<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyber Security &#8211; New England Safety Partners, LLC</title>
	<atom:link href="https://www.newenglandsp.com/category/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.newenglandsp.com</link>
	<description>New England Safety Partners, LLC</description>
	<lastBuildDate>Thu, 12 Jan 2023 15:34:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Getting start with SOC 2 for Startups &#8211; Resmo Webinar</title>
		<link>https://www.newenglandsp.com/2023/01/getting-start-with-soc-2-for-startups-resmo-webinar/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=getting-start-with-soc-2-for-startups-resmo-webinar</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Thu, 12 Jan 2023 15:34:13 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Press Release]]></category>
		<guid isPermaLink="false">https://www.newenglandsp.com/?p=17625</guid>

					<description><![CDATA[We were happy to participate in this webinar where Serhat from Resmo sat down with NESP&#8217;s Ed Gardner to talk about all things SOC 2. Our conversation ranged from what a SOC 2 is, how the process might look for a start-up when you should consider pursuing one, and many other topics. Enjoy the recording!]]></description>
										<content:encoded><![CDATA[
<p>We were happy to participate in this webinar where Serhat from <a href="https://resmo.com" data-type="URL" data-id="https://resmo.com">Resmo</a> sat down with NESP&#8217;s  Ed Gardner to talk about all things SOC 2. Our conversation ranged from what a SOC 2 is, how the process might look for a start-up when you should consider pursuing one, and many other topics.</p>



<p>Enjoy the recording!</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Webinar- Getting started SOC2 as a Startup" width="640" height="360" src="https://www.youtube.com/embed/mdmkBtLbXvY?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ChatGPT-Written Malware</title>
		<link>https://www.newenglandsp.com/2023/01/chatgpt-written-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=chatgpt-written-malware</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Tue, 10 Jan 2023 12:18:55 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://www.schneier.com/?p=66490</guid>

					<description><![CDATA[<p>I don’t know how much of a thing this will end up being, but we <a href="https://arstechnica.com/information-technology/2023/01/chatgpt-is-enabling-script-kiddies-to-write-functional-malware/">are seeing</a> ChatGPT-written malware in the wild.</p>
<blockquote><p>…within a few weeks of ChatGPT going live, participants in cybercrime forums—­some with little or no coding experience­—were using it to write software and emails that could be used for espionage, ransomware, malicious spam, and other malicious tasks.</p>
<p>“It’s still too early to decide whether or not ChatGPT capabilities will become the new favorite tool for participants in the Dark Web,” company researchers wrote. “However, the cybercriminal community has already shown significant interest and are jumping into this latest trend to generate malicious code.”...</p></blockquote>]]></description>
										<content:encoded><![CDATA[<p>I don&#8217;t know how much of a thing this will end up being, but we <a href="https://arstechnica.com/information-technology/2023/01/chatgpt-is-enabling-script-kiddies-to-write-functional-malware/">are seeing</a> ChatGPT-written malware in the wild.</p>
<blockquote>
<p>&#8230;within a few weeks of ChatGPT going live, participants in cybercrime forums&#8212;­some with little or no coding experience­&#8212;were using it to write software and emails that could be used for espionage, ransomware, malicious spam, and other malicious tasks.</p>
<p>&#8220;It’s still too early to decide whether or not ChatGPT capabilities will become the new favorite tool for participants in the Dark Web,&#8221; company researchers wrote. &#8220;However, the cybercriminal community has already shown significant interest and are jumping into this latest trend to generate malicious code.&#8221;</p>
<p>Last month, one forum participant posted what they claimed was the first script they had written and credited the AI chatbot with providing a &#8220;nice [helping] hand to finish the script with a nice scope.&#8221;</p>
<p>The Python code combined various cryptographic functions, including code signing, encryption, and decryption. One part of the script generated a key using elliptic curve cryptography and the curve ed25519 for signing files. Another part used a hard-coded password to encrypt system files using the Blowfish and Twofish algorithms. A third used RSA keys and digital signatures, message signing, and the blake2 hash function to compare various files.</p>
</blockquote>
<p>Check Point Research <a href="https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/">report</a>.</p>
<p>ChatGPT-generated code <a href="https://www.techtarget.com/searchsoftwarequality/news/252528379/ChatGPT-writes-code-but-wont-replace-developers">isn&#8217;t that good</a>, but it&#8217;s a start. And the technology will only get better. Where it matters here is that it gives less skilled hackers&#8212;script kiddies&#8212;new capabilities.</p>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>Another breach at LastPass?</title>
		<link>https://www.newenglandsp.com/2022/12/another-breach-at-lastpass/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=another-breach-at-lastpass</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Thu, 22 Dec 2022 19:39:38 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://www.newenglandsp.com/?p=17542</guid>

