SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThe White House has issued an Executive Order (EO) on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence. The EO includes provisions that include new standards for AI safety and security; mandated testing for AI models to ensure they cannot be used to create weapons; and addressing privacy and job displacement.
This is a very broad initiative and you could replace every mention of “Artificial Intelligence” with “New Technology” and it would pretty much read this same. What needs to be focused on is governance and essential security hygiene of AI and one really important area: stronger authentication to enable more use of encryption and digital signatures to be enable differentiating between real information and AI-product dis/misinformation.
This is a very broad directive. Capability and content filtering has been problematic in the past, eroding trust of the user. The administration, likely CISA, is going to be issuing guidance for agency use of AI, speed acquisition of AI products and hiring of AI professionals as part of a government-wide AI talent surge. Look to where you can leverage AI, possibly with a very focused training set, to help drive innovation and opportunities.
This is a very broad statement covering numerous different areas and tasking a large number of US federal departments and agencies. This EO is less about “AI is evil we need to control it” and much more about “AI is the next big thing and the US wants to lead it.” What is interesting about this EO is not only its breadth but timing. The UK government is leading an international AI summit this week; the US made sure to release this EO the day before the summit. In addition to the EO, the US government is promoting their new https://ai.gov/ website which is all about getting people training and jobs in AI.
The long awaited EO has dropped. It is rather extensive especially in the areas of research and applications. There is considerable focus on US strategic national advantage. What is a bit surprising is that there is little on international cooperation or standards making other than multiple references to actions among ‘international allies and partners.’ Hopefully that will be corrected in multi-lateral discussions.
Large language models (LLMs) are the newest user interface to the computer. They enable us to express the result that we want in natural language. Like every new UI in the past, they make the computer a more powerful tool and open up new applications. That said, the computer remains a tool. Tools vary in quality, utility, usability, and use. The user is responsible for the selection of the tool, its application, and all the properties of the result. We forget any part of that at our peril. We should not impute authority or autonomy to the tool. While regulating the quality of the tool may be useful, it will not ensure good results. Only the user can do that.
White House
White House
Gov Infosecurity
Cyberscoop
Fedscoop
Axios
MeriTalk
Ars Technica
SC Magazine
F5 has published an advisory regarding a critical unauthenticated remote code execution vulnerability in the BIG-IP Configuration utility. The flaw affects BIG-IP versions 13.x through 17.x. F5 has released updates to fix the vulnerability. Users running unsupported versions of BIG-IP are urged to upgrade to newer, supported versions.
Big-IP from F5 is heavily used in many orgs and may even front end many commercial services. This could have a lot of impacts à la NetScaler. Unauthenticated RCE in the configuration utility would normally not be exposed to the internet but it's 2023 and all bets are off! Seeing that there is a mitigation script with a lot of detail, expect an exploit soon.
Two flaws here: CVE-2023-46747, CVSS score 9.8, unauthenticated remote code execution, which can give an attacker full admin rights, and CVE-20232-46748, CVSS score 8.8, SQLi vulnerability. When reading the affected versions, note that F5 only checks products that have not reached technical end of life, so don't assume you're not vulnerable if you're on an older release. Regardless, make sure you're moving to the most recent release with applied hotfixes. Then make sure that your traffic management user interface is not exposed to the internet or untrusted networks. The hotfixes have minimal QA testing, so you need to keep an eye out for the next scheduled software release which includes those fixes with more extensive QA, and then apply that update as well. Don't wait for the QA release, apply the hotfix now, this is going to be actively exploited.
The vulnerability affects versions back to 13.x, which means the vulnerability has been lurking around since 2017. Further, as it is a remote code execution bug with a CVSS score of 9.8, download and update your devices immediately.
F5
F5
The Register
Bleeping Computer
Security Week
Users of Google’s Chrome browser now have all unsecure HTTP requests automatically upgraded to HTTPS. The feature was rolled out to a limited pool of users in July; as of October 16, the feature is enabled for all users on the Stable channel.
This essentially makes "Strict Transport Security" the default behavior for Google Chrome, with the exception that users may still force http instead of https (but they have to deliberately do so). It may also lead to difficulties with old http only devices.
In short, the browser will attempt an HTTPS connection even if HTTP is used, falling back where needed, a slight raising of the bar, as mixed content (HTTP/HTTPS) pages, like those with forms, are still possible and sites with an HTTPS opt-out header are still respected. The behavior is for main frame navigation, not subresource requests, which are controlled by the user agent's policy on blockable and upgradable mixed content.
