Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 47

Aug 7, 2023

FBI, CISA, and NSA reveal top exploited vulnerabilities of 2022

Posted by in category: cybercrime/malcode

In collaboration with CISA, the NSA, and the FBI, Five Eyes cybersecurity authorities have issued today a list of the 12 most exploited vulnerabilities throughout 2022.

Cybersecurity agencies in the United States, Australia, Canada, New Zealand, and the United Kingdom called on organizations worldwide to address these security flaws and deploy patch management systems to minimize their exposure to potential attacks.

Threat actors increasingly focused their attacks on outdated software vulnerabilities rather than recently disclosed ones during the previous year, specifically targeting systems left unpatched and exposed on the Internet.

Aug 5, 2023

This Bangladesh Hacktivist Group Targets Critical Infrastructure — and It Isn’t Trying to Hide

Posted by in category: cybercrime/malcode

This post is also available in: he עברית (Hebrew)

A hacktivist group called “Mysterious Team Bangladesh” attacked over 750 times this year using the DDoS (Distributed Denial of Service) method and defaced over 70 websites. According to research performed by cyber security firm Group-IB, they seem to be driven by political and religious reasons.

“Mysterious Team Bangladesh” was founded in 2020 by a threat actor nicknamed “D4RK TSN” and is it unclear whether it originates from Bangladesh. Their activity peaked in May of 2023 after announcing a large-scale campaign against India.

Jul 31, 2023

New Android Malware CherryBlos Utilizing OCR to Steal Sensitive Data

Posted by in categories: cryptocurrencies, cybercrime/malcode, robotics/AI

Beware of CherryBlos: the new Android malware that’s out to steal your cryptocurrency!

Jul 30, 2023

Linux version of Abyss Locker ransomware targets VMware ESXi servers

Posted by in categories: cybercrime/malcode, encryption

The Abyss Locker operation is the latest to develop a Linux encryptor to target VMware’s ESXi virtual machines platform in attacks on the enterprise.

As the enterprise shifts from individual servers to virtual machines for better resource management, performance, and disaster recovery, ransomware gangs create encryptors focused on targeting the platform.

With VMware ESXi being one of the most popular virtual machine platforms, almost every ransomware gang has begun to release Linux encryptors to encrypt all virtual servers on a device.

Jul 25, 2023

Kindly check out my Cybercrime Magazine & Georgetown University Podcast and my interview

Posted by in categories: cybercrime/malcode, robotics/AI

“Guarding The Digital Frontier. AI As A Cyber Weapon”

Thank you!

Continue reading “Kindly check out my Cybercrime Magazine & Georgetown University Podcast and my interview” »

Jul 25, 2023

Banking Sector Targeted in Open-Source Software Supply Chain Attacks

Posted by in categories: cybercrime/malcode, finance

Cybersecurity researchers said they have discovered what they say is the first open-source software supply chain attacks specifically targeting the banking sector.

“These attacks showcased advanced techniques, including targeting specific components in web assets of the victim bank by attaching malicious functionalities to it,” Checkmarx said in a report published last week.

“The attackers employed deceptive tactics such as creating a fake LinkedIn profile to appear credible and customized command-and-control (C2) centers for each target, exploiting legitimate services for illicit activities.”

Jul 20, 2023

APT41 hackers target Android users with WyrmSpy, DragonEgg spyware

Posted by in categories: cybercrime/malcode, robotics/AI

The Chinese state-backed APT41 hacking group is targeting Android devices with two newly discovered spyware strains dubbed WyrmSpy and DragonEgg by Lookout security researchers.

APT41 is one of the oldest state hacking groups with a history of targeting various industries in the USA, Asia, and Europe.

They are known for conducting cyber-espionage operations against entities across various industry sectors, including software development, hardware manufacturing, think tanks, telcos, universities, and foreign governments.

Jul 14, 2023

Tesla may adopt Apple AirPlay for better audio — and Apple Music

Posted by in categories: cybercrime/malcode, Elon Musk, media & arts, mobile phones, sustainability, transportation

While Tesla famously won’t support CarPlay, code found in its iOS app update points to at least testing of AirPlay in its cars.

It’s never been possible to use Apple’s CarPlay in Teslas — not without a hack, and a convoluted one at that — but CEO Elon Musk has previously hinted at AirPlay support.

Now according to the unofficial “Tesla App Updates (iOS)” account on Twitter, the latest version of Tesla’s iPhone app includes a mention of AirPlay in its code.

Jul 10, 2023

AI vs. Cyber Threats: The Battle for Cybersecurity Dominance

Posted by in categories: cybercrime/malcode, robotics/AI

Welcome to PyGrid AI, the place to come for all things Artificial Intelligence (AI). Our blog publishes articles from experts in the field that cover a wide range of topics related to AI. Whether you are looking for the latest news, research findings, or practical advice on how to use AI, you will find it here. We strive to provide the most up-to-date information on AI, as well as thoughtful commentary, to help you make the most of this exciting technology. Thank you for visiting AI Formation, and please come back often!

Jul 8, 2023

13 Principles for Using AI Responsibly

Posted by in categories: business, cybercrime/malcode, robotics/AI

The competitive nature of AI development poses a dilemma for organizations, as prioritizing speed may lead to neglecting ethical guidelines, bias detection, and safety measures. Known and emerging concerns associated with AI in the workplace include the spread of misinformation, copyright and intellectual property concerns, cybersecurity, data privacy, as well as navigating rapid and ambiguous regulations. To mitigate these risks, we propose thirteen principles for responsible AI at work.

Page-utils class= article-utils—vertical hide-for-print data-js-target= page-utils data-id= tag: blogs.harvardbusiness.org, 2007/03/31:999.359663 data-title=13 Principles for Using AI Responsibly data-url=/2023/06/13-principles-for-using-ai-responsibly data-topic= Technology and analytics data-authors= Brian Spisak; Louis B. Rosenberg; Max Beilby data-content-type= Digital Article data-content-image=/resources/images/article_assets/2023/06/Jun23_30_200245321-001-383x215.jpg data-summary=

Companies need to consider a set of risks as they explore how to adopt new tools.

Page 47 of 223First4445464748495051Last