/fuzzing-samsung-system-services/ GCP Pentesting Guide https://slashparity.com/?p=938 Memory corruption in JCRE: An unpatchable HSM may swallow your private key https://hardenedvault.net/blog/2023-04-18-java-card-runtime-memory-corruption/ RASPBERRY ROBIN: ANTI-EVASION HOW-TO & EXPLOIT ANALYSIS https://research.checkpoint.com/2023/raspberry-robin-anti-evasion-how-to-exploit-analysis/ NCC: Public Report – Kubernetes 1.24 Security Audit https://research.nccgroup.com/2023/04/17/public-report-kubernetes-1-24-security-audit/ The strange case of Great honeypot of China https://isc.sans.edu/diary/rss/29750 Tools: EmailAddressExtractor - A project to rapidly extract all email addresses from any files in a given path https://github.com/HaveIBeenPwned/EmailAddressExtractor Shinigami - A dynamic unpacking tool https://github.com/buzzer-re/Shinigami/ Discord DLL hijacking - a simple example of DLL hijacking enabling proxy execution https://github.com/MitchHS/Discord-DLL-Hijacking Detect-It-Easy - Program for determining types of files for Windows, Linux and MacOS. https://github.com/horsicq/Detect-It-Easy adversary_emulation_library - An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs https://github.com/center-for-threat-informed-defense/adversary_emulation_library krang - Knowledge Report Alert & Normalization Generator https://github.com/carta/krang HackSpaceCon_Malware_Analysis_Course - Free training course offered at Hack Space Con 2023 https://github.com/archcloudlabs/HackSpaceCon_Malware_Analysis_Course Fiber - Using fibers to run in-memory code in a different and stealthy way https://github.com/Kudaes/Fiber InfraSpyder - Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex https://github.com/montysecurity/InfraSpyder Nuclearpond - A Utility Leveraging Nuclei To Perform Internet Wide Scans For The Cost Of A Cup Of Coffee https://github.com/DevSecOpsDocs/nuclearpond PowerMeUp - A Small Library Of Powershell Scripts For Post Exploitation That You May Need Or Use! https://github.com/ItsCyberAli/PowerMeUp Striker - A Command And Control (C2) https://github.com/4g3nt47/Striker UDPX - Fast A nd Lightweight, UDPX Is A Single-Packet UDP Scanner Written In Go That Supports The Discovery Of Over 45 Services With The Ability To Add Custom Ones https://github.com/nullt3r/udpx Katana - A Next-Generation Crawling And Spidering Framework https://github.com/projectdiscovery/katana C2 Search Netlas - a Java utility designed to detect Command and Control (C2) servers using the Netlas API https://github.com/michael2to3/c2-search-netlas DDosia Project: How NoName057(16) is trying to improve the efficiency of DDoS attacks https://decoded.avast.io/martinchlumecky/ddosia-project-how-noname05716-is-trying-to-improve-the-efficiency-of-ddos-attacks/ Papers: Biometrics-Finger: Introduction to Presentation Attack Detection in Fingerprint Biometrics https://arxiv.org/pdf/2304.06723.pdf Biometrics-Gait: GaitRef: Gait Recognition with Refined Sequential Skeletons https://arxiv.org/pdf/2304.07916.pdf Crypto: Algebraic cryptanalysis of POSEIDON https://eprint.iacr.org/2023/537.pdf Crypto: Dlog is Practically as Hard (or Easy) as DH – Solving Dlogs via DH Oracles on EC Standards https://eprint.iacr.org/2023/539.pdf Crypto: A MULTISTEP STRATEGY FOR POLYNOMIAL SYSTEM SOLVING OVER FINITE FIELDS AND A NEW ALGEBRAIC ATTACK ON THE STREAM CIPHER TRIVIUM https://eprint.iacr.org/2023/542.pdf Crypto: Horizontal Correlation Attack on Classic McEliece https://eprint.iacr.org/2023/546.pdf Crypto: Pseudorandomness with Proof of Destruction and Applications https://eprint.iacr.org/2023/543.pdf Crypto: Decentralized Threshold Signatures with Dynamically Private Accountability https://arxiv.org/pdf/2304.07937.pdf GDPR: Visualising Personal Data Flows: Insights from a Case Study of Booking.com https://arxiv.org/pdf/2304.09603.pdf Hacking: NCSC: Jaguar Tooth Malware Analysis Report https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/jaguar-tooth/NCSC-MAR-Jaguar-Tooth.pdf Identity: Measuring Re-identification Risk https://arxiv.org/pdf/2304.07210.pdf Identity: Eudaemon: A peer-to-peer electronic identity system https://eud.ninja IoT: BS-GAT:Behavior Similarity Based Graph