Category: AI in news

Jun 06, 2024NewsroomBotnet / DDoS Attack The distributed denial-of-service (DDoS) botnet known as Muhstik has been observed leveraging a now-patched security flaw impacting Apache RocketMQ to co-opt susceptible servers and expand its scale. “Muhstik is a well-known threat targeting IoT devices and Linux-based servers, notorious for its ability to infect devices and utilize them for…

Read More

“As more AI models are developed and more organizations are involved, it’s crucial they include legal safeguards in their operations,” Jain said. “This shifts legal liability to the model provider. While this may slow down innovation, it ensures that companies are also responsible for legal compliance, potentially restricting smaller players from entering the market.” Enterprises…

Read More

Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each story shines a light on underground activities, the threat actors involved, and why you should care, along with what you can do to mitigate risk. In an increasingly interconnected world, supply chain attacks have emerged…

Read More

Drones, some coloured cardboard, and a piece of tinfoil may be all the kit you need to crash a robot-driven taxi, and a rapper is accused of using Justin Bieber’s name to defraud a TV company. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham…

Read More

Jun 06, 2024The Hacker NewsPassword Security / Dark Web Tom works for a reputable financial institution. He has a long, complex password that would be near-impossible to guess. He’s memorized it by heart, so he started using it for his social media accounts and on his personal devices too. Unbeknownst to Tom, one of these…

Read More

Jun 06, 2024NewsroomData Encryption / Privacy Google has announced plans to store Maps Timeline data locally on users’ devices instead of their Google account effective December 1, 2024. The changes were originally announced by the tech giant in December 2023, alongside changes to the auto-delete control when enabling Location History by setting it to three…

Read More

Jun 06, 2024NewsroomSoftware Security / Data Theft Cybersecurity researchers have discovered a malicious Python package uploaded to the Python Package Index (PyPI) repository that’s designed to deliver an information stealer called Lumma (aka LummaC2). The package in question is crytic-compilers, a typosquatted version of a legitimate library named crytic-compile. The rogue package was downloaded 441…

Read More

But that’s not what has some in the security industry concerned. Additional software called Recall will take snapshots and images and store them locally on the device so that you can review and roll back to remind yourself of what file, website, or app you were using in the past. The Recall feature introduces some…

Read More

“The threat actors leveraged many novel evasion techniques, such as overwriting ntdll.dll in memory to unhook the Sophos AV agent process from the kernel, abusing AV software for sideloading, and using various techniques to test the most efficient and evasive methods of executing their payloads,” the researchers said. The attackers used several malware payloads that…

Read More

In 2024, the CSO30 Australia will be judged based on the core pillars of business value and leadership. Judges will assess cybersecurity innovations introduced over the past two years that have improved an organisation’s security and operations, as well as how a cybersecurity leader has demonstrated leadership both within the organisation and across the wider…

Read More