Cybersecurity News that Matters

Cybersecurity News that Matters

[Weekend Briefing] Awaiting summer camp

Illustration by Areum Hwang, The Readable

by Dain Oh

Aug. 02, 2024
10:55 PM GMT+9

“Weekend Briefing” is a weekly newsletter sent to subscribers of The Readable every Friday. Our journalists select important news items from the previous week on topics ranging from privacy to policy development in cybersecurity, all to help you stay abreast of the latest breaking issues. And not only is this provided free of cost to our subscribers, but the briefing contains new content exclusive to subscribers, such as our insightful industrial reports.


In August of last year, The Readable traveled along the west coast of the United States to attend three major cybersecurity events: USENIX, Black Hat, and DEF CON. A year has passed, and I will be in Las Vegas next week to witness the hackers’ summer camp once again. At the Black Hat conference, I will hear from experts on topics such as election security, misinformation, artificial intelligence, privacy, and the relationship between media and hackers. DEF CON 32 will feature the semifinal of the AI Cyber Challenge (AIxCC) along with discussions on emerging topics. For this weekend, I’ve included a few news articles from last year’s events in Vegas. The next briefing will be delivered on August 11, following the conclusion of DEF CON’s competition.

Minkyung Shin has been covering the controversy in South Korea surrounding leaked military secrets. Hongeun Im interviewed an expert to review threats from AI data poisoning. Additionally, a new organization led by South Korea’s intelligence agency was launched today, a story I have just reported.

This is Dain Oh reporting from South Korea, and here is your weekend briefing.

1. South Korean military secrets allegedly leaked to North Korea, sparking security controversy

Illustration by Areum Hwang, The Readable

The South Korean military is embroiled in a security controversy following the alleged leak of highly sensitive military secrets, including a list of undercover intelligence operatives, to foreign countries, a situation disclosed to the public by a member of the National Assembly on July 27.

Kim Min-seok, a member of the main opposition Democratic Party, revealed that the nation’s defense intelligence had been compromised by a military officer who allegedly provided a foreign agent with confidential information. The agent, a Korean Chinese individual with suspected ties to the North Korean intelligence agency, was fed crucial data including the real names, ages, and operational countries of undercover agents working under false identities. This information was transferred to the agent several times this year. Authorities suspect that some of the leaked information has reached North Korea.

On July 30, the South Korean defense ministry announced that it had requested an arrest warrant for the military officer accused of leaking military secrets to a foreign agent. The suspect claimed that the incident was a result of external hacking of their personal computer. The Korea Defense Intelligence Command (KDIC), a government organization responsible for safeguarding military secrets where the suspect worked for, concluded the breach did not result from hacking attacks. READ MORE

2. AI data poisoning, the next biggest threat to cybersecurity?

Kim Hyoung-shick, a cybersecurity specialist and professor at Sungkyunkwan University. Photo provided by Kim Hyoung-shick; Illustration by Daeun Lee, The Readable

Artificial intelligence data poisoning, particularly the backdoor attack, is anticipated to be among the most challenging threats to counter in the realm of cybersecurity in the coming years. This insight was shared by Kim Hyoung-shick, a cybersecurity specialist and professor at Sungkyunkwan University, in an interview with The Readable on July 25. Kim’s recent paper, titled “Poisoned ChatGPT Finds Work for Idle Hands: Exploring Developers’ Coding Practices with Insecure Suggestions from Poisoned AI Models,” was presented at the IEEE Symposium on Security and Privacy 2024 in May.

AI data poisoning is a type of cyberattack that targets AI models, manipulating them to misclassify objects or recommend malicious items. According to Kim, even large-scale models like ChatGPT and Microsoft Copilot are vulnerable to such attacks. This is because most models rely on open-source data that can be uploaded by anyone on the internet. Multiple research papers have demonstrated the feasibility of this type of attack.

