Tag: technews
-
DFIR via XDR: How to expedite your investigations with a DFIR-
by
in ShortsDFIR via XDR: How to expedite your investigations with a DFIR- In this article, we will explore the changes that have taken place in the realm of DFIR (digital forensics and incident response) over the last few years, with a particular focus on digital forensics and the role of XDR in this field. The traditional…
-
Iranian Hackers Use SimpleHelp Remote Support Software for Persistent Access
by
in ShortsIranian Hackers Use SimpleHelp Remote Support Software for Persistent Access MuddyWater, an Iranian threat actor, is using the legitimate remote support software SimpleHelp to commandeer targeted systems. The group has been active since 2017, with targets including Turkey, Pakistan, the U.A.E., Iraq, Israel, Saudi Arabia, Jordan, the U.S., Azerbaijan, and Afghanistan. They use spear-phishing messages…
-
U.S. and U.K. Issue Warning of Russian Hackers Explo
by
in ShortsU.S. and U.K. Issue Warning of Russian Hackers Explo UK and US cybersecurity and intelligence agencies have reported that Russian nation-state actors have been exploiting now-patched flaws in Cisco networking equipment to perform reconnaissance and deploy malware against a small number of entities in Europe, US government institutions, and 250 Ukrainian targets. The threat actor…
-
Examining the Unknown Risks of SaaS Applications
by
in ShortsExamining the Unknown Risks of SaaS Applications Recent data breaches across CircleCI, LastPass, and Okta have highlighted the risks associated with enterprise and niche SaaS applications. As employees seek to increase their productivity with tools of their choice, they often bypass IT, introducing potentially vulnerable endpoints into the ecosystem. SaaS Security Posture Management (SSPM) solutions…
-
What’s really going on with Drake’s ‘Ghostwriter’ and AI song?
by
in ShortsWhat’s really going on with Drake’s ‘Ghostwriter’ and AI song? A mysterious AI-generated Drake song featuring The Weeknd went viral on TikTok and was removed from streaming services. It is unclear who created the song, but there are several possible suspects including Drake himself, Universal Music Group, or a crypto-adjacent mass-texting startup. The song has…
-
Stability AI announces new large language model that is open-source
by
in ShortsStability AI announces new large language model that is open-source Stability AI has released a suite of open-source large language models (LLMs) collectively called StableLM. These models are designed to generate text and code efficiently, and are trained on a larger version of the open-source dataset known as the Pile. The models are available for…
-
How ChatGPT and Bots Like It Can Spread Malware
by
in ShortsHow ChatGPT and Bots Like It Can Spread Malware AI applications are rapidly advancing and being used for multiple purposes, including malicious ones. Europol’s recent report found that AI models are now able to produce convincing text without any human effort, making phishing attacks and other security threats more difficult to detect. Though some AI…
-
Mrs. Davis Gets AI Right—Because It’s a Comedy AI Right—
by
in ShortsMrs. Davis Gets AI Right—Because It’s a Comedy AI Right— Mrs. Davis is a new Peacock series featuring an app-based antagonist who drives both users and non-users mad. The AI exists to crowdsource acts of service and awards ‘wings’ to its most benevolent users. However, Mrs. Davis is not an evil tech, as it can…
-
Max Levchin on How AI Will and Won’t Shape the Way You Pay
by
in ShortsMax Levchin on How AI Will and Won’t Shape the Way You Pay Max believes that credit cards are not the best structure for consumers and suggests that buy now, pay later is a better model for people to use. He argues that people should have a sense of control and certainty when it comes…
-
Pakistani Hackers Use Linux Malware Poseidon to Target Indian Government Officials
by
in ShortsPakistani Hackers Use Linux Malware Poseidon to Target Indian Government Officials Transparent Tribe, an APT actor based in Pakistan, has been using a fake two-factor authentication tool to deliver a Linux backdoor called Poseidon to Indian government agencies. The malicious version of the Kavach app is distributed through rogue sites disguised as legitimate Indian government…