					<description><![CDATA[LastPass sent this note out today. As you may recall, they had a pretty significant event earlier this year with their source code and development environments, and have had some on-and-off security issues going back to at least 2015. Here&#8217;s the thing, even if these events were unrelated, once the bag guys know you have [&#8230;]]]></description>
										<content:encoded><![CDATA[<div class="wp-block-image">
<figure class="aligncenter size-full"><a href="https://www.newenglandsp.com/wp-content/uploads/2022/12/image-1.png"><img fetchpriority="high" decoding="async" width="585" height="672" src="https://www.newenglandsp.com/wp-content/uploads/2022/12/image-1.png" alt="" class="wp-image-17543" srcset="https://www.newenglandsp.com/wp-content/uploads/2022/12/image-1.png 585w, https://www.newenglandsp.com/wp-content/uploads/2022/12/image-1-261x300.png 261w" sizes="(max-width: 585px) 100vw, 585px" /></a></figure>
</div>


<p>LastPass sent this note out today. As you may recall, they had a pretty significant event earlier this year with their source code and development environments, and have had some on-and-off <a href="https://en.wikipedia.org/wiki/LastPass#2022_security_incidents" data-type="URL" data-id="https://en.wikipedia.org/wiki/LastPass#2022_security_incidents" target="_blank" rel="noreferrer noopener">security issues going back to at least 2015</a>.</p>



<p>Here&#8217;s the thing, even if these events were unrelated, once the bag guys know you have issues, that makes you a pretty ripe target to see if they can find other holes. The best thing, of course, is to be proactive, have good processes, conduct regular security testing, and have an excellent Incident team.  It doesn&#8217;t hurt to have a third party look it over. </p>



<p>But if you have an incident, all that becomes even more important. </p>



<p>Find those holes before the bad guys do. Do you have a plan? <a href="https://www.newenglandsp.com/contact/" data-type="URL" data-id="https://www.newenglandsp.com/contact/">Reach out, we can help.</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ChatGPT and AI describes SOC 2 Audits</title>
		<link>https://www.newenglandsp.com/2022/12/chatgpt-and-ai-describes-soc-2-audits/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=chatgpt-and-ai-describes-soc-2-audits</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Mon, 19 Dec 2022 15:43:47 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Privacy]]></category>
		<guid isPermaLink="false">https://www.newenglandsp.com/?p=17511</guid>

					<description><![CDATA[AI is all the rage, we&#8217;ve tried a couple of different platforms, but we wanted to see what it looked like when nothing but AI was used to create a video. This was scripted using ChatGPT with the question &#8220;What is a SOC 2?&#8221; and fed into Synthesia&#8217;s video generation platform. We did no additional [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p>AI is all the rage, we&#8217;ve tried a couple of different platforms, but we wanted to see what it looked like when nothing but AI was used to create a video. This was scripted using <a rel="noreferrer noopener" href="https://chat.openai.com/chat" target="_blank">ChatGPT</a> with the question &#8220;What is a SOC 2?&#8221; and fed into <a rel="noreferrer noopener" href="https://share.synthesia.io/0387ce20-5b54-4194-86bf-9b4ef247afc8" target="_blank">Synthesia&#8217;s video generation platform</a>. We did no additional editing, we just let the robots work.</p>



