Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 2

Jan 27, 2024

Hacking DNA To Make Next-Gen Materials

Posted by in categories: biotech/medical, cybercrime/malcode, nanotechnology

Researchers have ‘hacked’ DNA to develop self-assembling metallic and semiconductor 3D nanostructures, the building blocks for next-generation materials.

Jan 25, 2024

Google Kubernetes Misconfig Lets Any Gmail Account Control Your Clusters

Posted by in category: cybercrime/malcode

Cybersecurity researchers have discovered a loophole impacting Google Kubernetes Engine (GKE) that could be potentially exploited by threat actors with a Google account to take control of a Kubernetes cluster.

The critical shortcoming has been codenamed Sys: All by cloud security firm Orca. As many as 250,000 active GKE clusters in the wild are estimated to be susceptible to the attack vector.

In a report shared with The Hacker News, security researcher Ofir Yakobi said it “stems from a likely widespread misconception that the system: authenticated group in Google Kubernetes Engine includes only verified and deterministic identities, whereas in fact, it includes any Google authenticated account (even outside the organization).”

Jan 24, 2024

VexTrio: The Uber of Cybercrime — Brokering Malware for 60+ Affiliates

Posted by in categories: cybercrime/malcode, energy, information science

VexTrio, the shadowy entity controlling a massive network of 70,000+ domains, is finally in the spotlight. This “traffic broker” fuels countless scams & malware campaigns, including ClearFake, SocGholish, & more. Read:


The threat actors behind ClearFake, SocGholish, and dozens of other actors have established partnerships with another entity known as VexTrio as part of a massive “criminal affiliate program,” new findings from Infoblox reveal.

The latest development demonstrates the “breadth of their activities and depth of their connections within the cybercrime industry,” the company said, describing VexTrio as the “single largest malicious traffic broker described in security literature.”

Continue reading “VexTrio: The Uber of Cybercrime — Brokering Malware for 60+ Affiliates” »

Jan 24, 2024

Mother of All Breaches: LinkedIn, X, Telegram, Adobe named in 26B leak

Posted by in category: cybercrime/malcode

The researchers have given the breach the title — MOAB, meaning ‘Mother of All Breaches.’

The security of your personal data hangs in the balance as cybersecurity experts uncover what could be the mother of all breaches, posing a threat of unprecedented proportions.


Researchers have warned that a database containing 26 billion leaked data records has been discovered. The supermassive data leak is likely the biggest found to date.

Continue reading “Mother of All Breaches: LinkedIn, X, Telegram, Adobe named in 26B leak” »

Jan 24, 2024

Huge data leak dubbed the ‘Mother of all Breaches’

Posted by in category: cybercrime/malcode

Your personal information may have been leaked in the ‘Mother of all Breaches’ (MOAB), cybersecurity researchers have warned.

Over 26 billion personal records have been exposed, in what researchers believe to be the biggest-ever data leak.

Continue reading “Huge data leak dubbed the ‘Mother of all Breaches’” »

Jan 22, 2024

Thomvest Ventures closes $250M fund to invest across fintech, cybersecurity, AI

Posted by in categories: cybercrime/malcode, finance, robotics/AI

Thomvest Ventures is popping into 2024 with a new $250 million fund and the promotion of Umesh Padval and Nima Wedlake to the role of managing directors.

The Bay Area venture capital firm was started about 25 years ago by Peter Thomson, whose family is the majority owners of Thomson Reuters.

“Peter has always had a very strong interest in technology and what technology would do in terms of shaping society and the future,” Don Butler, Thomvest Ventures’ managing director, told TechCrunch. He met Thomson in 1999 and joined the firm in 2000.

Jan 19, 2024

From quantum leaps to threats, IBM foresees ‘Cybersecurity Armageddon’

Posted by in categories: cybercrime/malcode, quantum physics

IBM warns that advancements in quantum computing could lead to a cybersecurity crisis.

Jan 19, 2024

A simple technique to defend ChatGPT against jailbreak attacks

Posted by in categories: cybercrime/malcode, ethics, robotics/AI

Large language models (LLMs), deep learning-based models trained to generate, summarize, translate and process written texts, have gained significant attention after the release of Open AI’s conversational platform ChatGPT. While ChatGPT and similar platforms are now widely used for a wide range of applications, they could be vulnerable to a specific type of cyberattack producing biased, unreliable or even offensive responses.

Researchers at Hong Kong University of Science and Technology, University of Science and Technology of China, Tsinghua University and Microsoft Research Asia recently carried out a study investigating the potential impact of these attacks and techniques that could protect models against them. Their paper, published in Nature Machine Intelligence, introduces a new psychology-inspired technique that could help to protect ChatGPT and similar LLM-based conversational platforms from cyberattacks.

“ChatGPT is a societally impactful artificial intelligence tool with millions of users and integration into products such as Bing,” Yueqi Xie, Jingwei Yi and their colleagues write in their paper. “However, the emergence of attacks notably threatens its responsible and secure use. Jailbreak attacks use adversarial prompts to bypass ChatGPT’s ethics safeguards and engender harmful responses.”

Jan 18, 2024

How to exploit Windows Defender Antivirus to infect a device with malware

Posted by in category: cybercrime/malcode

Malware — information security newspaper | hacking news.

Jan 18, 2024

New Docker Malware Steals CPU for Crypto & Drives Fake Website Traffic

Posted by in categories: cryptocurrencies, cybercrime/malcode

A new attack targets Docker servers and uses a combo of cryptocurrency mining and website traffic generation for profit. It could leave a backdoor for attackers to exploit later. Patch your systems and monitor for suspicious activity:

Page 2 of 19712345678Last