Tag: technews

  • ChatGPT Botnet Used to Unleash Cryptocurrency Scams

    by

    in

    ChatGPT Botnet Used to Unleash Cryptocurrency Scams ChatGPT may be great for improving search engines and ecommerce, but it’s also found work as a social media huckster. Researchers at Indiana University Bloomington discovered a botnet powered by ChatGPT operating on Twitter in May of this year. Many of the infected chatbots used the technology to…

  • This Malware Turned Thousands of Hacked Windows and macOS PCs Into Botnet Proxy

    by

    in

    This Malware Turned Thousands of Hacked Windows and macOS PCs Into Botnet Proxy Threat actors are using malware-infected Windows and macOS machines to deliver a proxy server application and use them as exit nodes to reroute requests. The proxy software, written in the Go programming language, can target both Windows and MacOS. Many malware families…

  • Hiatus Malware Resurfaces: Taiwan Firms and U.S. Military

    by

    in

    Hiatus Malware Resurfaces: Taiwan Firms and U.S. Military The threat actors behind the HiatusRAT malware have returned from their hiatus and are back at it again with a new wave of reconnaissance and targeting activity against Taiwan-based organizations and a U.S. military procurement system. According to Trend Micro, the activity cluster is brazen and one…

  • Meta is expected to launch a Threads web version early this week

    by

    in

    Meta is expected to launch a Threads web version early this week A web version of Threads, Meta’s commenting service, has been missing since the service began. According to The Wall Street Journal, the company is working on adding it to its competitor, X, and it will launch in the next few weeks. However, the…

  • AI-generated art can be copyrighted, rules a US Federal Judge

    by

    in

    AI-generated art can be copyrighted, rules a US Federal Judge This week, a U.S. District Court judge rules that artificial intelligence-generated artwork can’t be copyrighted. She’s ruling against Stephen Thaler and the US Copyright Office in a case involving an image created by his Creativity Machine algorithm. Howell rules that copyright has never been granted…

  • Tesla adds support for automation with Apple Shortcuts

    by

    in

    Tesla adds support for automation with Apple Shortcuts Now, Siri can control Tesla’s cars with automation using Apple’s Shortcuts app. See the entire list of features here. The Tesla app recently got an update that lets you control your car with Siri using your iPhone’s Siri voice. It’s a little clunkier than using third-party apps…

  • WoofLocker Toolkit Conceals Malicious Codes in Images to Run Tech Support

    by

    in

    WoofLocker Toolkit Conceals Malicious Codes in Images to Run Tech Support WooofLocker is an updated version of an advanced fingerprinting and redirect toolkit called WoofLock, designed to carry out scams. Should a user be detected as a bot or not interesting, a decoy PNG file without the malicious code is used. The majority of the…

  • Critical Security Flaws Threaten 30,000 Organizations Using Ivanti Avalanche

    by

    in

    Critical Security Flaws Threaten 30,000 Organizations Using Ivanti Avalanche The company Tenable has released an update to its mobile device management solution, Ivanti Avalanche, which helps enterprises manage their mobile devices. With the update comes a fix for several critical security flaws, including ones that could allow attackers to gain remote code execution. The company…

  • Google Introduces Quantum Resilient FIDO2 Security Key Implementation

    by

    in

    Google Introduces Quantum Resilient FIDO2 Security Key Implementation Google on Tuesday announced the first quantum resilient FIDO2 security key implementation as part of its OpenSK initiative. The company’s proposed scheme uses a combination of Elliptic Curve Digital Signature Algorithm (ECDSA) and the recently standardized quantum resistant signature algorithm, Dilithium. OpenSK is an open-source implementation for…

  • Guide: How Chrome can improve Security for Google Workplace-based Organizations

    by

    in

    Guide: How Chrome can improve Security for Google Workplace-based Organizations This guide proposes to add a browser-specific browser extension to the security stack to help security teams find and monitor threats in the cloud. It supports the discovery of shadow SaaS, secure connections, zero trust verification, phishing protection, access management for unmanaged devices, and more.…