Category: AI in news
Drones, some coloured cardboard, and a piece of tinfoil may be all the kit you need to crash a robot-driven taxi, and a rapper is accused of using Justin Bieber’s name to defraud a TV company. All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham…
Read MoreJun 06, 2024The Hacker NewsPassword Security / Dark Web Tom works for a reputable financial institution. He has a long, complex password that would be near-impossible to guess. He’s memorized it by heart, so he started using it for his social media accounts and on his personal devices too. Unbeknownst to Tom, one of these…
Read MoreJun 06, 2024NewsroomData Encryption / Privacy Google has announced plans to store Maps Timeline data locally on users’ devices instead of their Google account effective December 1, 2024. The changes were originally announced by the tech giant in December 2023, alongside changes to the auto-delete control when enabling Location History by setting it to three…
Read MoreJun 06, 2024NewsroomSoftware Security / Data Theft Cybersecurity researchers have discovered a malicious Python package uploaded to the Python Package Index (PyPI) repository that’s designed to deliver an information stealer called Lumma (aka LummaC2). The package in question is crytic-compilers, a typosquatted version of a legitimate library named crytic-compile. The rogue package was downloaded 441…
Read MoreBut that’s not what has some in the security industry concerned. Additional software called Recall will take snapshots and images and store them locally on the device so that you can review and roll back to remind yourself of what file, website, or app you were using in the past. The Recall feature introduces some…
Read More“The threat actors leveraged many novel evasion techniques, such as overwriting ntdll.dll in memory to unhook the Sophos AV agent process from the kernel, abusing AV software for sideloading, and using various techniques to test the most efficient and evasive methods of executing their payloads,” the researchers said. The attackers used several malware payloads that…
Read MoreIn 2024, the CSO30 Australia will be judged based on the core pillars of business value and leadership. Judges will assess cybersecurity innovations introduced over the past two years that have improved an organisation’s security and operations, as well as how a cybersecurity leader has demonstrated leadership both within the organisation and across the wider…
Read MoreCRN Executive Editor Steve Burke spotlights All Solutions CEO Nalit Patel and the valuable life lesson that he has used to build a thriving solution provider business. When Nalit Patel was a young boy growing up in Nairobi, Kenya, his grandfather taught him and his father a valuable life lesson that he has used to…
Read MoreSecurity leaders live under the constant pressure of evolving and scaling threats, technology trends, and business requirements. Many of us have had to play the rough catch-up game when we failed to ‘surf the wave’ of a movement and didn’t have quite the right skilled team ready. If it hasn’t happened to you yet, congratulations,…
Read MoreThe incident has badly affected two National Health Service (NHS) hospital trusts responsible for several of the capital’s busiest centers, including St Thomas’ Hospital, King’s College Hospital, Guy’s Hospital, Royal Brompton Hospital, and Evelina London Children’s Hospital. By June 4, the hospitals started cancelling transplant operations and described blood transfusions as “particularly affected” in an…
Read MoreRecent Posts
- Fake AI video generators infect Windows, macOS with infostealers
- T-Mobile confirms it was hacked in recent wave of telecom breaches
- GitHub projects targeted with malicious commits to frame researcher
- NSO Group used another WhatsApp zero-day after being sued, court docs say
- Ingram Micro’s Sahoo: ‘Don’t React To AI.’ Act On AI’