AI data poisoning can manifest in several ways, including data injection, data manipulation, and backdoor attacks. Data injection involves inserting invalid data into the AI model or dataset, while data manipulation is achieved by modifying or deleting valid data. Backdoor attacks combine elements of both data injection and manipulation, but they also involve a “trigger” that prompts a specific response. In an experiment conducted by Kim’s laboratory, for example, a model could be poisoned to fail to recognize individuals wearing red hats, with the red hat serving as the trigger to mislead the model. READ MORE

3. South Korea launches nationwide cyber hotline for emergencies

Yoon Oh-jun, the Third Deputy Director of the National Intelligence Service (NIS), is speaking at an opening ceremony of the nation’s joint incident response team ‘Cyber 119’ on August 2. Source: NIS

The National Intelligence Service (NIS) of South Korea has assembled a joint incident response team comprising 46 public organizations to tackle cybersecurity concerns.

In a statement released on August 2, the NIS announced the launch of ‘Cyber 119,’ a joint team consisting of law enforcement agencies, local governments, and other organizations in critical infrastructure sectors across the nation. In South Korea, 119 is the emergency telephone number for calling the fire brigade or an ambulance, similar to how 911 is used in the United States.

Cyber 119 includes the Ministry of Science and ICT, the Prosecution Service, the Korean National Police Agency, Korea Electric Power Corporation, Korea Hydro & Nuclear Power, the Korea Internet & Security Agency, and 13 local government offices. These organizations are divided into five regions and have 130 cyber experts on board. READ MORE

4. [Black Hat 2023] Viasat, NSA urge building partnership, sharing their experience amid satellite hack

Mark Colaluca, Vice President and Chief Information Security Officer at Viasat, left, is sharing the company’s experience in February 2022 along with Kristina Walter, who was the former director of the National Security Agency’s Cybersecurity Collaboration Center (CCC) during the KA-SAT hacking. The satellite sabotage resulted in power outages for thousands of Ukrainians. Photo by Dain Oh, The Readable

Las Vegas, NV ― Black Hat ― Forging a partnership between commercial and government entities proves to be pivotal in establishing an effective incident response process, as emphasized by the key players who collaborated to mitigate the unprecedented satellite sabotage that targeted Ukraine in 2022.

During the 26th Black Hat USA event on Thursday, Mark Colaluca, Vice President and Chief Information Security Officer at Viasat, shed light on a common oversight. “For many organizations, incident response is the most neglected muscle group,” Colaluca stated. He also offered insights into the cyberattacks against KA-SAT and expanded on the intricate dynamics at play, explaining, “Most of what we experienced was a complicated ecosystem which involved distributors, salespeople, and satellite people on servers, with many of these people being in different countries and facing a language barrier, making for a chaotic scene in the beginning.” READ MORE

5. [Black Hat 2023] US national cyber director stresses the importance of human element in security

The acting director of the Office of the National Cyber Director, Kemba Walden, on the right, is delivering a keynote speech in front of international security professionals at the Black Hat USA on Thursday. Photo by Kuksung Nam, The Readable

Las Vegas, NV ― Black Hat ― On Thursday, the White House’s acting national cyber director emphasized a crucial point: humans play a vital role in the realm of cyberspace. She also noted the significance of having a robust cyber workforce, adding that the absence of such a workforce poses a significant challenge to the nation’s security.

Kemba Walden, who has been serving as the acting director of the Office of the National Cyber Director since February, recently took the stage as a keynote speaker at the Black Hat USA event. In her address, she spoke to an audience of international security professionals about the groundbreaking National Cyber Workforce and Education Strategy (NCWES) released on July 31. This strategy marks a significant milestone as the first of its kind in this domain.

