Source: – Author: 1 The AI race is on! It’s easy to lose track of the latest developments and possibilities, and yet everyone wants to see...
Month: August 2023
Evacuation of 30,000 hackers – Week in security with Tony Anscombe – Source:
Source: – Author: 1 DEF CON, the annual hacker convention in Las Vegas, was interrupted on Saturday evening when authorities evacuated the event’s venue due to...
DEF CON 31: US DoD urges hackers to go and hack ‘AI’ – Source:
Source: – Author: 1 The limits of current AI need to be tested before we can rely on their output Original Post URL: Category & Tags:...
Mass-spreading campaign targeting Zimbra users – Source:
Source: – Author: 1 ESET researchers have observed a new phishing campaign targeting users of the Zimbra Collaboration email server. Original Post URL: Category & Tags:...
DEF CON 31: Robot vacuums may be doing more than they claim – Source:
Source: – Author: 1 When it comes to privacy, it remains complicated and near impossible for a consumer to make an informed decision. Original Post URL:...
Black Hat 2023: Hacking the police (at least their radios) – Source:
Source: – Author: 1 Hiding behind a black box and hoping no one will hack it has been routinely proven to be unwise and less secure....
Black Hat 2023: How AI changes the monetization of search – Source:
Source: – Author: 1 Search engines, AI, and monetization in the new era Original Post URL: Category & Tags: – Views: 0
Black Hat 2023: AI gets big defender prize money – Source:
Source: – Author: 1 Black Hat is big on AI this year, and for a good reason Original Post URL: Category & Tags: – Views: 0
Black Hat 2023: ‘Teenage’ AI not enough for cyberthreat intelligence – Source:
Source: – Author: 1 Current LLMs are just not mature enough for high-level tasks Original Post URL: Category & Tags: – Views: 0
20k security folks in the desert – Week in security with Tony Anscombe – Source:
Source: – Author: 1 Unsurprisingly, artificial intelligence took the center stage at this year’s edition of Black Hat, one of the world’s largest gatherings of cybersecurity...
Black Hat 2023: Cyberwar fire-and-forget-me-not – Source:
Source: – Author: 1 What happens to cyberweapons after a cyberwar? Original Post URL: Category & Tags: – Views: 0
MoustachedBouncer: Espionage against foreign diplomats in Belarus – Source:
Source: – Author: 1 Long-term espionage against diplomats, leveraging email-based C&C protocols, C++ modular backdoors, and adversary-in-the-middle (AitM) attacks… Sounds like the infamous Turla? Think again!...
These 7 items should be on your CISO checklist for 2024 – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: As a Chief Information Security Officer (CISO), you’re entrusted with orchestrating a harmonious convergence of technology, strategic acumen, and...
Friday Squid Blogging: China’s Squid Fishing Ban Ineffective – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier China imposed a “pilot program banning fishing in parts of the south-west Atlantic Ocean from July to October, and parts...
Hacking Food Labeling Laws – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier This article talks about new Mexican laws about food labeling, and the lengths to which food manufacturers are going to...
Kroll Employee SIM-Swapped for Crypto Investor Data – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs Security consulting giant Kroll disclosed today that a SIM-swapping attack against one of its employees led to the theft of user...
China-linked Flax Typhoon APT targets Taiwan – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini China-linked APT group Flax Typhoon targeted dozens of organizations in Taiwan as part of a suspected espionage campaign. Microsoft linked...
Cisco Talos Research: New Lazarus Group Attack Malware Campaign Hits UK & US Businesses – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet The Cisco Talos report exposes new malware used by the group to target Internet backbone infrastructure and healthcare organizations in...
XLoader Malware Variant Targets MacOS Disguised as OfficeNote App – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet A new variant of malware called XLoader is targeting macOS users. XLoader’s execution, functionalities and distribution are detailed. Image: Sashkin/Adobe...
Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack – Source:thehackernews.com
Source: thehackernews.com – Author: . Aug 26, 2023THNData Breach / SIM Swapping Risk and financial advisory solutions provider Kroll on Friday disclosed that one of its...
Tor turns to proof-of-work puzzles to defend onion network from DDoS attacks – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Tor, which stands for The Onion Router, weathered a massive distributed denial-of-service (DDoS) storm from June last year through to...
How to Choose the Best XDR Solution for Your Organization? – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Andreea Chebac The fact that malicious software gets smarter and more sophisticated every day that goes by is no news to any...
Genworth Financial Under Investigation for Data Breach – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 SAN FRANCISCO, Aug. 24, 2023 /PRNewswire/ — Schubert Jonckheer & Kolbe LLP is investigating a data breach impacting the personal information of over...
China Unleashes Flax Typhoon APT to Live Off the Land, Microsoft Warns – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading A China-backed advanced persistent threat (APT) group dubbed Flax Typhoon has installed a web of persistent,...
Luna Grabber Malware Targets Roblox Gaming Devs – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Since the start of this month, researchers at ReversingLabs have found a host of malicious, multistage packages...
‘Whiffy Recon’ Malware Transmits Device Location Every 60 Seconds – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nathan Eddy, Contributing Writer, Dark Reading Researchers have uncovered the “Whiffy Recon” malware being deployed by the SmokeLoader botnet, which is a...
Is Bias in AI Algorithms a Threat to Cloud Security? – Source: www.darkreading.com
Source: www.darkreading.com – Author: Amir Shachar, Director of AI and Research, Skyhawk Security Artificial intelligence (AI) has been helping humans in IT security operations since the...
NIST Publishes First Draft Standards for Post-Quantum Cryptography – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jeffrey Schwartz, Contributing Writer, Dark Reading The first draft standards for quantum-resistant public key cryptography based on algorithms chosen by the National...
Data breach at French govt agency exposes info of 10 million people – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Pôle emploi, France’s governmental unemployment registration and financial aid agency, is informing of a data breach that exposed data belonging...
MSI: Recent wave of Windows blue screens linked to MSI motherboards – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan MSI has officially confirmed the recent surge of blue screens of death (BSODs) encountered by Windows users after installing this...