{"id":8751,"date":"2024-05-13T10:29:27","date_gmt":"2024-05-13T07:29:27","guid":{"rendered":"https:\/\/cyberone.bg\/?p=8751"},"modified":"2024-05-13T10:29:27","modified_gmt":"2024-05-13T07:29:27","slug":"weekly-cybersecurity-report-week-18-2024","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-18-2024","title":{"rendered":"Weekly Cybersecurity Report | Week 18, 2024"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider,<strong> <a href=\"https:\/\/cyberone.bg\/\">Cyberone<\/a><\/strong> equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h2><strong>Weekly Cybersecurity Report | Week 18, 2024<\/strong><\/h2>\n<h4><b><span data-contrast=\"auto\">Information security updates and events from the past week<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559739&quot;:60}\">\u00a0<\/span><\/h4>\n<h3><b><span data-contrast=\"auto\">1 &#8211; Hackers from China broke into the payroll system provider of the Ministry of Defense in Great Britain and stole information of about a quarter of a million users.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The hack was carried out in the payroll management system used by the Ministry of Defense and financial information of the Ministry&#8217;s employees and other users was stolen.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The British Ministry of Defense reports that no significant delays in salary payments are expected following the hack.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.bbc.com\/news\/uk-68967805\"><span data-contrast=\"none\">https:\/\/www.bbc.com\/news\/uk-68967805<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">2 &#8211; The US government publishes a new document on artificial intelligence security, detailing the principles to ensure the responsible development and use of AI.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The document describes the risks associated with AI, such as bias, invasion of privacy, and misuse, and offers guidelines for mitigating these risks.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The document emphasizes the importance of transparency, accountability and control in AI and calls on governments, industry, and academia to work together to develop ethical standards for AI and create appropriate oversight mechanisms.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Among the main principles of the document are:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Transparency: Clear and understandable information about AI systems must be published, including how they work, the data used to train them, and the risks involved.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Accountability: Clear mechanisms must be defined for attributing the results of AI systems.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Control: Steps must be taken to ensure the use of AI in a safe and reliable manner.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">The document is a significant step towards a more responsible development of AI. However, the challenge is to develop more effective tools for detecting and treating biases in AI.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<h3><b><span data-contrast=\"auto\">3 &#8211; El Salvador suffers from a massive leak of biometric data<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Resecurity has identified a massive leak of personal information (PII) of over five million citizens of El Salvador on the dark web, affecting more than 80% of the country&#8217;s population.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The threat actor, known as &#8216;CiberinteligenciaSV&#8217;, posted the 144GB data on Breach Forums, writing that the leak included 5,129,518 high-definition images, each tagged with the appropriate Salvadoran DUI (DUI) number.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Resecurity estimates that the real attackers of this breach seem to have an interest in obfuscating their involvement, using the Guacamaya group and its unofficial proxies to create uncertainty around the real threat actors and the attack chain that caused the data push.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">4 &#8211; Extreme right websites in Europe were hacked and vandalized<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The websites of far-right media outlets were hacked and defaced late Thursday, with subscriber data and other internal website data leaked as part of an apparently politically motivated attack.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A notice posted temporarily on the front page of the sites, Post Millennial and Human Events, appeared to be written by Post Millennial editor Andy Ngo.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The message, with the color of the pride flag as a background, claimed that Ngo is in the process of transitioning to a woman and is taking the name Angelina Ngo. The message also included links to download datasets of Post Millennial subscribers, mailing lists, and details about the site&#8217;s writers and editors.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A conservative activist and journalist provocateur, Ngo regularly presents anti-transgender commentary and analysis.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">No public claim of responsibility for the attack has yet been received.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">5 &#8211; Cyber and health &#8211; several events from the last few days:<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/h3>\n<ul>\n<li><span data-contrast=\"auto\">The Ascension company, which operates about 180 hospitals and medical centers in the USA, reports the shutdown of computer systems and disruptions in the various services due to a cyber-attack.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">The company DocGo, which provides mobile medical services, reports that medical information of patients was leaked following a cyber-attack.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">NHS Dumfries and Galloway in Scotland reports that medical information has been leaked following a ransomware attack. The INC ransom group claimed responsibility for the attack.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">The French imaging institute Coradix-Magnescan reports that extensive disruptions are occurring in patient queues due to a cyber-attack.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><strong><em>The attacks highlighted in this report aren&#8217;t just incidents, they&#8217;re blueprints of the adversary&#8217;s arsenal. To protect your business you need the right protection. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider, Cyberone equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 18, 2024 Information security updates and events from the past week\u00a0 1 &#8211; Hackers from China [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8618,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[57,65,56],"class_list":["post-8751","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates","tag-cybersecurity","tag-weekly-cybersecurity-report","tag-weekly-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=8751"}],"version-history":[{"count":1,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8751\/revisions"}],"predecessor-version":[{"id":8752,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8751\/revisions\/8752"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8618"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=8751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=8751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=8751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}