Toggle light / dark theme

The speed of innovation in bioelectronics and critical sensors gets a new boost with the unveiling of a simple, time-saving technique for the fast prototyping of devices.

A research team at KTH Royal Institute of Technology and Stockholm University reported a simple way to fabricate electrochemical transistors using a standard Nanoscribe 3D micro printer. Without cleanroom environments, solvents, or chemicals, the researchers demonstrated that 3D micro printers could be hacked to laser print and micropattern semiconducting, conducting, and insulating polymers.

Anna Herland, professor in Micro-and Nanosystems at KTH, says the printing of these polymers is a key step in prototyping new kinds of electrochemical transistors for medical implants, wearable electronics and biosensors.

Security experts at the University of Florida, in collaboration with CertiK, a security audit company, have uncovered a potential cybersecurity threat that could result in smartphones catching fire when placed on wireless chargers.

According to TechXplore, this discovery highlights vulnerabilities in the Qi communication-based feedback control system used in inductive chargers, which wirelessly transfer energy to devices through electromagnetic fields.

The Anatsa banking trojan has been targeting users in Europe by infecting Android devices through malware droppers hosted on Google Play.

Over the past four months, security researchers noticed five campaigns tailored to deliver the malware to users in the UK, Germany, Spain, Slovakia, Slovenia, and the Czech Republic.

Researchers at fraud detection company ThreatFabric noticed an increase of Anatsa activity since November, with at least 150,000 infections.

The Cactus ransomware gang claims they stole 1.5TB of data from Schneider Electric after breaching the company’s network last month.

25MB of allegedly stolen were also leaked on the operation’s dark web leak site today as proof of the threat actor’s claims, together with snapshots showing several American citizens’ passports and non-disclosure agreement document scans.

As BleepingComputer first reported, the ransomware group gained access to the energy management and automation giant’s Sustainability Business division on January 17th.

The fourth group is Curium, an Iranian group that has used LLMs to generate phishing emails and code to evade antivirus detection. Chinese state-affiliated hackers have also used LLMs for research, scripting, translations, and refining their tools.

Fight AI with AI

Microsoft and OpenAI say they have not detected any significant attacks using LLMs yet, but they have been shutting down all accounts and assets associated with these groups. “At the same time, we feel this is important research to publish to expose early-stage, incremental moves that we observe well-known threat actors attempting, and share information on how we are blocking and countering them with the defender community,” says Microsoft.

This post is also available in: he עברית (Hebrew)

HP Wolf Security’s latest threat insights disclosure put a spotlight on DarkGate – a group of web-based criminals using legal advertising tools to enhance their spam-based malware attacks.

The security report claims DarkGate has been operating as a malware provider since 2018, with an apparent shift in tactics last year of using legitimate advertisement networks “to track victims and evade detection.” The claims are that by using ad services, threat actors can analyze which lures generate clicks and infect the most users – helping them refine campaigns for maximum impact.