<figure class="wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="SOC 2 by ChatGPT" width="640" height="360" src="https://www.youtube.com/embed/Q9qg6JU-E2c?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe>
</div></figure>



<p>It got it mostly right, we might have said a SOC 2 evaluates Security, plus none, one, or all of the other trust principles, but otherwise its a fair description. Worried about AI-generated content? </p>



<p>You can paste the text into the <a rel="noreferrer noopener" href="https://huggingface.co/openai-detector/" data-type="URL" data-id="https://huggingface.co/openai-detector/" target="_blank">ChatGPT detector</a> and it might be able to tell you if what you are reading was written by a robot!</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Decoupling Principle</title>
		<link>https://www.newenglandsp.com/2022/12/the-decoupling-principle/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-decoupling-principle</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Wed, 07 Dec 2022 12:04:41 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://www.schneier.com/?p=66314</guid>

					<description><![CDATA[<p>This is a <a href="https://conferences.sigcomm.org/hotnets/2022/papers/hotnets22_schmitt.pdf">really interesting paper</a> that discusses what the authors call the Decoupling Principle:</p>
<blockquote><p>The idea is simple, yet previously not clearly articulated: to ensure privacy, information should be divided architecturally and institutionally such that each entity has only the information they need to perform their relevant function. Architectural decoupling entails splitting functionality for different fundamental actions in a system, such as decoupling authentication (proving who is allowed to use the network) from connectivity (establishing session state for communicating). Institutional decoupling entails splitting what information remains between non-colluding entities, such as distinct companies or network operators, or between a user and network peers. This decoupling makes service providers individually breach-proof, as they each have little or no sensitive data that can be lost to hackers. Put simply, the Decoupling Principle suggests always separating who you are from what you do...</p></blockquote>]]></description>
										<content:encoded><![CDATA[<p>This is a <a href="https://conferences.sigcomm.org/hotnets/2022/papers/hotnets22_schmitt.pdf">really interesting paper</a> that discusses what the authors call the Decoupling Principle:</p>
<blockquote>
<p>The idea is simple, yet previously not clearly articulated: to ensure privacy, information should be divided architecturally and institutionally such that each entity has only the information they need to perform their relevant function. Architectural decoupling entails splitting functionality for different fundamental actions in a system, such as decoupling authentication (proving who is allowed to use the network) from connectivity (establishing session state for communicating). Institutional decoupling entails splitting what information remains between non-colluding entities, such as distinct companies or network operators, or between a user and network peers. This decoupling makes service providers individually breach-proof, as they each have little or no sensitive data that can be lost to hackers. Put simply, the Decoupling Principle suggests always separating who you are from what you do.</p>
</blockquote>
<p>Lots of interesting details in the paper.</p>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>CryWiper Data Wiper Targeting Russian Sites</title>
		<link>https://www.newenglandsp.com/2022/12/crywiper-data-wiper-targeting-russian-sites/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=crywiper-data-wiper-targeting-russian-sites</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Tue, 06 Dec 2022 12:04:33 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://www.schneier.com/?p=66311</guid>

