Archive for the ‘cybercrime/malcode’ category: Page 4

Apr 25, 2023

New All-in-One “EvilExtractor” Stealer for Windows Systems Surfaces on the Dark Web

Posted by in categories: cybercrime/malcode, education

A new “all-in-one” stealer malware named EvilExtractor (also spelled Evil Extractor) is being marketed for sale for other threat actors to steal data and files from Windows systems.

“It includes several modules that all work via an FTP service,” Fortinet FortiGuard Labs researcher Cara Lin said. “It also contains environment checking and Anti-VM functions. Its primary purpose seems to be to steal browser data and information from compromised endpoints and then upload it to the attacker’s FTP server.”

The network security company said it observed a surge in attacks spreading the malware in the wild in March 2023, with a majority of the victims located in Europe and the U.S. While marketed as an educational tool, EvilExtractor has been adopted by threat actors for use as an information stealer.

Apr 25, 2023

This Harvard Law Professor is an Expert on Digital Technology

Posted by in categories: cybercrime/malcode, governance, internet, law, policy, robotics/AI

Type: departments.



Continue reading “This Harvard Law Professor is an Expert on Digital Technology” »

Apr 25, 2023

Intel Let Google Cloud Hack Its New Secure Chips and Found 10 Bugs

Posted by in category: cybercrime/malcode

To protect its Confidential Computing cloud infrastructure and gain critical insights, Google leans on its relationships with chipmakers.

Apr 24, 2023

Machine learning framework classifies pneumonia on chest X-rays

Posted by in categories: biotech/medical, cybercrime/malcode, education, mathematics, robotics/AI

Pneumonia is a potentially fatal lung infection that progresses rapidly. Patients with pneumonia symptoms – such as a dry, hacking cough, breathing difficulties and high fever – generally receive a stethoscope examination of the lungs, followed by a chest X-ray to confirm diagnosis. Distinguishing between bacterial and viral pneumonia, however, remains a challenge, as both have similar clinical presentation.

Mathematical modelling and artificial intelligence could help improve the accuracy of disease diagnosis from radiographic images. Deep learning has become increasingly popular for medical image classification, and several studies have explored the use of convolutional neural network (CNN) models to automatically identify pneumonia from chest X-ray images. It’s critical, however, to create efficient models that can analyse large numbers of medical images without false negatives.

Now, K M Abubeker and S Baskar at the Karpagam Academy of Higher Education in India have created a novel machine learning framework for pneumonia classification of chest X-ray images on a graphics processing unit (GPU). They describe their strategy in Machine Learning: Science and Technology.

Apr 24, 2023

ChatGPT may hinder the cybersecurity industry

Posted by in categories: cybercrime/malcode, internet, robotics/AI

Join top executives in San Francisco on July 11–12, to hear how leaders are integrating and optimizing AI investments for success. Learn More

Since its launch in November 2022, ChatGPT, an artificial intelligence (AI) chatbot, has been causing quite a stir because of the software’s surprisingly human and accurate responses.

The auto-generative system reached a record-breaking 100 million monthly active users only two months after launching. However, while its popularity continues to grow, the current discussion within the cybersecurity industry is whether this type of technology will aid in making the internet safer or play right into the hands of those trying to cause chaos.

Apr 17, 2023

What it will look like if China launches cyberattacks in the U.S.

Posted by in categories: cybercrime/malcode, government, internet, military

Chinese hackers could also attack the networks of companies that provide services to the military or to critical infrastructure operators, holding their systems hostage for ransom payments.

“If you get the right supply chain, it can have a lot of effects against a lot of targets,” said John Hultquist, head of Mandiant Intelligence Analysis at Google Cloud.

Continue reading “What it will look like if China launches cyberattacks in the U.S.” »

Apr 17, 2023

With Security Copilot, Microsoft brings the power of AI to cyberdefense

Posted by in categories: cybercrime/malcode, robotics/AI

Trained across security and networking disciplines and armed with trillions of data signals, Security Copilot dramatically increases the reach, speed and effectiveness of any security team

REDMOND, Wash. — March 28, 2023 — Microsoft Corp. on Tuesday announced it is bringing the next generation of AI to cybersecurity with the launch of Microsoft Security Copilot, giving defenders a much-needed tool to quickly detect and respond to threats and better understand the threat landscape overall. Security Copilot will combine Microsoft’s vast threat intelligence footprint with industry-leading expertise to augment the work of security professionals through an easy-to-use AI assistant.

“Today the odds remain stacked against cybersecurity professionals. Too often, they fight an asymmetric battle against relentless and sophisticated attackers,” said Vasu Jakkal, corporate vice president, Microsoft Security. “With Security Copilot, we are shifting the balance of power into our favor. Security Copilot is the first and only generative AI security product enabling defenders to move at the speed and scale of AI.”

Apr 17, 2023

Android malware infiltrates 60 Google Play apps with 100M installs

Posted by in categories: cybercrime/malcode, mobile phones

A new Android malware named ‘Goldoson’ has infiltrated the platform’s official app store, Google Play, through 60 apps that collectively have 100 million downloads.

Apr 16, 2023

New Ultrasonic Acoustic Attack Targeting Microphones and Voice Assistants Gives Remote Access to Most Smart Devices

Posted by in category: cybercrime/malcode

Researchers in the United States have developed a new ultrasonic acoustic attack that can covertly give hackers remote access to many smart devices by turning the device’s microphone and voice assistant against them.

The attack works by using ultrasonic acoustic signals that are inaudible to humans but can be picked up by voice assistants on smart devices, a type of cyberattack commonly referred to as a “SurfingAttack” or “ DolphinAttack.”

With a SurfingAttack, a hacker can modulate voice commands into silent, near-ultrasonic signals, allowing them to issue commands to a smart device, all while a user is blissfully unaware their device has been hijacked.

Apr 16, 2023

How I Hacked The US Government Aged 16 | Minutes With | @LADbible

Posted by in categories: cybercrime/malcode, government

In this weeks episode of Minutes With we sat down with Mustafa Al-Bassam, a former member of Anonymous and one of the founders of LulzSec.

Mustafa tells us how he got in to hacking and how he ended up getting involved in attacks on The Sun, The Westboro Baptist Church and even the US Government.

Continue reading “How I Hacked The US Government Aged 16 | Minutes With | @LADbible” »

Page 4 of 17212345678Last