Another excellent security move by the Googler’s. HTTPS introduces encryption to protect user information and is therefore far more secure. Don’t make the user have to decide on security configuration; make it the default.
Bleeping Computer
GitHub
The US Federal Trade Commission has issued a final rule that requires non-banking financial institutions to report data breaches and other security event within 30 days. The rule goes into effect in April 2024 and applies to incidents affecting 500 or more individuals. The new rule amends the Safeguarding Customer Information, or Safeguards Rules.
The US has failed for the past 20 years to pass any federal data privacy laws, so this type of agency by agency/state by state mish mash of needed rules is what happens. Reporting the data required within 30 days is not onerous, and the clock does not even start until detection.
The new FTC rule appears to be redundant with state breach notification laws. That said, I do believe that the government should be made aware of cyber breaches that affect its citizens. Perhaps over time, the federal government can create one set of incident reporting rules applicable to every industry sector instead of this hodge-podge of reporting requirements at both the state and federal level.
Non-banking financial institutions include payday lenders, mortgage brokers, motor vehicle dealers, investment firms, insurance companies, asset management firms, and peer-to-peer lenders. The rule applies to incidents that affect 500 or more customers, and seems focused on unauthorized access to unencrypted information, and includes provisions for a 60-day delay of public disclosure if requested by law-enforcement. With other regulators, including local state requirements, which also have reporting requirements, you'll want to update your playbook, double checking what the most restrictive reporting requirements are, to ensure you've got all the data necessary to report within the expected interval.
With the exception of card not present fraud, which this initiative does not address, and compared to healthcare or software, this industry has been pretty clean. One does not expect this requirement to have much impact.
The UK National Cyber Security Centre (NCSC) is rolling out eligibility for its Protective Domain Name Service (PDNS) to schools. NCSC developed PDNS to prevent DNS from being used to spread malware. The service is available to eligible educational organizations at no cost.
The use of DNS filtering services should be a no-brainer for all state and local K-12 school systems.
Kudos to the UK National Cyber Security Centre (NCSC) for expanding its Protective Domain Name Service (PDNS) to schools. PDNS is already available for free to UK public sector bodies and filters out known malicious domains and IP addresses. This should help UK schools to better protect themselves. If you are in the UK and qualify for PDNS I strongly encourage you to apply for this service.
The service, planned for rollout over the next year, blocks access to known malicious sites by not resolving them. The year rollout is to make sure the service scales. The service includes both metrics for organizations about their use as well as support to resolve any issues. When implementing a secure DNS solution, make sure that all DNS lookups are routed to it, like DNS over HTTPS or TLS, aren't allowed to end-run the solution.
Kudos to the NCSC for making DNS filtering available to the UK school system. DNS filtering is a relatively straight-forward way to block malicious websites, and is one of the simplest and effective security solutions to implement. For non-UK citizens there are a number of free DNS filtering services available to you (i.e., Cloudflare, Quad9, Google Public DNS, etc).
Ransomware groups are exploiting a known vulnerability in Citrix NetScaler Application Delivery Controller and NetScaler Gateway for which a fix was released on October 10. The information disclosure vulnerability can expose session tokens. Researcher Kevin Beaumont has found roughly 20,000 exploited devices in which session tokens had been stolen. Beaumont also warned that organizations need to wipe their devices memory in addition to installing the patch.
The patches have been out for three weeks, the POC exploit is out there, and the vulnerability has a new name "Citrix Bleed," (a nod to the 2014 Heartbleed vulnerability). Time to stop planning and get this fixed. At this point, assume compromise, get your threat hunters checking those IOCs now.
Exploits are out for this and the vector is juicy.
Ars Technica
Gov Infosecurity
Double Pulsar
AssetNote
Stanford University is investigating a cybersecurity incident that affected the school’s Department of Public Safety. This is not the first cyberattack Stanford has suffered; in early 2021, a compromised Accellion file transfer system led to the theft of personal data.
Exfiltrated data includes Social Security numbers, addresses, financial, email and family information. Attackers targeted their 20-year-old Accellion FTA, which had been slated for retirement in April 2021, yet continued to operate, highlighting the criticality of replacing old technology, particularly one with known security flaws. Make sure that you've not stalled legacy service replacements indefinitely without adequate mitigations and monitoring.