					<description><![CDATA[<p>Kaspersky is <a href="https://www.kaspersky.com/blog/crywiper-pseudo-ransomware/46480/">reporting</a> on a data wiper masquerading as ransomware that is targeting local Russian government networks.</p>
<blockquote><p>The Trojan corrupts any data that’s not vital for the functioning of the operating system. It doesn’t affect files with extensions .exe, .dll, .lnk, .sys or .msi, and ignores several system folders in the C:\Windows directory. The malware focuses on databases, archives, and user documents.</p>
<p>So far, our experts have seen only pinpoint attacks on targets in the Russian Federation. However, as usual, no one can guarantee that the same code won’t be used against other targets...</p></blockquote>]]></description>
										<content:encoded><![CDATA[<p>Kaspersky is <a href="https://www.kaspersky.com/blog/crywiper-pseudo-ransomware/46480/">reporting</a> on a data wiper masquerading as ransomware that is targeting local Russian government networks.</p>
<blockquote>
<p>The Trojan corrupts any data that&#8217;s not vital for the functioning of the operating system. It doesn&#8217;t affect files with extensions .exe, .dll, .lnk, .sys or .msi, and ignores several system folders in the C:\Windows directory. The malware focuses on databases, archives, and user documents.</p>
<p>So far, our experts have seen only pinpoint attacks on targets in the Russian Federation. However, as usual, no one can guarantee that the same code won&#8217;t be used against other targets.</p>
</blockquote>
<p>Nothing leading to an attribution.</p>
<p>News <a href="https://arstechnica.com/information-technology/2022/12/never-before-seen-malware-is-nuking-data-in-russias-courts-and-mayors-offices/">article</a>.</p>
<p>Slashdot <a href="https://it.slashdot.org/story/22/12/03/0044234/new-crywiper-data-wiper-targets-russian-courts-mayors-offices">thread</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>CAPTCHA</title>
		<link>https://www.newenglandsp.com/2022/12/captcha/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=captcha</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Mon, 05 Dec 2022 12:10:48 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://www.schneier.com/?p=66303</guid>

					<description><![CDATA[<p>This is an actual CAPTCHA I was shown when trying to log into PayPal.</p>
<p><img loading="lazy" class="alignnone size-medium wp-image-66304" src="https://149400697.v2.pressablecdn.com/wp-content/uploads/2022/12/bc5c9f8f-6e44-4dfc-b1a9-0bc888c1218f-204x300.jpg" alt="" width="592" height="872"></p>
<p>As an actual human and not a bot, I had no idea how to answer. Is this a joke? (Seems not.) Is it a Magritte-like existential question? (It’s not a bicycle. It’s a drawing of a bicycle. Actually, it’s a photograph of a drawing of a bicycle. No, it’s really a computer image of a photograph of a drawing of a bicycle.) Am I overthinking this? (Definitely.) I stared at the screen, paralyzed, for way too long.</p>
<p>It’s probably the best CAPTCHA I have ever encountered; a computer would have just answered...</p>]]></description>
										<content:encoded><![CDATA[<p>This is an actual CAPTCHA I was shown when trying to log into PayPal.</p>
<p><img decoding="async" loading="lazy" class="alignnone size-medium wp-image-66304" src="https://149400697.v2.pressablecdn.com/wp-content/uploads/2022/12/bc5c9f8f-6e44-4dfc-b1a9-0bc888c1218f-204x300.jpg" alt="" width="592" height="872" srcset="https://149400697.v2.pressablecdn.com/wp-content/uploads/2022/12/bc5c9f8f-6e44-4dfc-b1a9-0bc888c1218f-204x300.jpg 204w , https://149400697.v2.pressablecdn.com/wp-content/uploads/2022/12/bc5c9f8f-6e44-4dfc-b1a9-0bc888c1218f.jpg 592w " sizes="auto, (max-width: 592px) 100vw, 592px" /></p>
<p>As an actual human and not a bot, I had no idea how to answer. Is this a joke? (Seems not.) Is it a Magritte-like existential question? (It&#8217;s not a bicycle. It&#8217;s a drawing of a bicycle. Actually, it&#8217;s a photograph of a drawing of a bicycle. No, it&#8217;s really a computer image of a photograph of a drawing of a bicycle.) Am I overthinking this? (Definitely.) I stared at the screen, paralyzed, for way too long.</p>
<p>It&#8217;s probably the best CAPTCHA I have ever encountered; a computer would have just answered.</p>
<p>(In the end, I treated the drawing as a real bicycle and selected the appropriate squares&#8230;and it seemed to like that.)</p>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>LastPass Security Breach</title>
		<link>https://www.newenglandsp.com/2022/12/lastpass-security-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=lastpass-security-breach</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Fri, 02 Dec 2022 12:09:45 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://www.schneier.com/?p=66298</guid>

