We speak to professor who with colleagues tooled up OpenAI’s GPT-4 and other neural nets AI models, the subject of ongoing safety concerns about harmful and biased output, pose a risk beyond content emission. When wedded with tools that enable…
Category: The Register – Security
Google open sources file-identifying Magika AI for malware hunters and others
Cool, but it’s 2024 – needs more hype, hand wringing, and flashy staged demos to be proper ML Google has open sourced Magika, an in-house machine-learning-powered file identifier, as part of its AI Cyber Defense Initiative, which aims to give…
Zeus, IcedID malware kingpin faces 40 years in slammer
Nearly a decade on the FBI’s Cyber Most Wanted List after getting banks to empty vics’ accounts A Ukrainian cybercrime kingpin who ran some of the most pervasive malware operations faces 40 years in prison after spending nearly a decade…
Cutting kids off from the dark web – the solution can only ever be social
Expert weighs in after Brianna Ghey murder amid worrying rates of child cybercrime The murder of 16-year-old schoolgirl Brianna Ghey has kickstarted a debate around limiting children’s access to the dark web in the UK, with experts highlighting the difficulty…
Quest Diagnostics pays $5M after mixing patient medical data with hazardous waste
Will cough up less than two days of annual profit in settlement – and California calls this a win Quest Diagnostics has agreed to pay almost $5 million to settle allegations it illegally dumped protected health information – and hazardous…
Feds dismantle Russian GRU botnet built on 1,000-plus home, small biz routers
Beijing, now Moscow.… Who else is hiding in broadband gateways? The US government today said it disrupted a botnet that Russia’s GRU military intelligence unit has been using for phishing expeditions, spying, credential harvesting, and data theft against American and…
Pentagon launches nuke-spotting satellites amid Russian space bomb rumors
Dungeons and Dragons, high-waisted jeans, Cold War sabre rattling – the ’80s are back, baby Last night’s launch of six Pentagon missile-detection satellites was well timed as fears mount that Russia is considering putting nuclear weapons into space.… This article…
Mitigating AI security risks
From APIs to Zero Trust Webinar It has become possible to swiftly and inexpensively train, validate and deploy AI models and applications, yet while we embrace innovation, are we aware of the security risks?… This article has been indexed from…
Zoom stomps critical privilege escalation bug plus 6 other flaws
All desktop and mobile apps vulnerable to at least one of the vulnerabilities Video conferencing giant Zoom today opened up about a fresh batch of security vulnerabilities affecting its products, including a critical privilege escalation flaw.… This article has been…
Cybercriminals are stealing Face ID scans to break into mobile banking accounts
Deepfake-enabled attacks against Android and iOS users are netting criminals serious cash Cybercriminals are targeting iOS users with malware that steals Face ID scans to break into and pilfer money from bank accounts – thought to be a world first.……
Miscreants turn to ad tech to measure malware metrics
Now that’s what you call dual-use tech Cyber baddies have turned to ad networks to measure malware deployment and to avoid detection, according to HP Wolf Security.… This article has been indexed from The Register – Security Read the original…
European Court of Human Rights declares backdoored encryption is illegal
Surprising third-act twist as Russian case means more freedom for all The European Court of Human Rights (ECHR) has ruled that laws requiring crippled encryption and extensive data retention violate the European Convention on Human Rights – a decision that…
North Korea running malware-laden gambling websites as-a-service
$5k a month for the site. $3k for tech support. Infection with malware and funding a despot? Priceless North Korea’s latest money-making venture is the production and sale of gambling websites that come pre-infected with malware, according to South Korea’s…
OpenAI shuts down China, Russia, Iran, N Korea accounts caught doing naughty things
You don’t need us to craft phishing emails or write malware, super-lab sniffs OpenAI has shut down five accounts it asserts were used by government agents to generate phishing emails and malicious software scripts as well as research ways to…
China’s Volt Typhoon spies broke into emergency network of ‘large’ US city
Jeez, not now, Xi. Can’t you see we’ve got an election and Ukraine and Gaza and cost of living and layoffs and … The Chinese government’s Volt Typhoon spy team has apparently already compromised a large US city’s emergency services…
US Air Force’s new cyber, IT skill recruitment plan: Bring back warrant officer ranks
Officer pay, limited command duties and writing ‘code for your country’ Skilled IT professionals considering a career change have a new option, as the US Air Force is reintroducing warrant officer ranks exclusively “within the cyber and information technology professions.” ……
Prudential Financial finds cybercrims lurking inside its IT systems
Some company admin and customers data exposed, but bad guys were there for ‘only’ a day Prudential Financial, the second largest life insurance company in the US and eight largest worldwide, is dealing with a digital break-in that exposed some…
Romanian hospital ransomware crisis attributed to third-party breach
Emergency impacting more than 100 facilities appears to be caused by incident at software provider The Romanian national cybersecurity agency (DNSC) has pinned the outbreak of ransomware cases across the country’s hospitals to an incident at a service provider.… This…
Southern Water cyberattack expected to hit hundreds of thousands of customers
The company also curiously disappears from Black Basta leak site UK utilities giant Southern Water admits between 5 and 10 percent of its customers have had their data stolen during a January cyberattack.… This article has been indexed from The…
Bumblebee malware wakes from hibernation, forgets what year it is, attacks with macros
Trying to break in with malicious Word documents? How very 2015 of you The Bumblebee malware loader seemingly vanished from the internet last October, but it’s back and – oddly – relying on a vintage vector to try and gain…