News
-
"Clop Gang Stolen Data From Major North Carolina Hospitals"The Microsoft-owned healthcare technology company Nuance has disclosed that the Clop extortion gang stole personal data on major North Carolina hospitals as part of the Progress MOVEit Transfer campaign.
-
"Modeling Social Media Behaviors to Combat Misinformation"Social media manipulation is used to spread false narratives, influence democratic processes, and more. However, not everyone with whom you disagree on social media is a bot. Misinformation strategies have continued to evolve.
-
"New AMBERSQUID Cryptojacking Operation Targets Uncommon AWS Services"A novel cloud-native cryptojacking operation has targeted Amazon Web Services (AWS) offerings such as AWS Amplify, AWS Fargate, and Amazon SageMaker to mine cryptocurrency. Sysdig has given the malicious cyber activity the codename AMBERSQUID.
-
"Microsoft Flushes Out 'Ncurses' Gremlins"The "ncurses" programming library contains multiple memory corruption vulnerabilities that allow attackers to target applications running in macOS, Linux, and FreeBSD.
-
"BlackCat Ransomware Hits Azure Storage With Sphynx Encryptor"The BlackCat (ALPHV) ransomware group encrypts Azure cloud storage using stolen Microsoft accounts and the recently discovered Sphynx encryptor.
-
"Kubernetes Vulnerability Allows RCE on Windows Endpoints"Three high-severity Kubernetes vulnerabilities, tracked as CVE-2023-3676, CVE-2023-3893, and CVE-2023-3955, could enable attackers to remotely execute code and take control of all Windows nodes in the Kubernetes cluster.
-
"Researchers Develop Adversarial Training Methods to Improve Machine Learning-Based Malware Detection Software"Machine Learning (ML) has changed how computer-related tasks are considered and performed. Its ability to identify patterns and process massive amounts of data lends itself to many applications.
-
"LSU Computer Science Professor Leading Project to Increase Security in Federated Learning"Federated learning has garnered attention for its potential to bolster privacy, security, and efficacy across multiple industries. This technique is sometimes subjected to "critical learning" to improve its quality and robustness.
-
"ChatGPT Jailbreaking Forums Proliferate in Dark Web Communities"The weaponization of generative Artificial Intelligence (AI) tools, such as ChatGPT, is taking shape.
-
"New 'MetaStealer' Malware Targets Intel-Based macOS Systems"MetaStealer, a new malware designed to steal information from Intel-based macOS computers, has been discovered in the wild.
-
"Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family"3AM is a new ransomware family that was detected in a single incident where an unidentified affiliate attempted to deliver LockBit, attributed to Bitwise Spider or Syrphid, to the target network but failed.
-
"Microsoft Teams Phishing: Enterprises Targeted by Ransomware Access Broker"A threat actor known for providing ransomware groups with initial access to enterprise systems has used Microsoft Teams to phish employees.