Category: Shorts

  • How Big Tech is preparing us for the privacy problems of AI

    by

    in

    How Big Tech is preparing us for the privacy problems of AI It’s not just Apple, but also Samsung and Verizon in the tech world and a who’s who of banks (Bank of America, Citi, Deutsche Bank, Goldman, Wells Fargo, and JPMorgan)The obvious uses for this technology is customer service. But for customer service to…

  • Meta Quest will now let you customize your home virtual world to your own liking

    by

    in

    Meta Quest will now let you customize your home virtual world to your own liking This release of the Meta Quest also introduces a new app called 2D app notification feature. This allows push notifications from non-VR apps, like Messenger, to appear in the headset. There are also a bunch of other items added to…

  • Threat Group UNC3944 Abusing Azure Serial Console for Complete VM Takeover

    by

    in

    Threat Group UNC3944 Abusing Azure Serial Console for Complete VM Takeover A financially motivated cyber actor has been observed abusing the Microsoft Azure serial console to install third-party remote management tools within compromised environments. The company, Mandiant, attributes the activity to a threat group it tracks under the names Roasted 0ktapus and Scattered Spider. The…

  • OilAlpha: Emerging Threat Targets Arabian Android Users

    by

    in

    OilAlpha: Emerging Threat Targets Arabian Android Users This new threat group, OilAlpha, uses social engineering to attack its targets using encrypted chat chat services like WhatsApp. There’s even some evidence that it’s been recruited by Yemeni operatives, though Recorded Future doesn’t yet have enough evidence to prove that they’re the ones actually responsible for all…

  • Cisco Small Business Switches Could Allow Remote Attacks with Critical Flaws

    by

    in

    Cisco Small Business Switches Could Allow Remote Attacks with Critical Flaws Cisco updates address a set of nine security flaws in its Small Business Series Switches that could be exploited by an unauthenticated, remote attacker to run arbitrary code or cause a denial-of-service (DoS) condition. Four of the flaws are rated 9.8 out of 10…

  • 100 Drone Deliveries Made by Amazon Prime Air

    by

    in

    100 Drone Deliveries Made by Amazon Prime Air CNBC has learned that Amazon’s drones have made 100 deliveries in the two locations in California and Texas where the company is operating Prime Air. The company had projected in January it would send 10,000 deliveries to customers via its fleet of flying robots by the end…

  • Elon Musk’s lawyer accuses Microsoft of abusing its access to Twitter data to

    by

    in

    Elon Musk’s lawyer accuses Microsoft of abusing its access to Twitter data to Elon Musk’s personal lawyer, Alex Spiro, accuses Microsoft of violating Twitter’s developer agreement, as reported by The New York Times. Twitter had previously used the free Twitter APIs to share information between its apps and websites, but Microsoft began pulling support for…

  • Meta is working on a new chip for artificial intelligence.

    by

    in

    Meta is working on a new chip for artificial intelligence. Meta is building its first custom chip specifically for running AI models, the company announced on Thursday. The chip, called the MTIA chip, stands for Meta Training and Inference Accelerator, and it will be used to accelerate neural networks. As the company invests heavily in…

  • Carding kingpin pleads guilty to selling financial info of tens of thousands

    by

    in

    Carding kingpin pleads guilty to selling financial info of tens of thousands A U.S. national has pleaded guilty in a Missouri court to operating a darknet carding site and selling stolen financial information belonging to tens of thousands of victims. The defendant, Edward Mihalo, assembled the team that helped him sell this stolen stolen financial…

  • Gang exploits Oracle WebLogic flaw to hijack servers and mine cryptocurrency

    by

    in

    Gang exploits Oracle WebLogic flaw to hijack servers and mine cryptocurrency 8220 Gang, a member of the notorious cryptojacking group known as 8220 Gang has been spotted weaponizing a six-year-old security flaw in Oracle WebLogic servers to ensnare vulnerable instances into a botnet and distribute cryptocurrency mining malware. Earlier this year, SentinelOne detailed attacks mounted…