"Defending Your Voice Against Deepfakes"

"Defending Your Voice Against Deepfakes"

Computer scientists led by Ning Zhang, assistant professor of computer science and engineering at the McKelvey School of Engineering at Washington University in St. Louis, created AntiFake, a tool to protect voice recordings from unauthorized speech synthesis. Recent advancements in generative Artificial Intelligence (AI) have accelerated progress in realistic speech synthesis.

Submitted by Gregory Rigby on

"North Korean Software Supply Chain Attack Hits North America, Asia"

"North Korean Software Supply Chain Attack Hits North America, Asia"

A recent North Korean attack on a Taiwanese company spreads malware to the United States, Canada, Japan and Taiwan. Microsoft discovered that a hacker gang known as Diamond Sleet gained access to a Taiwan software company CyberLink Corporation producers of audio, video, and photo editing software. They added malware to the application installer and managed to get their modified version signed with a CyberLink certificate and hosted on a valid update system. The code checks to see if security software from CrowdStrike, FireEye, or Tanium is present before running the malicious code.

Submitted by Gregory Rigby on

"DJVU Ransomware's Latest Variant 'Xaro' Disguised as Cracked Software"

"DJVU Ransomware's Latest Variant 'Xaro' Disguised as Cracked Software"

The latest variant of DJVU ransomware, codenamed Xaro, is distributed in the form of cracked software. The DJVU variant appends the .xaro extension to affected files and demands a ransom for a decryptor. It has been observed infecting systems along with other commodity loaders and infostealers. DJVU, which is a variant of the STOP ransomware, typically masquerades as legitimate services or applications. It is also delivered as a SmokeLoader payload. This article continues to discuss the new variant of the DJVU ransomware.

Submitted by Gregory Rigby on

"POCs for Critical Arcserve UDP Vulnerabilities Released"

"POCs for Critical Arcserve UDP Vulnerabilities Released"

Tenable researchers have released proof-of-concepts (POCs) for now-patched critical security vulnerabilities in Arcserve's Unified Data Protection (UDP) solution. Arcserve UDP is a widely used enterprise data protection, backup, and disaster recovery solution that helps organizations improve resiliency against ransomware attacks. This article continues to discuss the potential exploitation and impact of the vulnerabilities affecting Arcserve UDP.

Submitted by Gregory Rigby on

"Japanese Space Agency JAXA Hacked in Summer Cyberattack"

"Japanese Space Agency JAXA Hacked in Summer Cyberattack"

The Japan Aerospace Exploration Agency (JAXA) was hacked in a cyberattack over the summer, which may have put sensitive space-related technology and data at risk.  The security breach was discovered this Fall when law enforcement authorities alerted Japan's space agency that its systems were compromised.  Chief Cabinet Secretary of Japan Hirokazu Matsuno revealed that attackers gained access to the agency's Active Directory (AD) server, a crucial component overseeing JAXA's network operations.

Submitted by Adam Ekwall on

"New BLUFFS Attack Lets Attackers Hijack Bluetooth Connections"

"New BLUFFS Attack Lets Attackers Hijack Bluetooth Connections"

Researchers at Eurecom have developed six new attacks collectively dubbed BLUFFS that can breach Bluetooth session confidentiality, enabling device impersonation and Man-in-the-Middle (MitM) attacks. BLUFFS exploits two previously unknown vulnerabilities in the Bluetooth standard related to how session keys are derived for decrypting data in exchange. These flaws are architectural rather than hardware or software configuration-specific, affecting Bluetooth at a fundamental level.

Submitted by Gregory Rigby on

"Critical Vulns Found in Ray Open-Source Framework for AI/ML Workloads"

"Critical Vulns Found in Ray Open-Source Framework for AI/ML Workloads"

Researchers from Bishop Fox have reported that organizations using Ray, an open-source framework for scaling Artificial Intelligence (AI) and Machine Learning (ML) workloads, could face attacks due to three unpatched vulnerabilities in the technology. The flaws allow attackers to gain operating system access to all nodes in a Ray cluster, enable Remote Code Execution (RCE), escalate privileges, and more. The Bishop Fox researchers discovered the flaws in August and reported them to Anyscale, which sells a fully managed version of the technology.

Submitted by Gregory Rigby on
Subscribe to