“We found that people are so integral to cyberspace that we had to do a whole separate strategy,” said Walden. “Some hundreds of thousands of cyber jobs are unfilled and that is a national security problem in my mind.” READ MORE

6. [Black Hat 2023] Disclosing security flaws could damage white hat hackers’ creativity, researcher urges

Ali Ahmed, an assistant professor in the Department of Information Systems at the College of Business, University of Wisconsin-Eau Claire, is presenting his ongoing research at the Black Hat conference on Thursday. Photo by Kuksung Nam, The Readable

Las Vegas, NV ― Black Hat ― A security academic raised an important concern on Thursday, highlighting that an organization’s choice to publicly disclose resolved vulnerabilities might inadvertently hinder ethical hackers’ capacity to uncover previously unknown security weaknesses.

At the Black Hat conference, Ali Ahmed, an assistant professor in the Department of Information Systems at the College of Business, University of Wisconsin-Eau Claire, unveiled his ongoing research. This study delves into the intricate connection between bug bounty programs and the behaviors exhibited by white hat hackers participating in these initiatives.

Brian Lee, an assistant professor in the Department of Supply Chain and Information Systems at the Pennsylvania State University, and Amit Deokar, an associate Dean of Undergraduate Programs at the Manning School of Business, University of Massachusetts Lowell, participated in the research. READ MORE

7. [Black Hat 2023] Psychological safety leads to trust by design, GitHub security strategist says

John Swanson, the Security Strategy Director at GitHub, is sharing his experience about the 2FA enrollment campaign that he led across the GitHub community. Photo by Dain Oh, The Readable

Las Vegas, NV ― Black Hat ― According to insights from a security strategist at GitHub on Thursday, the success of a company’s endeavor to implement two-factor authentication (2FA) for its employees hinges on the concept of psychological safety.

During a briefing session held at Black Hat, John Swanson, the Security Strategy Director at GitHub, delved into the remarkable journey of the world’s largest open-source community, where millions of developers were guided toward adopting two-factor authentication. GitHub’s initiative was driven by the goal of enhancing global safety by safeguarding developers and fortifying the software supply chain right from its inception at the hands of developers.

“In order to reduce the chances of both open source and private software projects being compromised through social engineering or other methods of account takeover, broad use of 2FA remains the best option to harden our ecosystem’s defenses,” elaborated Swanson, introducing his talk. READ MORE

8. [Black Hat 2023] The five coolest vendors at Black Hat USA 2023: Oligo, Veriti, Mobb, SafeBreach, CyberGRX

Illustration by Areum Hwang, The Readable

Black Hat USA 2023 was pure bliss for those of us who are passionate about cutting-edge security innovation. Before the event, The Readable reached out to more than 70 vendors through hundreds of emails and selected around 20 for in-person meetings. In this article, we’re excited to spotlight the five coolest vendors that we met in Las Vegas last week. Our selections are based solely on their innovative contributions and are not influenced by any sponsorships. This article may serve as a roadmap for our readers to discover the latest trends in the cybersecurity industry. READ MORE

More stories this week…

9. [CISA] CISA Names First Chief Artificial Intelligence Officer

10. [NBC] Release of Russian hackers believed to be first U.S. prisoner swap to include international cybercriminals

11. [WSJ] Delta CEO Says CrowdStrike Tech Outage Cost It $500 Million

12. [NPR] Washington Post CEO accused in court of deceiving police about U.K. hacking scandal

13. [Phylum] Report: Q2 2024 Evolution of Software Supply Chain Security

Subscription

Subscribe to our newsletter for the latest insights and trends. Tailor your subscription to fit your interests:

By subscribing, you agree to our Privacy Policy. We respect your privacy and are committed to protecting your personal data. Your email address will only be used to send you the information you have requested, and you can unsubscribe at any time through the link provided in our emails.

  • Dain Oh
    : Author

    Dain Oh is a distinguished journalist based in South Korea, recognized for her exceptional contributions to the field. As the founder and editor-in-chief of The Readable, she has demonstrated her expe...

    View all posts
Stay Ahead with The Readable's Cybersecurity Insights