Category: EN

Data in Danger: Analyzing the Alleged Data Broker Breach

The protection of personal data is of utmost importance. A recent report has brought to public attention an alleged significant data breach involving a U.S. data broker. This incident, which purportedly affects billions of records and over 300 million people,…

STR RAT: A Persistent Remote Access Trojan

  The STR RAT is a remote access trojan (RAT) written in Java, first detected in 2020. Like other RATs, it allows threat actors full control of an infected machine. STR RAT is capable of keylogging, credential theft, and deploying…

The TikTok Ban Spells Trouble for Chinese IoT

What businesses should do today to prepare for likely bans across Chinese tech tomorrow By Carsten Rhod Gregersen, Founder and CEO of Nabto It’s happening. Following years of rumors, The […] The post The TikTok Ban Spells Trouble for Chinese…

Overview of My Tools That Handle JSON Data, (Sat, Jun 15th)

I wrote a couple of diary entries showing my tools that produce and consume JSON data. Like “Analyzing PDF Streams”, “Another PDF Streams Example: Extracting JPEGs” and “Analyzing MSG Files”. This article has been indexed from SANS Internet Storm Center,…

Ransomware Attacks Are Getting Worse

Plus: US lawmakers have nothing to say about an Israeli influence campaign aimed at US voters, a former LA Dodgers owner wants to fix the internet, and more. This article has been indexed from Security Latest Read the original article:…

Security and safety of AI systems

It is hard to imagine any modern computer system that hasn’t been improved by the power of artificial intelligence (AI). For example, when you take a picture with your smartphone camera, on average more than twenty deep learning (DL) models…

ESET Research Podcast: APT Activity Report Q4 2023–Q1 2024

The I-SOON data leak confirms that this contractor is involved in cyberespionage for China, while Iran-aligned groups step up aggressive tactics following the Hamas-led attack on Israel in 2023 This article has been indexed from WeLiveSecurity Read the original article:…