БЛОГ

Archive for the ‘cybercrime/malcode’ category: Page 26

Nov 21, 2023

2024: The Year Microsoft’s AI-Driven Zero Trust Vision Delivers

Posted by in categories: cybercrime/malcode, robotics/AI

Are you ready to bring more awareness to your brand? Consider becoming a sponsor for The AI Impact Tour. Learn more about the opportunities here.

Microsoft’s vision for zero trust security is galvanized around generative AI and reflects how identity and network access must constantly improve to counter complex cyberattacks.

Their many security announcements at Ignite 2023 reflect how they’re architecting the future of zero trust with greater adaptability and contextual intelligence designed in. The Microsoft Ignite 2023 Book of News overviews the new products announced this week at the event.

Nov 16, 2023

Codegen raises new cash to automate software engineering tasks

Posted by in categories: cybercrime/malcode, employment, robotics/AI

face_with_colon_three Basically although some or all coding jobs could be absorbed I remain positive because now everyone be a god now when infinite computation comes out and also infinite agi.


Jay Hack, an AI researcher with a background in natural language processing and computer vision, came to the realization several years ago that large language models (LLMs) — think OpenAI’s GPT-4 or ChatGPT — have the potential to make developers more productive by translating natural language requests into code.

After working at Palantir as a machine learning engineer and building and selling Mira, an AI-powered shopping startup for cosmetics, Hack began experimenting with LLMs to execute pull requests — the process of merging new code changes with main project repositories. With the help of a small team, Hack slowly expanded these experiments into a platform, Codegen, that attempts to automate as many mundane, repetitive software engineering tasks as possible leveraging LLMs.

Continue reading “Codegen raises new cash to automate software engineering tasks” »

Nov 16, 2023

Hackers Could Exploit Google Workspace and Cloud Platform for Ransomware Attacks

Posted by in categories: biotech/medical, cybercrime/malcode

A set of novel attack methods has been demonstrated against Google Workspace and the Google Cloud Platform that could be potentially leveraged by threat actors to conduct ransomware, data exfiltration, and password recovery attacks.

“Starting from a single compromised machine, threat actors could progress in several ways: they could move to other cloned machines with GCPW installed, gain access to the cloud platform with custom permissions, or decrypt locally stored passwords to continue their attack beyond the Google ecosystem,” Martin Zugec, technical solutions director at Bitdefender, said in a new report.

A prerequisite for these attacks is that the bad actor has already gained access to a local machine through other means, prompting Google to mark the bug as not eligible for fixing “since it’s outside of our threat model and the behavior is in line with Chrome’s practices of storing local data.”

Nov 16, 2023

Google’s New Titan Security Key Adds Another Piece to the Password-Killing Puzzle

Posted by in category: cybercrime/malcode

As part of its announcement at the Aspen Cyber Summit in New York City today, Google also said that in 2024 it will give 100,000 of the new Titan keys to high-risk individuals around the world. The effort is part of Google’s Advanced Protection Program, which offers vulnerable users expanded account monitoring and threat protection. The company has given away Titan keys through the program in the past, and today it cited the rise of phishing attacks and upcoming global elections as two examples of the need to continue expanding the use of secure authentication methods like passkeys.

Hardware authentication tokens have unique protective benefits because they are siloed, stand-alone devices. But they still need to be rigorously secured to ensure they don’t introduce a different point of weakness. And as with any product, they can have vulnerabilities. In 2019, for example, Google recalled and replaced its Titan BLE-branded security key because of a flaw in its Bluetooth implementation.

When it comes to the new Titan generation, Google tells WIRED that, as with all of its products, it conducted an extensive internal security review on the devices and it also contracted with two external auditors, NCC Group and Ninja Labs, to conduct independent assessments of the new key.

Nov 15, 2023

Chinese company uses quantum numbers to minimize cybersecurity threats

Posted by in categories: cybercrime/malcode, quantum physics

The addition of an additional step in a long-established workflow can help reduce substantial costs show cybersecurity researchers.


Sakkmesterke/iStock.

The increasing use of cloud storage has increased the risks to data security, and cybersecurity researchers have been looking at distributed cloud storage as a plausible solution to this problem.

Nov 11, 2023

5 ways to build an Alzheimer’s-resistant brain | Lisa Genova

Posted by in categories: biotech/medical, cybercrime/malcode, food, genetics, neuroscience

Only 2% of Alzheimer’s is 100% genetic. The rest is up to your daily habits.

Up Next ► 4 ways to hack your memory https://youtu.be/SCsztDMGP7o.

Continue reading “5 ways to build an Alzheimer’s-resistant brain | Lisa Genova” »

Nov 10, 2023

BlueNoroff hackers backdoor Macs with new ObjCShellz malware

Posted by in categories: cryptocurrencies, cybercrime/malcode, finance

The North Korean-backed BlueNorOff threat group targets Apple customers with new macOS malware tracked as ObjCShellz that can open remote shells on compromised devices.

BlueNorOff is a financially motivated hacking group known for attacking cryptocurrency exchanges and financial organizations such as venture capital firms and banks worldwide.

The malicious payload observed by Jamf malware analysts (labeled ProcessRequest) communicates with the swissborg[.]blog, an attacker-controlled domain registered on May 31 and hosted at 104.168.214[.]151 (an IP address part of BlueNorOff infrastructure).

Nov 10, 2023

OpenAI blames DDoS attack for ongoing ChatGPT outage

Posted by in categories: cybercrime/malcode, robotics/AI

OpenAI has confirmed that a distributed denial-of-service (DDoS) attack is behind “periodic outages” affecting ChatGPT and its developer tools.

ChatGPT, OpenAI’s AI-powered chatbot, has been experiencing sporadic outages for the past 24 hours. Users who attempted to access the service have been greeted with a message stating that “ChatGPT is at capacity right now,” and others, including TechCrunch, have been unable to log into the service.

OpenAI CEO Sam Altman initially blamed the issue on interest in the platform’s new features, unveiled at the company’s first developer conference on Monday, “far outpacing our expectations.” OpenAI said the issue was fixed at approximately 1 p.m. PST on November 8.

Nov 9, 2023

N. Korea’s BlueNoroff Blamed for Hacking macOS Machines with ObjCShellz Malware

Posted by in categories: blockchains, cybercrime/malcode

The development arrives days after Elastic Security Labs disclosed the Lazarus Group’s use of a new macOS malware called KANDYKORN to target blockchain engineers.

Also linked to the threat actor is a macOS malware referred to as RustBucket, an AppleScript-based backdoor that’s designed to retrieve a second-stage payload from an attacker-controlled server.

In these attacks, prospective targets are lured under the pretext of offering them investment advice or a job, only to kick-start the infection chain by means of a decoy document.

Nov 9, 2023

Fake everything: how machine learning is being used to fight back against disinformation campaigns

Posted by in categories: cybercrime/malcode, food, internet, robotics/AI, sustainability

Another good use for AI. Fighting disinformation.


About 60% of adults in the US who get their news through social media have, largely unknowingly, shared false information, according to a poll by the Pew Research Center. The ease at which disinformation is spread and the severity of consequences it brings — from election hacking to character assassination — make it an issue of grave concern for us all.

Continue reading “Fake everything: how machine learning is being used to fight back against disinformation campaigns” »

Page 26 of 216First2324252627282930Last