News
-
"With AI Watermarking, Creators Strike Back: Backdoor Attacks Regulate Unauthorized Uses of Copyrighted or Restricted Data"Artificial Intelligence (AI) models rely on massive data sets to train their complex algorithms, but the use of these data sets for training purposes can sometimes violate the rights of the data owners. However, proving that a model used a data set…
-
"The IRS Is Sending Four Investigators Across the World to Fight Cybercrime"Beginning this summer, the Internal Revenue Service (IRS) will send four cybercrime investigators to Australia, Singapore, Colombia, and Germany, marking a significant expansion of the IRS's global efforts to combat cybercrimes, such as those involving…
-
"DHS Announces AI Task Force, Security Sprint on China-Related Threats"The US Department of Homeland Security (DHS) announced two initiatives that will directly contribute to US strategies for defending critical infrastructure and essential services against cyberattacks, physical attacks, Artificial Intelligence (AI), and…
-
"Lazarus Group Adds Linux Malware to Arsenal in Operation Dream Job"The Lazarus Group, a notorious state-sponsored threat actor with ties to North Korea, has been linked to a new campaign targeting Linux users. According to a new report by ESET, the attacks are part of a persistent and long-running activity known as…
-
"Outdated Cybersecurity Practices Leave Door Open for Criminals"According to ExtraHop, organizations experienced a considerable increase in ransomware, from an average of four attacks over five years in 2021 to four attacks over one year in 2022. Eighty-three percent of victims confessed to having paid the ransom at…
-
"Attackers Use Abandoned WordPress Plugin to Backdoor Websites"Attackers are injecting stealthy backdoors into websites using Eval PHP, an outdated WordPress plugin. Eval PHP is an outdated WordPress plugin that enables site administrators to embed PHP code on WordPress pages and posts, which is then executed when…
-
"'GhostToken' Opens Google Accounts to Permanent Infection"A security flaw in Google's Cloud Platform (GCP) could have allowed cybercriminals to hide an unremovable, malicious app within a victim's Google account, rendering the account permanently infected. The "GhostToken" vulnerability was identified and…
-
"North Korean Hacker Suspected in 3CX Software Supply Chain Attack"The 3CX Desktop App software has been reportedly compromised via a prior software supply chain breach, with a North Korean actor suspected to be responsible. Security researchers at Mandiant stated the initial compromise was traced back to malware…
-
"VCU Researchers Fight Cybercrime With New Digital Tools and Techniques"Irfan Ahmed, Ph.D., provides defenders with digital forensic tools and the knowledge to use them in cybersecurity. Ahmed is an associate professor of computer science and the director of the Virginia Commonwealth University (VCU) Engineering Department…
-
"Turning AI to Crime"The Artificial Intelligence (AI) chatbot ChatGPT has been generating a great deal of buzz in the news and on social media regarding its ability to write blogs, software source code, and frameworks. People are sharing what they have done with the Large…
-
"OpenAI's Hunger for Data Is Coming Back to Bite It"Following a temporary suspension in Italy and several investigations in other European Union countries, OpenAI has just over a week to comply with European data protection laws. Failure to comply could result in costly fines, data deletion…
-
"Cisco Patches Critical Vulnerabilities in Industrial Network Director, Modeling Labs"Cisco recently announced patches for critical vulnerabilities impacting its Industrial Network Director and Modeling Labs solutions. Designed for industrial network management, Industrial Network Director (IND) provides visibility into network and…