					<description><![CDATA[The company was hacked, and customer information accessed. No passwords were compromised.
]]></description>
										<content:encoded><![CDATA[<p>The company <a href="https://www.bleepingcomputer.com/news/security/lastpass-says-hackers-accessed-customer-data-in-new-breach/">was</a> <a href="https://www.theregister.com/2022/12/01/lastpass/">hacked</a>, and customer information accessed. No passwords were compromised.</p>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>Sirius XM Software Vulnerability</title>
		<link>https://www.newenglandsp.com/2022/12/sirius-xm-software-vulnerability/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=sirius-xm-software-vulnerability</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Thu, 01 Dec 2022 15:10:32 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://www.schneier.com/?p=66296</guid>

					<description><![CDATA[<p>This is <a href="https://gizmodo.com/sirius-xm-bug-honda-nissan-acura-hack-1849836987">new</a>:</p>
<blockquote><p>Newly revealed <a href="https://twitter.com/samwcyo/status/1597792097175674880">research</a> shows that a number of major car brands, including Honda, Nissan, Infiniti, and Acura, were affected by a previously undisclosed security bug that would have allowed a savvy hacker to hijack vehicles and steal user data. According to researchers, the bug was in the car’s Sirius XM telematics infrastructure and would have allowed a hacker to remotely locate a vehicle, unlock and start it, flash the lights, honk the horn, pop the trunk, and access sensitive customer info like the owner’s name, phone number, address, and vehicle details...</p></blockquote>]]></description>
										<content:encoded><![CDATA[<p>This is <a href="https://gizmodo.com/sirius-xm-bug-honda-nissan-acura-hack-1849836987">new</a>:</p>
<blockquote>
<p>Newly revealed <a href="https://twitter.com/samwcyo/status/1597792097175674880">research</a> shows that a number of major car brands, including Honda, Nissan, Infiniti, and Acura, were affected by a previously undisclosed security bug that would have allowed a savvy hacker to hijack vehicles and steal user data. According to researchers, the bug was in the car&#8217;s Sirius XM telematics infrastructure and would have allowed a hacker to remotely locate a vehicle, unlock and start it, flash the lights, honk the horn, pop the trunk, and access sensitive customer info like the owner&#8217;s name, phone number, address, and vehicle details.</p>
</blockquote>
<p>Cars are just computers with four wheels and an engine. It&#8217;s no surprise that the software is vulnerable, and that everything is connected.</p>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
		<item>
		<title>Facebook Fined $276M under GDPR</title>
		<link>https://www.newenglandsp.com/2022/11/facebook-fined-276m-under-gdpr/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=facebook-fined-276m-under-gdpr</link>
		
		<dc:creator><![CDATA[Ed Gardner]]></dc:creator>
		<pubDate>Wed, 30 Nov 2022 12:00:51 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://www.schneier.com/?p=66286</guid>

					<description><![CDATA[Facebook&#8212;Meta&#8212;was just fined $276 million (USD) for a data leak that included full names, birth dates, phone numbers, and location.
Meta&#8217;s total fine by the Data Protection Commission is over $700 million. Total GDPR fines are over €2...]]></description>
										<content:encoded><![CDATA[<p>Facebook&#8212;Meta&#8212;was <a href="https://www.theverge.com/2022/11/28/23481786/meta-fine-facebook-data-leak-ireland-dpc-gdpr">just fined</a> $276 million (USD) for a data leak that included full names, birth dates, phone numbers, and location.</p>
<p>Meta&#8217;s total fine by the Data Protection Commission is over $700 million. <a href="https://www.enforcementtracker.com/?insights">Total GDPR fines</a> are over €2 billion (EUR) since 2018.</p>
]]></content:encoded>
					
		
		<enclosure url="" length="0" type="" />

			</item>
	</channel>
</rss>
