Category: AI in news

Apple announces a new privacy feature in iOS that will allow you to hide and lock away your apps – but will be philanderers who benefit the most? And an ex-police officer is arrested for extortion. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham…

Read More

Jun 13, 2024NewsroomCyber Crime / Ransomware The Cyber Police of Ukraine has announced the arrest of a local man who is suspected to have offered their services to LockBit and Conti ransomware groups. The unnamed 28-year-old native of the Kharkiv region allegedly specialized in the development of crypters to encrypt and obfuscate malicious payloads in…

Read More

Jun 13, 2024NewsroomMobile Security / Vulnerability Google has warned that a security flaw impacting Pixel Firmware has been exploited in the wild as a zero-day. The high-severity vulnerability, tagged as CVE-2024-32896, has been described as an elevation of privilege issue in Pixel Firmware. The company did not share any additional details related to the nature…

Read More

Jun 13, 2024NewsroomCyber Attack / Malware A previously undocumented cross-platform malware codenamed Noodle RAT has been put to use by Chinese-speaking threat actors either for espionage or cybercrime for years. While this backdoor was previously categorized as a variant of Gh0st RAT and Rekoobe, Trend Micro security researcher Hara Hiroaki said “this backdoor is not…

Read More

Questions to think through during the tabletop include: How long does the organization keep backups? How long does it take to restore from backups and has that process actually been tested? The tabletop also invites discussions around how the organization is prepared to respond to the discovery of unauthorized administrative activity, who would be notified,…

Read More

That exposed company names, LDAP usernames, email addresses, and the version number of the company’s Purity software but no “compromising information such as passwords for array access, or any of the data that is stored on the customer systems,” a statement said. The company said it was monitoring its infrastructure for unusual activity and had…

Read More

“An attacker who successfully exploited this vulnerability could bypass Outlook registry block lists and enable the creation of malicious DLL files,” the company said. The arbitrary code execution occurs with the privileges of the current user, so, in order to fully take over a system, attackers would have to combine it with a privilege escalation…

Read More

Jun 12, 2024NewsroomKubernetes / Endpoint Security Cybersecurity researchers have warned of an ongoing cryptojacking campaign targeting misconfigured Kubernetes clusters to mine Dero cryptocurrency. Cloud security firm Wiz, which shed light on the activity, said it’s an updated variant of a financially motivated operation that was first documented by CrowdStrike in March 2023. “In this incident,…

Read More

Upgrades to Databricks’ Mosaic AI, a deeper collaboration with Nvidia and the open-sourcing of Unity Catalog are among the biggest updates from Summit 2024. Upgrades to Databricks’ Mosaic AI unified tooling product for artificial intelligence and machine learning. A deeper collaboration with Nvidia. And the open-sourcing of Unity Catalog. These are some of the biggest…

Read More

However, noted Jeremy Kirk, analyst at Intel 471, not all claims of AI use may be accurate. “We use the word ‘purportedly’ to represent that it is a claim being made by a threat actor and that it is frequently unclear exactly to what extent AI has been incorporated into a product, what LLM model…

Read More