News
-
"Researchers Develop Adversarial Training Methods to Improve Machine Learning-Based Malware Detection Software"Machine Learning (ML) has changed how computer-related tasks are considered and performed. Its ability to identify patterns and process massive amounts of data lends itself to many applications. When it comes to malware detection, ML has streamlined a…
-
"LSU Computer Science Professor Leading Project to Increase Security in Federated Learning"Federated learning has garnered attention for its potential to bolster privacy, security, and efficacy across multiple industries. This technique is sometimes subjected to "critical learning" to improve its quality and robustness. However, during these…
-
"Cloud to Blame for Almost all Security Vulnerabilities"According to security researchers at Palo Alto Networks' Unit 42, four out of five (80.3%) security vulnerabilities observed in organizations across all sectors come from a cloud environment. In a newly published report, the researchers outlined…
-
"ChatGPT Jailbreaking Forums Proliferate in Dark Web Communities"The weaponization of generative Artificial Intelligence (AI) tools, such as ChatGPT, is taking shape. In online communities, threat actors are collaborating on new methods to circumvent ChatGPT's ethics rules, also known as "jailbreaking." Hackers are…
-
"New 'MetaStealer' Malware Targets Intel-Based macOS Systems"MetaStealer, a new malware designed to steal information from Intel-based macOS computers, has been discovered in the wild. MetaStealer, not to be confused with the 'META' information stealer malware that gained popularity last year, is a Go-based…
-
"Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family"3AM is a new ransomware family that was detected in a single incident where an unidentified affiliate attempted to deliver LockBit, attributed to Bitwise Spider or Syrphid, to the target network but failed. According to the Symantec Threat Hunter Team,…
-
"Microsoft Teams Phishing: Enterprises Targeted by Ransomware Access Broker"A threat actor known for providing ransomware groups with initial access to enterprise systems has used Microsoft Teams to phish employees. According to Microsoft threat researchers, Storm-0324 likely relies on the publicly available TeamsPhisher tool…
-
"New Tool Skewers Socially Engineered Attack Ads"Online ads are often leveraged in personal cyberattacks, which can lead to the download of unwanted software and other malicious files. Researchers at the Georgia Institute of Technology are fighting deceptive online ads with an innovative solution…
-
"Researchers Used Wi-Fi Signals to See Through Walls. Game-Changing Breakthrough? Or Privacy Nightmare Waiting to Happen?"Using Wi-Fi signals, scientists have developed a technology that enables people to see objects and read letters through walls. The system, developed by UC Santa Barbara researchers, traces the edges of objects on the opposite side of solid barriers. In…
-
"Ransomware Gang Takes Credit for Disruptive MGM Resorts Cyberattack"A known ransomware gang has recently taken credit for the highly disruptive cyberattack on MGM Resorts, and the hospitality and entertainment giant has yet to restore many of the impacted systems. It is unknown how long the hackers had access to…
-
"NSA, US Federal Agencies Advise on Deepfake Threats"The National Security Agency (NSA) and US federal agency partners have issued new guidance regarding deepfakes. This emerging threat may pose a cybersecurity challenge for National Security Systems (NSS), the Department of Defense (DoD), and Defense…
-
"Playing Hide and Seek with a New Breed of Malware Threatening Millions of Users"Georgia Tech's Cyber Forensics Innovation (CyFI) Lab discovered that Web App Engaged (WAE) malware has increased by 226 percent since 2020. Therefore, the team created a tool that enables cybersecurity incident responders to purge almost 80 percent of…