Aggregator
Microsoft reminds of Windows 10 support ending in two months
F5 Fixes HTTP/2 Flaw Affecting Multiple Products in Massive DoS Attacks
F5 Networks has disclosed a new HTTP/2 vulnerability affecting multiple BIG-IP products that could allow attackers to launch denial-of-service attacks against enterprise networks. The vulnerability, designated CVE-2025-54500 and published on August 13, 2025, exploits a flaw in HTTP/2 implementation that enables malicious actors to overwhelm systems using specially crafted control frames, potentially disrupting critical network […]
The post F5 Fixes HTTP/2 Flaw Affecting Multiple Products in Massive DoS Attacks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The Good, the Bad and the Ugly in Cybersecurity – Week 33
Cybersecurity Snapshot: Asset Inventories Key for OT Security, CISA Says, as NIST Issues Lightweight Algorithms to Secure IoT Devices
CISA stresses that an asset inventory is the foundation for OT security. Meanwhile, NIST has finalized cryptographic algorithms for resource-constrained devices. The agency is also developing control overlays for AI systems. Plus, a report reveals that security budget growth has slowed to a five-year low due to economic uncertainty. And much more!
Here are five things you need to know for the week ending August 15.
1 - CISA to OT operators: If you can’t see it, you can’t secure itStruggling to track your operational technology (OT) wares? Check out a new playbook for how to structure, manage and update an inventory of your OT assets.
Published this week, the new guidance from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has a clear message: an OT asset inventory is the bedrock of any OT security architecture.
“An OT asset inventory – an organized, regularly updated list of an organization’s OT systems, hardware, and software – is foundational to designing a modern defensible architecture,” the document reads.
Organizations lacking an OT asset inventory have no visibility into their OT wares and consequently can’t secure them, CISA added in the guidance titled “Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators.”
The guide, aimed at OT system owners and operators from all critical infrastructure sectors, recommends inventorying all hardware, software and network components, including each asset’s vendor, model, firmware version, physical location and more.
But OT operators shouldn’t stop there.
They also must create a taxonomy, because of the diversity of assets in OT environments, such as legacy systems, specialized devices, sensors and instrumentation – along with their usual variety of proprietary communication protocols.
“Owners and operators need context on a component’s role in monitoring and control of the physical process; this may require owners and operators to physically review and inspect assets and associated process areas,” the document reads.
The benefits of classifying OT assets by function and importance are significant:
- Prioritize what matters most.
- Sharpen risk identification and vulnerability management.
- Boost incident response.
Steps To Build An OT Asset Taxonomy
(Source: CISA)
The document, which CISA created in collaboration with multiple U.S. and international government agencies, also details how to continuously maintain and improve OT asset inventories and taxonomies.
The guidance’s ultimate goal is to help critical infrastructure organizations shift from a reactive to a proactive security posture via full asset visibility and thus attain a more resilient and secure OT environment.
“As cyber threats continue to evolve, CISA through this guidance provides deeper visibility into OT assets as a critical first step in reducing risk and ensuring operational resilience,” CISA Acting Director Madhu Gottumukkala said in a statement.
For more information about OT security, check out these Tenable resources:
- “Mind the Gap: A Roadmap to IT/OT Alignment” (white paper)
- “Unlock Advanced IoT Visibility in your OT Environment Security” (on-demand webinar)
- “Blackbox to blueprint: The security leader’s guidebook to managing OT and IT risk” (white paper)
- “Fortifying Your OT Environment: Vulnerability and Risk Mitigation Strategies” (on-demand webinar)
- “Identity Security Is the Missing Link To Combatting Advanced OT Threats”
Here’s one for teams tasked with securing IoT devices.
The National Institute of Standards and Technology (NIST) has finalized a new standard for lightweight cryptography to protect electronic devices with limited computational resources.
“We encourage the use of this new lightweight cryptography standard wherever resource constraints have hindered the adoption of cryptography,” NIST computer scientist Kerry McKay, who co-led the project, said in a statement this week.
The standard was built for protecting the billions of devices that lack the power for conventional encryption. Think smart appliances, medical implants and industrial sensors that don't have the processing muscle for heavy security.
(Credit: Image generated by Tenable using Google Gemini)
Detailed in NIST Special Publication 800-232, the standard is built around the Ascon family of cryptographic algorithms and includes four specific algorithms designed for different security needs.