Attention Network for Network Intrusion Detection https://arxiv.org/pdf/2304.07226.pdf IoT: Energy Attacks in the Battery-less Internet of Things https://arxiv.org/pdf/2304.08224.pdf Location-Based Systems: Location Privacy Protection Game against Adversary through Multi-user Cooperative Obfuscation https://arxiv.org/pdf/2304.10477.pdf Machine-Learning: Evil from Within: Machine Learning Backdoors through Hardware Trojans https://arxiv.org/pdf/2304.08411.pdf Machine-Learning: BadVFL: Backdoor Attacks in Vertical Federated Learning https://arxiv.org/pdf/2304.08847.pdf Machine-Learning: Practical Differentially Private and Byzantine-resilient Federated Learning https://arxiv.org/pdf/2304.09762.pdf Machine-Learning: OUTCENTR: A NOVEL SEMI-SUPERVISED FRAMEWORK FOR PREDICTING EXPLOITS OF VULNERABILITIES IN HIGH DIMENSIONAL DATASETS https://arxiv.org/pdf/2304.10511.pdf Networking: Maybenot: A Framework for Traffic Analysis Defenses https://arxiv.org/pdf/2304.09510.pdf Neural Nets: RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks https://arxiv.org/pdf/2304.07980.pdf Neural Nets: ProGAP: Progressive Graph Neural Networks with Differential Privacy Guarantees https://arxiv.org/pdf/2304.08928.pdf Neural Nets: Secure Split Learning against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks https://arxiv.org/pdf/2304.09515.pdf Privacy: Challenges towards the Next Frontier in Privacy https://arxiv.org/pdf/2304.06929.pdf Privacy: Obfuscation of Discrete data https://arxiv.org/pdf/2304.07092.pdf Privacy: Pool Inference Attacks on Local Differential Privacy: Quantifying the Privacy Guarantees of Apple’s Count Mean Sketch in Practice https://arxiv.org/pdf/2304.07134.pdf Privacy: Separating Key Agreement and Computational Differential Privacy https://arxiv.org/pdf/2304.07239.pdf Privacy: A Randomized Approach for Tight Privacy Accounting https://arxiv.org/pdf/2304.07927.pdf Privacy: Sensitivity estimation for differentially private query processing https://arxiv.org/pdf/2304.09546.pdf Quantum: Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge) https://arxiv.org/pdf/2304.10480.pdf Reports: Google: Threat Horizons April 2023 Threat Horizons Report https://services.google.com/fh/files/blogs/gcat_threathorizons_full_apr2023.pdf Reports: Mandiant: M-Trends 2023 Mandiant Special Report https://mandiant.widen.net/s/dlzgn6w26n/m-trends-2023 RFID: UHF RFID and NFC Point-of-Care – Architecture, Security, and Implementation https://arxiv.org/pdf/2304.08015.pdf SecMisc: A Survey of Access Control Misconfiguration Detection Techniques https://arxiv.org/pdf/2304.07704.pdf SecMisc: A Decentralized Authorization and Security Framework for Distributed Research Workflows https://arxiv.org/pdf/2304.08557.pdf SecMisc: In ChatGPT We Trust? Measuring and Characterizing the Reliability of ChatGPT https://arxiv.org/pdf/2304.08979.pdf SecMisc: An Analysis of How Many Undiscovered Vulnerabilities Remain in Information Systems https://arxiv.org/pdf/2304.09259.pdf SecMisc: Security and Privacy Problems in Voice Assistant Applications: A Survey https://arxiv.org/pdf/2304.09486.pdf SecMisc: Cyber Security in Smart Manufacturing (Threats, Landscapes & Challenges) https://arxiv.org/pdf/2304.10180.pdf SecMisc: A Secure Co-Processor to Accelerate Real-Time AntiViruses via Inspection Breakpoints https://marcusbotacin.github.io/files/marcus_coproc.pdf SecMisc: Five Eyes: Cybersecurity Best Practices for Smart Cities https://www.cisa.gov/sites/default/files/2023-04/cybersecurity-best-practices-for-smart-cities_508.pdf SecMisc: The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders https://www.usenix.org/system/files/sec23fall-prepub-506-vasquez.pdf SecMisc: KeePassXC Application Security Review https://keepassxc.org/assets/pdf/KeePassXC-Review-V1-Molotnikov.pdf TLS: We Really Need to Talk About Session Tickets: A Large-Scale Analysis of Cryptographic Dangers with TLS Session Tickets https://upb-syssec.github.io/blog/2023/session-tickets/ https://www.usenix.org/system/files/sec23fall-prepub-333-hebrok.pdf Wearables: IoT-based Wearables: A comprehensive Survey https://arxiv.org/pdf/2304.09861.pdf

14 views0 comments

Recent Posts

See All

Comments


bottom of page