News
-
"Artists Fighting Back Against AI by Poisoning Their Images"There are tools that can poison data and cause Artificial Intelligence (AI) models to malfunction, but the question is whether using them is a justified response by artists to copyright infringement or a potential cybersecurity threat.
-
"Cybercriminals Implemented Artificial Intelligence (AI) for Invoice Fraud"Resecurity has discovered "GXC Team," a cybercriminal group specializing in developing tools for online banking theft, ecommerce deception, and Internet scams.
-
"A Ransomware Payments Ban Risks Criminalizing Victims"According to industry experts, government bans on ransomware payments risk criminalizing victims.
-
"Ivanti Warns Critical EPM Bug Lets Hackers Hijack Enrolled Devices"A critical Remote Code Execution (RCE) vulnerability in Ivanti's Endpoint Management (EPM) software could have enabled unauthenticated attackers to take control of enrolled devices or the core server.
-
"Machine Learning Helps Fuzzing Find Hardware Bugs"A new study titled "MABFuzz: Multi-Armed Bandit Algorithms for Fuzzing Processors" delves into the fuzzing technique that introduces commands and prompts to a chip in order to cause the system to behave erratically and unpredictably.
-
"SpectralBlur: New macOS Backdoor Threat from North Korean Hackers"Researchers have discovered a new Apple macOS backdoor called SpectralBlur, which overlaps with KANDYKORN, a known malware family linked to North Korean threat actors.
-
"US Says 19 People Charged Following 2019 Takedown of xDedic Cybercrime Marketplace"The US Justice Department (DoJ) recently announced that 19 people involved in the management and use of the xDedic cybercrime marketplace have been charged following its takedown in 2019.
-
"NIST Identifies Types of Cyberattacks That Manipulate Behavior of AI Systems"In a new publication titled "Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations (NIST.AI.100-2)," computer scientists at the National Institute of Standards and Technology (NIST) and their collaborators identify the vul
-
"Threat Group Using Rare Data Transfer Tactic in New RemcosRAT Campaign"An adversary, tracked as UNC-0050, known for using the RemcosRAT remote surveillance and control tool against organizations in Ukraine, is back with a new method to transfer data that evades Endpoint Detection and Response (EDR) systems.
-
"Energy Department Offering $70 Million for Security, Resilience Research"The US Department of Energy (DOE) recently announced that it’s offering up to $70 million in funding for research into technologies that can boost the resilience and security of the energy sector.
-
"Nigerian Arrested, Charged in $7.5 Million BEC Scheme Targeting US Charities"A Nigerian national was recently arrested in Ghana and faces charges in the US for his role in a business email compromise (BEC) scheme involving two charitable organizations.
-
Post-Quantum: Cybersecurity Speaker SeriesBailey Bickley, this season’s host of NSA’s Cybersecurity Speaker Series, speaks with Adrian Stanger and Bill Layton on preparing for Post-Quantum.