- ASCON-128 AEAD: Encrypts data and proves it hasn't been tampered with.
- ASCON-Hash 256: Creates a digital fingerprint to detect alterations.
- ASCON-XOF 128 and ASCON-CXOF 128: Allow developers to fine-tune security to match devices’ capabilities.
This new standard is designed for straightforward implementation and offers better protection against "side-channel attacks," where adversaries analyze a device's power consumption or timing to glean information.
NIST has indicated that this is a foundational standard, with plans to add more features in the future based on community feedback. The goal is to provide a robust and adaptable security solution that can evolve as technology and cyber threats advance.
“There are additional functionalities people have requested that we might add down the road, such as a dedicated message authentication code,” McKay said.
For more information about IoT security:
- “How to Remediate Risk to Critical OT/IoT Systems without Disrupting Operations” (Tenable)
- “What is IoT security?” (TechTarget)
- “How to Unlock Advanced IoT Visibility for Cyber-Physical Systems” (Tenable)
- “Disaster Awaits if We Don’t Secure IoT Now” (IEEE)
- “Top 15 IoT security threats and risks to prioritize” (TechTarget)
Just as cyber threats get worse and security teams get more responsibility, CISOs' budgets are being squeezed due to macroeconomic headwinds.
That’s a key takeaway from the "2025 Security Budget Benchmark Report" published by IANS Research and Artico Search.
"Once again, we find that security budgets are not immune to macro conditions," Steve Martano, IANS Faculty and Partner at Artico Search, said in a statement.
"Despite most companies identifying cyber as a top five business risk, most CISOs are not receiving budget increases commensurate with the increase in security program scope,” he added.
Specifically, year-over-year average growth in security budgets has fallen to a five-year low of 4%, a steep decline from the 8% growth seen in 2024, as companies become more cautious with their spending due to economic unpredictability.
The report, based on a survey of 587 CISOs, blames global market volatility, including geopolitical tensions, tariff uncertainty and fluctuating economic indicators.
Other key findings include:
- Budgets aren't keeping pace: Security's slice of the total IT budget fell from 11.9% to 10.9%.
- Hiring has slowed: Security staffing growth is down to 7%, the lowest in four years.
- Teams are stretched thin: Only 11% of CISOs say their teams are adequately staffed.
(Source: "2025 Security Budget Benchmark Report" from IANS Research and Artico Search, August 2025)
So what should CISOs do? The report offers three recommendations:
- Align every project with clear business goals.
- Prioritize ruthlessly to protect the organization’s crown jewels.
- Be realistic with your budget asks, and prove the ROI.
For more information about cybersecurity budget strategies:
- “Blown the cybersecurity budget? Here are 7 ways cyber pros can save money” (CSO)
- “Cybersecurity budget justification: A guide for CISOs” (TechTarget)
- “5 steps to prioritize cybersecurity in your 2025 budget” (CFO)
- “How to create an enterprise cloud security budget” (TechTarget)
- “2025 will be the year of CISO fiscal accountability” (VentureBeat)
NIST is building a set of "control overlays" to help organizations lock down their AI systems, and it’s looking for feedback about the initiative.
NIST outlined the project this week in the document “NIST SP 800-53 Control Overlays for Securing AI Systems Concept Paper,” and also launched a Slack channel for collaborators.
“The control overlays are an implementation-focused series of guidelines that address use cases involving different types of AI systems and specific AI system components,” reads the Control Overlays for Securing AI Systems (COSAiS) project home page.
(Credit: Image generated by Tenable using Google Gemini)
The goal of the overlays is to protect the “confidentiality, integrity, and availability” of the users and data for these proposed use cases:
- Using generative AI to create content
- Fine-tuning predictive AI to make better decisions
- Deploying AI agents to automate tasks
- Building secure AI systems from the ground up
The ultimate goal is to offer organizations a “library of overlays” that they can use to reduce the risks of their AI use and development.
NIST is putting out the call for feedback on these use cases. It wants to know if they reflect how AI is really being adopted and which ones to prioritize. NIST is also open to adding use cases to the project.
NIST foresees releasing a draft of the first use case in early 2026.
