IINA provides ongoing analysis of international affairs both by region—such as North America, China, and Europe—and by such topics as human security, nontraditional security threats, and cyber security. The articles on this site, written by experts at the Sasakawa Peace Foundation and guest contributors, are carefully selected for their objectivity, accuracy, timeliness, and relevance for Japan.
Category: cybercrime/malcode – Page 6
Forescout Research – Vedere Labs examines cyberattacks in Japan and gives risk mitigation guidance on OT security using best practices.
The bills also call for establishing an independent organization to supervise cyberdefense operations and file relevant reports to parliament.
CVE-2024–54085 in AMI MegaRAC BMC allows remote control, malware deployment, and server damage; patches released March 11, 2025.
331 Android apps with 60M+ downloads ran full-screen ads, stole credentials, and bypassed security in a large-scale ad fraud and phishing scheme.
Arizona-based Western Alliance Bank is notifying nearly 22,000 customers their personal information was stolen in October after a third-party vendor’s secure file transfer software was breached.
Western Alliance is a wholly owned subsidiary of Western Alliance Bancorporation, a leading U.S. banking company with over $80 billion in assets.
The bank first revealed in a February SEC filing that the attackers exploited a zero-day vulnerability in the third-party software (disclosed by the vendor on October 27, 2024) to hack a limited number of Western Alliance systems and exfiltrate files stored on the compromised devices.
Originally released December 2023._ In today’s episode, host Luisa Rodriguez speaks to Nita Farahany — professor of law and philosophy at Duke Law School — about applications of cutting-edge neurotechnology.
They cover:
• How close we are to actual mind reading.
• How hacking neural interfaces could cure depression.
• How companies might use neural data in the workplace — like tracking how productive you are, or using your emotional states against you in negotiations.
• How close we are to being able to unlock our phones by singing a song in our heads.
• How neurodata has been used for interrogations, and even criminal prosecutions.
• The possibility of linking brains to the point where you could experience exactly the same thing as another person.
• Military applications of this tech, including the possibility of one soldier controlling swarms of drones with their mind.
• And plenty more.
In this episode:
• Luisa’s intro [00:00:00]
• Applications of new neurotechnology and security and surveillance [00:04:25]
• Controlling swarms of drones [00:12:34]
• Brain-to-brain communication [00:20:18]
• Identifying targets subconsciously [00:33:08]
• Neuroweapons [00:37:11]
• Neurodata and mental privacy [00:44:53]
• Neurodata in criminal cases [00:58:30]
• Effects in the workplace [01:05:45]
• Rapid advances [01:18:03]
• Regulation and cognitive rights [01:24:04]
• Brain-computer interfaces and cognitive enhancement [01:26:24]
• The risks of getting really deep into someone’s brain [01:41:52]
• Best-case and worst-case scenarios [01:49:00]
• Current work in this space [01:51:03]
• Watching kids grow up [01:57:03]
The 80,000 Hours Podcast features unusually in-depth conversations about the world’s most pressing problems and what you can do to solve them.
Learn more, read the summary and find the full transcript on the 80,000 Hours website:
Nita Farahany on the neurotechnology already being used to convict criminals and manipulate workers
Unpatched Edimax IC-7100 flaw (CVE-2025–1316) exploited for Mirai botnet malware since May 2024, enabling DDoS attacks via default credentials.
Hackers exploit CSS in emails to bypass spam filters and track user actions, raising privacy concerns.
LockBit developer Rostislav Panev extradited to U.S. after aiding ransomware group’s $500M cybercrime spree.