The Record
The Register
Stanford
Stanford Daily
The Toronto (Canada) Public Library learned of a cybersecurity incident affecting their IT system rendering numerous services unavailable. While the library’s main site is offline, local branches remain open; the branch telephone lines are operating, and materials can still be checked out and returned there. Over the last year, cybersecurity incidents have targeted other Canadian institutions, including Toronto’s city government and Symphony Orchestra, the National Gallery of Canada, and Air Canada.
TPL is being very transparent about what they are doing and which services are impacted, and which are still available. For example, Wi-Fi in branches is still available, but the public computers are not. Another notification example to add to your reference should you ever need it.
The Record
Bleeping Computer
Toronto Public Library
On October 16, Nevada’s Clark County School District (CCSD) confirmed that it became aware of a cybersecurity incident affecting the district’s email environment earlier in the month. CCSD disabled access to Google Workspace from external accounts and did a forced reset of student passwords. Over the past week, some parents have reported receiving email that contained personal information about their children.
The attackers are emailing pilfered data to the students' parents, which includes email, birth dates, ethnicity, PSAT scores, health information, suspensions, incident reports, and more, with a claim that they were in the system for six months before letting school staff know they were there, and will continue to wreak havoc until they are either paid or blocked from access. While the claims of access and legitimacy of the proffered data are not yet validated, the interaction with parents and DataBreaches.net is sufficient to keep the water muddy. CCSD's lack of response isn't helping here. Consider the value of keeping customers informed of a breach, to include timely updates. When engaging help, don't forget to leverage law enforcement and government resources in addition to any security team you hire.
Bleeping Computer
Review Journal
News3LV
CCSD
Developers of the AI ChatBot Plugin for WordPress have released an updated version of the plugin to fix six vulnerabilities, including three critical flaws: an unauthenticated SQL injection vulnerability, an authenticated directory traversal to arbitrary file write vulnerability, and authenticated arbitrary file deletion vulnerability. Users are urged to update to version 4.9.3 or later of the plugin.
The plugin maintainer, who was notified on September 28th of the flaw, acknowledged the report the next day and released an updated plugin on October 19th. Make sure that you've auto-updated to version 4.9.3 of the plugin. Note the bugs were fixed in 4.9.1, but some were re-introduced in 4.9.2, which is why you want 4.9.3 where they are all resolved. Wordfence released firewall rules to their paid and free versions September 29th and October 29th respectively.
Flying under the Radar: The Privacy Impact of Multicast DNS
https://isc.sans.edu/diary/Flying+under+the+Radar+The+Privacy+Impact+of+multicast+DNS/30358
Size Matters for Many Security Controls
https://isc.sans.edu/diary/Size+Matters+for+Many+Security+Controls/30352
Spam or Phishing? Looking for Credentials and Passwords
https://isc.sans.edu/diary/Spam+or+Phishing+Looking+for+Credentials+Passwords/30354
Kubernetes ingress-nginx vulnerability
https://github.com/kubernetes/ingress-nginx/issues/10571
Google Chrome HTTPS Upgrade
https://github.com/dadrian/https-upgrade/blob/main/explainer.md
WordPad POC CVE-2023-36563
https://www.dillonfrankesecurity.com/posts/cve-2023-36563-wordpad-analysis/
iOS Leaks MAC Address
https://www.youtube.com/watch?v=T3XABxNogTA
Zero Day Initiative Pwn2Own Summary
https://www.zerodayinitiative.com/blog/2023/10/24/pwn2own-toronto-2023-day-one-results
https://www.zerodayinitiative.com/blog/2023/10/25/pwn2own-toronto-2023-day-two-results
https://www.zerodayinitiative.com/blog/2023/10/26/pwn2own-toronto-2023-day-three-results
Microsoft Octo Tempest Writeup
Catch up on recent editions of NewsBites or browse our full archive of expert-curated cybersecurity news.
Browse ArchiveFree technical content sponsored by SNYK LimitedRisk-based AppSec programs allow companies to focus on business critical risk throughout the entire SDLC.
How the Cloud Changes SecOps and Incident Response: Lessons from a Real-World Living-Off-The-Cloud Attack | Join us on Wed, November 15 at 3:30pm ET as our guest speakers provide practical and actionable lessons to strengthen cloud detection and response capabilities.
The bottom line: Risk centered IGA powered by ML is transforming enterprise security.
Looking Ahead to the National Cybersecurity Strategy Implementation Plan | Join Matt Bromiley and invited speakers on Wed, November 8 at 1:00pm ET for a better understanding of how organizations can prepare for the NCSIP, released by the White House in March 2023.