Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 32

Feb 23, 2023

Ben Goertzel — Countering Objections to Mind Uploading

Posted by in categories: cybercrime/malcode, neuroscience

Ben Goertzel in response to some common objections covered in an article on io9 by George Dvorsky ‘You’ll Probably Never Upload Your Mind Into A Computer’: http://io9.com/you-ll-probably-never-upload-your-mind-into-a-computer-474941498

Objections are covered in order as they appear in the article:
1. Brain functions are not computable.
2. We’ll never solve the hard problem of consciousness.
3. We’ll never solve the binding problem.
4. Panpsychism is true.
5. Mind-body dualism is true.
6. It would be unethical to develop.
7. We can never be sure it works.
8. Uploaded minds would be vulnerable to hacking and abuse.

Continue reading “Ben Goertzel — Countering Objections to Mind Uploading” »

Feb 22, 2023

10 Dark Web Monitoring Tools

Posted by in category: cybercrime/malcode

Enterprises looking to get ahead of data breaches and data leaks can benefit from using dark web monitoring tools and scan for personally identifiable information and even respond to attacks. Here is a list of 10 such tools.

Feb 22, 2023

How to Detect New Threats via Suspicious Activities

Posted by in category: cybercrime/malcode

Protect yourself and your organization from the threat of unknown malware. Check out this guide to detecting suspicious behavior.

Feb 22, 2023

U.S. Cybersecurity Agency CISA Adds Three New Vulnerabilities in KEV Catalog

Posted by in category: cybercrime/malcode

CISA has updated its Known Exploited Vulnerabilities catalog with three new vulnerabilities that are currently being exploited.

Feb 22, 2023

Threat Actors Adopt Havoc Framework for Post-Exploitation in Targeted Attacks

Posted by in categories: cybercrime/malcode, government

An open source command-and-control (C2) framework known as Havoc is being adopted by threat actors as an alternative to other well-known legitimate toolkits like Cobalt Strike, Sliver, and Brute Ratel.

Cybersecurity firm Zscaler said it observed a new campaign in the beginning of January 2023 targeting an unnamed government organization that utilized Havoc.

“While C2 frameworks are prolific, the open-source Havoc framework is an advanced post-exploitation command-and-control framework capable of bypassing the most current and updated version of Windows 11 defender due to the implementation of advanced evasion techniques such as indirect syscalls and sleep obfuscation,” researchers Niraj Shivtarkar and Niraj Shivtarkar said.

Feb 17, 2023

New Mirai Botnet Variant ‘V3G4’ Exploiting 13 Flaws to Target Linux and IoT Devices

Posted by in category: cybercrime/malcode

A new variant of the notorious Mirai botnet has been found leveraging several security vulnerabilities to propagate itself to Linux and IoT devices.

Observed during the second half of 2022, the new version has been dubbed V3G4 by Palo Alto Networks Unit 42, which identified three different campaigns likely conducted by the same threat actor.

“Once the vulnerable devices are compromised, they will be fully controlled by attackers and become a part of the botnet,” Unit 42 researchers said. “The threat actor has the capability to utilize those devices to conduct further attacks, such as distributed denial-of-service (DDoS) attacks.”

Feb 16, 2023

Cybersecurity defenders are expanding their AI toolbox

Posted by in categories: cybercrime/malcode, robotics/AI

Scientists have taken a key step toward harnessing a form of artificial intelligence known as deep reinforcement learning, or DRL, to protect computer networks.

When faced with sophisticated cyberattacks in a rigorous simulation setting, was effective at stopping adversaries from reaching their goals up to 95 percent of the time. The outcome offers promise for a role for autonomous AI in proactive cyber defense.

Scientists from the Department of Energy’s Pacific Northwest National Laboratory documented their findings in a research paper and presented their work Feb. 14 at a workshop on AI for Cybersecurity during the annual meeting of the Association for the Advancement of Artificial Intelligence in Washington, D.C.

Feb 15, 2023

Massive HTTP DDoS Attack Hits Record High of 71 Million Requests/Second

Posted by in category: cybercrime/malcode

Web infrastructure company Cloudflare on Monday disclosed that it thwarted a record-breaking distributed denial-of-service (DDoS) attack that peaked at over 71 million requests per second (RPS).

“The majority of attacks peaked in the ballpark of 50–70 million requests per second (RPS) with the largest exceeding 71 million,” the company said, calling it a “hyper-volumetric” DDoS attack.

It’s also the largest HTTP DDoS attack reported to date, more than 35% higher than the previous 46 million RPS DDoS attack that Google Cloud mitigated in June 2022.

Feb 15, 2023

Python Developers Beware: Clipper Malware Found in 450+ PyPI Packages!

Posted by in categories: cryptocurrencies, cybercrime/malcode

Heads up, Python developers! Over 451 malicious Python packages have been found in the PyPI repository, designed to steal your cryptocurrency.

Feb 11, 2023

Nanotechnology: Hacking Humans, Its Potential, and Real Risks

Posted by in categories: bioengineering, biotech/medical, cybercrime/malcode, nanotechnology

Science fiction has become a reality with recent developments toward biohacking through nanotechnology. Soon, science and industries may soon realize the potential of human hacking… but at what risk versus reward? Medical nanotechnology is one of these such topics. Many experts believe nanotechnology will pave the way for a bright, new future in improving our wellbeing. Yet, at the core of this biohacking are machines and as we’ve seen with other technologies — there are very real risks of malicious intent. In this video, we share some of the applications being developed combining nanotechnology and medicine. We also look at the potential risks found in the practice and how we may mitigate issues before they’re problematic. We also share how companies can reduce security flaws and curb public perception so the nanotechnology industry can flourish without major setbacks. Want to learn more about this budding area of science and medicine?

See our accompanying blog post for the details and be sure to dig around the site, here:

Continue reading “Nanotechnology: Hacking Humans, Its Potential, and Real Risks” »

Page 32 of 194First2930313233343536Last