"Striking the Balance in Communication Privacy and Lawful Interception"

"Striking the Balance in Communication Privacy and Lawful Interception"

A team of researchers from the University of Luxembourg and the KASTEL Security Research Labs has devised a security protocol that allows court-authorized monitoring of end-to-end encrypted or anonymous communications while also detecting illicit or extensive surveillance. The new security protocol balances legitimate communication interception with privacy protection. This article continues to discuss the new security protocol devised by researchers at the University of Luxembourg and the KASTEL Security Research Labs.

Submitted by Gregory Rigby on

"NVIDIA Patches Flaw in Jetson Software Used in AI-Powered Systems"

"NVIDIA Patches Flaw in Jetson Software Used in AI-Powered Systems"

NVIDIA has patched a high-severity flaw impacting its Jetson series computing boards. The exploitation of this vulnerability could enable Denial-of-Service (DoS), code execution, and privilege escalation in Artificial Intelligence (AI)-powered systems. This article continues to discuss the potential exploitation and impact of the flaw in Jetson software used in AI-powered systems, as well as other NVIDIA vulnerabilities that pose risks to networking and data center solutions.

Submitted by Gregory Rigby on

"This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps"

"This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps"

The Spanish-speaking cybercrime group "GXC Team" bundles phishing kits with malicious Android apps, advancing Malware-as-a-Service (MaaS) offerings. Group-IB, which has tracked the threat actor since January 2023, called the crimeware solution a "sophisticated AI-powered phishing-as-a-service platform." This article continues to discuss findings regarding GXC Team's bundling of phishing kits with malicious Android apps.

Submitted by Gregory Rigby on

"US Offers $10 Million Reward for Information on North Korean Hacker"

"US Offers $10 Million Reward for Information on North Korean Hacker"

The US Department of State is offering $10 million for information on Rim Jong Hyok, an alleged member of the hacking group "APT45," which operates on behalf of a North Korean military intelligence agency, the Reconnaissance General Bureau. The group has targeted foreign businesses, government entities, and the defense industry. This article continues to discuss the US offering a reward of up to $10 million for information on a member of APT45.

Submitted by Gregory Rigby on

"Despite Bans, AI Code Tools Widespread in Organizations"

"Despite Bans, AI Code Tools Widespread in Organizations"

A new Checkmarx report highlights that organizations are concerned about security threats posed by developers' use of Artificial Intelligence (AI). The company discovered that 15 percent of organizations explicitly ban AI tool usage for code generation, but 99 percent use them anyway. This article continues to discuss key findings from the "Seven Steps to Safely Use Generative AI in Application Security" report.

Infosecurity Magazine reports "Despite Bans, AI Code Tools Widespread in Organizations"

Submitted by Gregory Rigby on

"NSA Joins FBI and Others to Warn of North Korea Cyber Espionage Campaign"

"NSA Joins FBI and Others to Warn of North Korea Cyber Espionage Campaign"

The National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and others have released a joint Cybersecurity Advisory (CSA) titled "North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime's Military and Nuclear Programs." The CSA includes methods for detecting and mitigating the malicious activities of the Democratic People's Republic of Korea (DPRK) Reconnaissance General Bureau (RGB) 3rd Bureau.

Submitted by Gregory Rigby on

"'Stargazer Goblin' Amasses Rogue GitHub Accounts to Spread Malware"

"'Stargazer Goblin' Amasses Rogue GitHub Accounts to Spread Malware"

The threat actor "Stargazer Goblin" has found a new way to use GitHub to spread malware and malicious links. Instead of hosting malware on GitHub and luring users to download an infected code package by clicking on a malicious link in a phishing email, the new tactic involves tricking victims into thinking that malicious repositories are legitimate through an operation involving thousands of fake accounts.

Submitted by Gregory Rigby on
Subscribe to