"Researchers Create Innovative Verification Techniques to Increase Security in Artificial Intelligence and Image Processing"

"Researchers Create Innovative Verification Techniques to Increase Security in Artificial Intelligence and Image Processing"

Researchers from the IMDEA Software Institute, Carlos III University of Madrid, and NEC Laboratories Europe have developed a framework to improve verifiable computation efficiency and practicality. Their paper, "Modular Sumcheck Proofs with Applications to Machine Learning and Image Processing," addresses the scalability and modularity issues faced by general proof systems and solutions for specific AI and image processing applications.

Submitted by Gregory Rigby on

"Google Rejected 2.28 Million Risky Android Apps From Play Store in 2023"

"Google Rejected 2.28 Million Risky Android Apps From Play Store in 2023"

In 2023, Google blocked 2.28 million Android apps from Google Play for policy violations that could compromise user security. Google also blocked 333,000 Google Play accounts that uploaded malware and fraudulent apps, or repeated grave policy violations.

Submitted by Gregory Rigby on

"Honeywell: USB Malware Attacks on Industrial Orgs Becoming More Sophisticated"

"Honeywell: USB Malware Attacks on Industrial Orgs Becoming More Sophisticated"

Honeywell released its sixth annual report on USB malware attacks faced by industrial organizations, warning of increased sophistication. The company's Global Analysis, Research, and Defense (GARD) team analyzed data from a security product that detects and blocks malware on USB drives used in customers' industrial environments. Thirty-one percent of all the malware detected by Honeywell's product on USB drives was found to be part of a campaign targeting industrial systems or companies.

Submitted by Gregory Rigby on

"Thousands of Qlik Sense Servers Open to Cactus Ransomware"

"Thousands of Qlik Sense Servers Open to Cactus Ransomware"

Many organizations remain vulnerable to the Cactus ransomware group's exploitation of three flaws in the Qlik Sense data analytics and Business Intelligence (BI) platform nearly five months after security researchers warned about them. In August, the company disclosed two bugs in multiple versions of Qlik Sense Enterprise for Windows. When chained, the vulnerabilities enable remote, unauthenticated attackers to execute arbitrary code on impacted systems. In September, Qlik disclosed a vulnerability that bypassed its fixes for August's two flaws.

Submitted by Gregory Rigby on

"Study Reveals Alarming Levels of USPS Phishing Traffic"

"Study Reveals Alarming Levels of USPS Phishing Traffic"

A recent analysis by researchers at Akamai Security has shed light on the extent of phishing and smishing attacks targeting the United States Postal Service (USPS), particularly during the holiday season.  The researchers used anonymized global DNS query logs during the study. The researchers found that illegitimate domains mimicking USPS websites attracted nearly equal and sometimes higher traffic than legitimate domains, especially during peak shopping periods like Thanksgiving and Christmas.

Submitted by Adam Ekwall on

"New R Programming Vulnerability Exposes Projects to Supply Chain Attacks"

"New R Programming Vulnerability Exposes Projects to Supply Chain Attacks"

A threat actor could exploit a security flaw in the R programming language to create a malicious R Data Serialization (RDS) file that results in the execution of code when loaded and referenced. RDS is a format for serializing and storing the state of data structures or objects in R, an open source programming language applied in statistical computing, data visualization, and Machine Learning (ML). According to the Artificial Intelligence (AI) application security company HiddenLayer, the vulnerability involves using promise objects and lazy evaluation in R.

Submitted by Gregory Rigby on

"Okta Warns Customers of Credential Stuffing Barrage"

"Okta Warns Customers of Credential Stuffing Barrage"

Okta customers have recently experienced an "unprecedented" rise in credential stuffing attacks supposedly due to anonymizing services and residential proxies. The Identity and Access Management (IAM) vendor's Identity Threat Research team observed an increase in attacks on user accounts between April 19 and 26. These attacks appear to use the same infrastructure as attacks that targeted global Virtual Private Network (VPN) users between March 18 and April 16. All recent attacks use TOR to anonymize requests.

Submitted by Gregory Rigby on

"Britain Bans Simple Passwords for Smart Devices"

"Britain Bans Simple Passwords for Smart Devices"

UK law will require Internet-connected smart devices to meet minimum security standards. On April 29, the law came into force, banning manufacturers from using weak default passwords like "123456" or "admin" for Internet-connected devices. The law covers smartphones, TVs, game consoles, and more. According to the UK government, the new rules aim to protect consumers from hacking and cyberattacks. This article continues to discuss the new UK security law.

Submitted by Gregory Rigby on

"Voter Registration System Taken Offline in Coffee County Cyber-Incident"

"Voter Registration System Taken Offline in Coffee County Cyber-Incident"

Coffee County in Georgia has been hit by a cyberattack, reportedly leading to its connection to the state's voter registration system being severed. In a statement, the Office of Coffee County Board of Commissioners said the Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA) informed the County of unusual cyber activity on its IT infrastructure on April 15, 2024.

Submitted by Adam Ekwall on

"Threat Actor Uses Multiple Infostealers in Global Campaign"

"Threat Actor Uses Multiple Infostealers in Global Campaign"

Cisco's Talos is warning that a threat actor has been using multiple information stealers to harvest credentials and financial data from users worldwide. The threat actor is called CoralRaider and has been active since at least 2023. The threat actor is likely of Vietnamese origin and was previously seen targeting users in various Asian countries. The researchers warned of CoralRaider's use of a customized variant of QuasarRAT dubbed RotBot and the XClient stealer to target financial and login information and steal social media accounts, including business and advertising accounts.

Submitted by Adam Ekwall on
Subscribe to