Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 99

Sep 21, 2021

A New Wave of Malware Attack Targeting Organizations in South America

Posted by in category: cybercrime/malcode

Several RAT malware are being used to target South American organizations.

Sep 21, 2021

New Malware Targets Windows Subsystem for Linux to Evade Detection

Posted by in category: cybercrime/malcode

A new malware strain uses the Windows Subsystem for Linux to launch stealthy attacks.

Sep 21, 2021

Cybercriminals recreate Cobalt Strike in Linux

Posted by in category: cybercrime/malcode

The new malware strain has gone unnoticed by detection tools.

Sep 20, 2021

AI Can Write Code Like Humans —Bugs and All

Posted by in categories: cybercrime/malcode, robotics/AI

New tools that help developers write software also generate similar mistakes.

Sep 17, 2021

Will AGI incorporated machines ever become Conscious? | The SCI-AI Podcast Ep. 10 — Daniel Jue

Posted by in categories: biological, cybercrime/malcode, neuroscience, physics, robotics/AI

In this podcast, I have invited Daniel Jue, one of the youngest Entrepreneurs of the field of AGI. Daniel is an Independent Artificial General Intelligence researcher at Cognami in the US. He has worked supporting the US Department of Defense, including Data Fusion and analytic development for DARPA, the Defense Advanced Research Projects Agency, whose mission is to prevent technological surprise by potential adversaries. In addition he worked with scientists and engineers at IronNet CyberSecurity, a startup with DARPA and NSA heritage who have recently gone public. In March of 2,021 Daniel took on full time AGI research, drawing upon the fields of Computer Science, Neuroscience, Philosophy and Psychology. Some of his major influences have been Jacques Pitrat’s CAIA (An Artificial AI Scientist) project, Jean Piaget’s childhood development theories and Spiking Neural Networks. He sees a generalizable substrate at the basis for AGI, where engineers design the “physics” in which intelligent behavior could emerge.

SUBSCRIBE to our YouTube Channel and “ring the bell” for all the latest videos from ‘The SCI-AI Podcast’ at https://bit.ly/3y6ISwL
- Listen to us on Buzzsprout: https://feeds.buzzsprout.com/1816580.rss.
- LIKE us on Facebook: https://www.facebook.com/podcazter.
- FOLLOW us on Twitter: https://twitter.com/MeharVik.
- FOLLOW us on Instagram: https://www.instagram.com/brightvik/
- SUBSCRIBE to our channel on Apple Podcast: https://apple.co/3gllCVL
- SUBSCRIBE to our channel on Spotify Podcast: https://spoti.fi/2WfCTZx.

Continue reading “Will AGI incorporated machines ever become Conscious? | The SCI-AI Podcast Ep. 10 — Daniel Jue” »

Sep 16, 2021

The man hacking hot water to save the planet

Posted by in categories: cybercrime/malcode, education, sustainability

No matter the price tag, the industry also has to convince consumers it’s worth their time to upgrade to new technologies.

“It’s difficult to get homeowners to change from the technology that they’re used to, especially in staid devices like water heaters, because they think of it as a utility: open the faucet, water comes out,” Callahan told Freethink. “There’s an education process to get them to understand that there’s a better, cheaper, faster, cooler way to [heat water].”

Continue reading “The man hacking hot water to save the planet” »

Sep 11, 2021

Experts Link Sidewalk Malware Attacks to Grayfly Chinese Hacker Group

Posted by in category: cybercrime/malcode

Chinese hackers may be behind Sidewalk malware attacks, experts say.

Sep 10, 2021

Researchers unveil ransomware detection and recovery method for SSDs

Posted by in categories: cybercrime/malcode, electronics

Forward-looking: A team of researchers have devised a new method for protecting SSDs from ransomware attacks. It can detect ransomware, stop it in its tracks, and even recover stolen data in a matter of seconds. The cost should only be a minor increase in the SSD’s latency.

The Register spoke with the researchers, who come from Inha University, the Daegu Gyeongbuk Institute of Science & Technology (DGIST), the University of Central Florida (UCF), and the Cyber Security Department at Ewha Womans University (EWU). The system, called SSD-Insider, is supposedly almost 100 percent accurate and has been tested on real-world ransomware.

Continue reading “Researchers unveil ransomware detection and recovery method for SSDs” »

Sep 9, 2021

Hackers leak passwords for 500,000 Fortinet VPN accounts

Posted by in category: cybercrime/malcode

A threat actor has leaked a list of almost 500,000 Fortinet VPN login names and passwords that were allegedly scraped from exploitable devices last summer.

While the threat actor states that the exploited Fortinet vulnerability has since been patched, they claim that many VPN credentials are still valid.

This leak is a serious incident as the VPN credentials could allow threat actors to access a network to perform data exfiltration, install malware, and perform ransomware attacks.

Sep 2, 2021

What is AS-REP Roasting attack, really?

Posted by in category: cybercrime/malcode

AS-REP Roasting is the technique that allows retrieving password hashes for users that have this flag set in Active Directory. Additionally, various cybersecurity and hacking tools allow cracking the TGTs harvested from Active Directory. These include Rubeus and Hashcat.

Using a tool like Rubeus, attackers can find the accounts that do not require preauthentication and then extract the ticket-granting ticket (TGT) data for cracking the password offline.

Data can be transformed into a format that can be cracked by an offline tool such as Hashcat, which can use brute force password cracking against the hashes. This process incorporates the use of a dictionary file for brute-force password guessing.