Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 94

Mar 11, 2022

The Incident Response Plan — Preparing for a Rainy Day

Posted by in category: cybercrime/malcode

Just as it wasn’t raining when Noah built the ark, companies must face the fact that they need to prepare — and educate the organization on — a well-thought-out response plan if a successful cyberattack does occur. Obviously, the worst time to plan your response to a cyberattack is when it happens.

With so many companies falling victim to cyberattacks, an entire cottage industry of Incident Response (IR) services has arisen. Thousands of IR engagements have helped surface best practices and preparedness guides to help those that have yet to fall victim to a cyberattack.

Recently, cybersecurity company Cynet provided an Incident Response plan Word template to help companies plan for this unfortunate occurrence.

Mar 11, 2022

AI: Hacking without Humans How Can Human Brains Be Hacked?

Posted by in categories: cybercrime/malcode, policy, privacy, robotics/AI

Anthony J. Ferrante, Global Head of Cybersecurity and Senior Managing Director, FTI Consulting, Inc.

Artificial intelligence (AI) models are built with a type of machine learning called deep neural networks (DNNs), which are similar to neurons in the human brain. DNNs make the machine capable of mimicking human behaviors like decision making, reasoning and problem solving. This presentation will discuss the security, ethical and privacy concerns surrounding this technology. Learning Objectives:1: Understand that the solution to adversarial AI will come from a combination of technology and policy.2: Learn that coordinated efforts among key stakeholders will help to build a more secure future.3: Learn how to share intelligence information in the cybersecurity community to build strong defenses.

Mar 9, 2022

Samsung says hackers breached company data and source code for Galaxy smartphones

Posted by in categories: cybercrime/malcode, mobile phones

Samsung said on Monday that hackers breached its internal company data, gaining access to some source codes of Galaxy-branded devices like smartphones.

The statement from the South Korean electronics giant comes after hacking group Lapsus$ claimed over the weekend via its Telegram channel that it has stolen 190 gigabytes of confidential Samsung source code.

Samsung did not name any specific hackers in its statement nor what precise data was stolen.

Mar 8, 2022

Elon Musk Says SpaceX Is So Busy With Ukraine That It’ll Delay Starship

Posted by in categories: cybercrime/malcode, Elon Musk, internet, satellites

Welp, Starship is delayed yet again.

SpaceX CEO Elon Musk tweeted on Friday that there would be “slight delays” ahead for the company’s experimental Mars-bound spacecraft. To blame, the billionaire said, was SpaceX having to dedicated more resources to fighting escalating cyber attacks on Starlink satellites by Russia after the space company sent Ukraine a shipment of its internet terminals.

Starship’s first launch has been delayed numerous times now, with much of it due to pending regulatory approval from the Federal Aviation Administration (FAA). However, this latest instance comes amidst a time of geopolitical turmoil caused by Russia’s invasion of Ukraine.

Mar 7, 2022

Leaked Nvidia Code-Signing Certificate Now Being Used by Malware

Posted by in category: cybercrime/malcode

Two such certificates were part of the Nvidia hack attack haul we reported on last week.


Among all the sensitive hardware and driver data spilled by hacking extortion group Lapsus$, there were some expired but still usable Nvidia code-signing certificates.

Mar 6, 2022

2 New Mozilla Firefox 0-Day Bugs Under Active Attack — Patch Your Browser ASAP!

Posted by in category: cybercrime/malcode

Mozilla has pushed out-of-band software updates to its Firefox web browser to contain two high-impact security vulnerabilities, both of which it says are being actively exploited in the wild.

Tracked as CVE-2022–26485 and CVE-2022–26486, the zero-day flaws have been described as use-after-free issues impacting the Extensible Stylesheet Language Transformations (XSLT) parameter processing and the WebGPU inter-process communication (IPC) Framework.

Mar 6, 2022

Cybercrime thrives during pandemic: Verizon 2021 Data Breach Investigations Report

Posted by in categories: biotech/medical, cybercrime/malcode

Mar 6, 2022

DIY Injection Molder Built From A Cheap Pneumatic Press

Posted by in categories: cybercrime/malcode, materials

[Kurt Schaefer] was watching YouTube videos of people making molds for injection molding purposes using what he considered to be the toy 3,018 CNC machines, and looking at the results, decided he needed a piece of the action. However, once you have molds, the next obvious issue to address is lack of access to an injection molding machine. But these things are expensive. As luck would have it, you can get a nice-looking pneumatic press for less than $350, and with a little more money spent, [Kurt] found he could convert it into a functional injection molding machine (video, embedded below), and get some half-decent results out of it.

After ordering the press on eBay, what eventually arrived was quite a mess, having clearly been inadequately packed for its weight, and had sustained some damage in transit. Despite this, it seemed the functional bits were fine, so [Kurt] decided to press on with the build. The first obvious change is the requirement of a heated chamber to deal with the feedstock material. Using an off-the-shelf injection molding chamber by buster beagle 3D, only a few standoffs and a support bracket needed machining in order to complete the mechanics. A common PID controller available from the usual suppliers, with some heat bands wrapped around the chamber, dealt with the injection temperature requirements, and some 3D printed enclosures wrapped it all up neatly.

Continue reading “DIY Injection Molder Built From A Cheap Pneumatic Press” »

Mar 5, 2022

Elon Musk says SpaceX focusing on cyber defense after Starlink signals jammed near Ukraine conflict areas

Posted by in categories: cybercrime/malcode, Elon Musk, government, internet, satellites

Musk and SpaceX sent Starlink terminals to Ukraine at the request of a government official after internet service was disrupted across the country by the Russian invasion. A shipment of Starlink ground terminals, which use an antenna and terminal to access the satellite broadband service, arrived in Ukraine by Monday Feb. 28). With the terminals in use, SpaceX is working to keep them online, Musk said.

“Some Starlink terminals near conflict areas were being jammed for several hours at a time,” Musk wrote in a Twitter statement Friday (March 1). “Our latest software update bypasses the jamming.”

I wonder how many of the satellites are damaged?

Continue reading “Elon Musk says SpaceX focusing on cyber defense after Starlink signals jammed near Ukraine conflict areas” »

Mar 4, 2022

I’ve Dealt With Foreign Cyberattacks. America Isn’t Ready for What’s Coming

Posted by in categories: business, cybercrime/malcode, economics, government, transportation

Yet the United States lacks an organized response. The weekly reports of ransomware attacks and data breaches make it clear that we’re losing this battle. That’s why America’s leaders must rethink the current cyberdefense system and rally around a centralized regulator to defend both citizens and the private sector against current and future attacks.

The decentralized nature of the American government does not lend itself to fighting foreign cyberthreats. Government agencies handle cyberregulation and threats in the sectors they oversee — an inefficient and ineffective way to address an issue that cuts across our entire economy. In just the past few months, the D.H.S.’s Transportation Security Agency announced new cybersecurity requirements for pipelines and railroads; the Federal Communications Commission put out its own proposal for telecommunication companies; the Securities and Exchange Commission voted on rules for investment advisers and funds; and the Federal Trade Commission threatened to legally pursue companies that fail to fix a newly detected software vulnerability found in many business applications. And on Capitol Hill, there are approximately 80 committees and subcommittees that claim jurisdiction over various aspects of cyberregulation.

These scattered efforts are unlikely to reduce, let alone stop, cybercrime.

Page 94 of 218First9192939495969798Last