"LSU Computer Science Professor Leading Project to Increase Security in Federated Learning"

"LSU Computer Science Professor Leading Project to Increase Security in Federated Learning"

Federated learning has garnered attention for its potential to bolster privacy, security, and efficacy across multiple industries. This technique is sometimes subjected to "critical learning" to improve its quality and robustness. However, during these times, external actors have the opportunity to initiate precise and damaging attacks.

Submitted by Gregory Rigby on

"ChatGPT Jailbreaking Forums Proliferate in Dark Web Communities"

"ChatGPT Jailbreaking Forums Proliferate in Dark Web Communities"

The weaponization of generative Artificial Intelligence (AI) tools, such as ChatGPT, is taking shape. In online communities, threat actors are collaborating on new methods to circumvent ChatGPT's ethics rules, also known as "jailbreaking." Hackers are building a network of new tools to exploit or create Large Language Models (LLMs) for malicious purposes. It appears that ChatGPT has sparked a frenzy among cybercriminal forums. Since December, hackers have been looking for new and inventive ways to maliciously manipulate ChatGPT and open-source LLMs.

Submitted by Gregory Rigby on

"New 'MetaStealer' Malware Targets Intel-Based macOS Systems"

"New 'MetaStealer' Malware Targets Intel-Based macOS Systems"

MetaStealer, a new malware designed to steal information from Intel-based macOS computers, has been discovered in the wild. MetaStealer, not to be confused with the 'META' information stealer malware that gained popularity last year, is a Go-based malware capable of evading Apple's built-in antivirus technology XProtect. SentinelOne reports that it has been tracking the malware for the past few months and has observed a strange social engineering component in its distribution.

Submitted by Gregory Rigby on

"Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family"

"Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family"

3AM is a new ransomware family that was detected in a single incident where an unidentified affiliate attempted to deliver LockBit, attributed to Bitwise Spider or Syrphid, to the target network but failed. According to the Symantec Threat Hunter Team, 3AM is written in Rust and appears to be a brand-new malware family. Before encrypting files, the ransomware tries to disable multiple services on the infected computer. Once encryption is complete, Volume Shadow (VSS) copies are deleted. The new ransomware family's name derives from its ransom note.

Submitted by Gregory Rigby on

"Microsoft Teams Phishing: Enterprises Targeted by Ransomware Access Broker"

"Microsoft Teams Phishing: Enterprises Targeted by Ransomware Access Broker"

A threat actor known for providing ransomware groups with initial access to enterprise systems has used Microsoft Teams to phish employees. According to Microsoft threat researchers, Storm-0324 likely relies on the publicly available TeamsPhisher tool for this activity. Storm-0324 is a temporary name designated by Microsoft to this threat actor, suggesting that the company is still not highly confident about the origin or identity of the actor behind the operation.

Submitted by Gregory Rigby on

"New Tool Skewers Socially Engineered Attack Ads"

"New Tool Skewers Socially Engineered Attack Ads"

Online ads are often leveraged in personal cyberattacks, which can lead to the download of unwanted software and other malicious files. Researchers at the Georgia Institute of Technology are fighting deceptive online ads with an innovative solution designed to combat the growing threat of online social engineering attacks by eliminating them at their source. Trident, developed by Ph.D. student Zheng Yang and his team of researchers, is an add-on compatible with Google Chrome and has been shown to block these ads by nearly 100 percent.

Submitted by Gregory Rigby on

"Researchers Used Wi-Fi Signals to See Through Walls. Game-Changing Breakthrough? Or Privacy Nightmare Waiting to Happen?"

"Researchers Used Wi-Fi Signals to See Through Walls. Game-Changing Breakthrough? Or Privacy Nightmare Waiting to Happen?"

Using Wi-Fi signals, scientists have developed a technology that enables people to see objects and read letters through walls. The system, developed by UC Santa Barbara researchers, traces the edges of objects on the opposite side of solid barriers. In one experiment, the team used the technology to decipher the word "BELIEVE" from the other side of a wall by imaging each letter individually. Three off-the-shelf Wi-Fi transmitters were used to send wireless waves in an area. The receivers were on an unmanned vehicle emulating a Wi-Fi receiver grid as it moved.

Submitted by Gregory Rigby on

"NSA, US Federal Agencies Advise on Deepfake Threats"

"NSA, US Federal Agencies Advise on Deepfake Threats"

The National Security Agency (NSA) and US federal agency partners have issued new guidance regarding deepfakes. This emerging threat may pose a cybersecurity challenge for National Security Systems (NSS), the Department of Defense (DoD), and Defense Industrial Base (DIB) organizations. They issued the Cybersecurity Information Sheet (CSI) "Contextualizing Deepfake Threats to Organizations" to help organizations identify, defend against, and respond to deepfake threats.

Submitted by Gregory Rigby on

"Playing Hide and Seek with a New Breed of Malware Threatening Millions of Users"

"Playing Hide and Seek with a New Breed of Malware Threatening Millions of Users"

Georgia Tech's Cyber Forensics Innovation (CyFI) Lab discovered that Web App Engaged (WAE) malware has increased by 226 percent since 2020. Therefore, the team created a tool that enables cybersecurity incident responders to purge almost 80 percent of discovered WAE malware by teaming up with service providers. Ph.D. student at Georgia Tech Mingxuan Yao noted that web applications have become integral to our online lives, providing services such as content delivery, data storage, and social networking, but these utilities have made web applications attractive for malware creators.

Submitted by Gregory Rigby on
Subscribe to