For more information about AI security, check out these Tenable resources:
- “The AI Security Dilemma: Navigating the High-Stakes World of Cloud AI” (blog)
- “Tenable Cloud AI Risk Report 2025” (research report)
- “Introducing Tenable AI Exposure: Stop Guessing, Start Securing Your AI Attack Surface” (blog)
- “Mitigating AI-Related Security Risks: Insights and Strategies with Tenable AI Aware” (on-demand webinar)
- “Expert Advice for Boosting AI Security” (blog)
Individuals and organizations that have lost money in crypto scams are being targeted by cyber crooks posing as lawyers.
The warning comes courtesy of the FBI's Internet Crime Complaint Center (IC3), which issued a public service announcement this week, updating a similar one it published last year.
The cyber scammers are now combining multiple exploitation tactics, making their schemes more sophisticated and harder to detect.
“Contact with scammers impersonating law firms continue to pose many risks, including the theft of personal data and funds from unsuspecting victims to the reputational harm of actual lawyers being impersonated,” reads the PSA.
(Credit: Image generated by Tenable using Google Gemini)
New information in this updated advisory includes red-flag indicators and due-diligence recommendations.
Red-flag indicators include:
- Scammers using the names and letterhead of real lawyers
- Claims of affiliation with government agencies
- Demands for payment in crypto or prepaid gift cards
- Detailed knowledge of the scams victims suffered, such as exact amounts stolen and wire transfer service used
Due-diligence recommendations include:
- Trust no one, especially alleged law firms that contact you out of the blue.
- Demand proof. Ask for a law license and notarized ID.
- Verify employment if someone claims to work for the government. Call the agency’s local office yourself.
If you believe you have been targeted, file a report with the IC3 at www.ic3.gov.
For more information about cryptocurrency cyber scams:
- “What To Know About Cryptocurrency and Scams” (FTC)
- “Cryptocurrency Investment Fraud” (FBI)
- “Cryptocurrency Scams: How to Spot, Report, and Avoid Them” (Investopedia)
Water Systems Under Attack: Norway, Poland Blame Russia Actors
US and Five Global Partners Release First Unified OT Security Taxonomy
План США: 1) Ввести санкции 2) ??? 3) Хакеры получают $100 миллионов и меняют офис на побольше
Underground
You must login to view this content
The Reward Is in the Giving
It Took a Day for SPLX, NeuralTrust to Jailbreak OpenAI’s GPT-5
A day after OpenAI and Microsoft trumpeted the arrival of the GPT-5 generative AI model and its improved reasoning and other capabilities, two AI cybersecurity startups showed in separate reports that it is still vulnerable to jailbreaking and other techniques.
The post It Took a Day for SPLX, NeuralTrust to Jailbreak OpenAI’s GPT-5 appeared first on Security Boulevard.
CVE-2025-54475 | joomsky JS Jobs Component up to 1.4.4 on Joomla sql injection
CVE-2025-54474 | dj-extensions DJ-Classifieds Component up to 3.10.1 on Joomla sql injection
CVE-2025-54473 | Phoca Commander up to 4.0.0/5.0.1 on Joomla unrestricted upload
CVE-2025-1929 | Risk Yazılım Reel Sektör Hazine ve Risk Yönetimi Yazılımı up to 1.0.0.4 sql injection
Они не шифруют файлы, не требуют денег — но наносят больший ущерб. Кто они?
ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows
The popular open-source image manipulation software ImageMagick has addressed four critical security vulnerabilities discovered by Google’s artificial intelligence-powered security research tool, Big Sleep. These flaws, affecting millions of applications worldwide that rely on ImageMagick for image processing, have been patched in the latest software releases following responsible disclosure protocols. AI Breakthrough in Cybersecurity Google’s Big […]
The post ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Crypto24
You must login to view this content
Akamai Named an Overall Leader for API Security by KuppingerCole
Deepfake Detection: What is Phishing 3.0 and How Can You Prepare?
Earlier this year we warned that trust was cracking inside the inbox. Since then your inbox learned a new trick: acting. GenAI no longer just writes the lure; it manufactures the sender. With a few seconds of audio or a handful of images, attackers clone familiar voices and faces and insert them into everyday workflows: email threads, calendar invites, voicemails, quick chat notes. It looks routine because it comes through the tools you already trust. The objective is the same as classic BEC: move money, steal access, exfiltrate data. The difference is the level of social proof.
The post Deepfake Detection: What is Phishing 3.0 and How Can You Prepare? appeared first on Security Boulevard.