Sun.Jan 29, 2023

article thumbnail

ChatGPT: Hopes, Dreams, Cheating and Cybersecurity

Lohrman on Security

ChatGPT is an AI-powered chatbot created by OpenAI. So what are the opportunities and risks with using this technology across different domains?

article thumbnail

GUEST ESSAY: The role ‘deep learning’ AI can play relieving security teams of debilitating stress

The Last Watchdog

The cybersecurity profession can be very rewarding, but at the same time quite taxing. Related: Equipping SOCs for the long haul In fact, stress factors have risen to where some 45 percent of the security professionals polled in Deep Instinct’s third annual Voice of SecOps report said they’ve considered leaving the industry altogether. Ransomware is at an all-time high; attackers are as elusive as ever.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ChatGPT: Hopes, Dreams, Cheating and Cybersecurity

Security Boulevard

ChatGPT is an AI-powered chatbot created by OpenAI. So what are the opportunities and risks with using this technology across different domains? The post ChatGPT: Hopes, Dreams, Cheating and Cybersecurity appeared first on Security Boulevard.

article thumbnail

Shady reward apps on Google Play amass 20 million downloads

Bleeping Computer

A new category of activity tracking applications has been having massive success recently on Google Play, Android's official app store, having been downloaded on over 20 million devices. [.

Mobile 100
article thumbnail

IDC Analyst Report: The Open Source Blind Spot Putting Businesses at Risk

In a recent study, IDC found that 64% of organizations said they were already using open source in software development with a further 25% planning to in the next year. Most organizations are unaware of just how much open-source code is used and underestimate their dependency on it. As enterprises grow the use of open-source software, they face a new challenge: understanding the scope of open-source software that's being used throughout the organization and the corresponding exposure.

article thumbnail

New data wipers deployed against Ukraine

Malwarebytes

As war in Ukraine rages, new destructive malware continues to be discovered. In a recent tweet , the Ukrainian Computer Emergency Response Team (CERT-UA) named five wipers used against Ukrinform, Ukraine’s national news agency. It suspects a link to the Sandworm group. UPDATE: UAC-0082 (suspected #Sandworm ) to target Ukrinform using 5 variants of destructive software: CaddyWiper, ZeroWipe, SDelete, AwfulShred, BidSwipe.

Malware 89
article thumbnail

Alleged member of ShinyHunters group extradited to the US, could face 116 years in jail

Security Affairs

An alleged member of the ShinyHunters cybercrime gang has been extradited from Morocco to the United States. Sebastien Raoult, a French national who is suspected of being a member of ShinyHunters cybercrime gang known as “Seyzo Kaizen,” has been extradited from Morocco to the United States. The 22-year-old man was arrested in Morocco at Rabat international airport in Morocco on May 31, 2022, while trying to take a flight to Brussels.

More Trending

article thumbnail

UNC2565 threat actors continue to improve the GOOTLOADER malware

Security Affairs

The threat actors behind the GOOTLOADER malware continues to improve their code by adding new components and implementing new obfuscation techniques. Mandiant researchers reported that the UNC2565 group behind the GOOTLOADER malware (aka Gootkit ) continues to improve their code by adding new components and implementing new obfuscation techniques. Gootkit runs on an access-a-as-a-service model, it is used by different groups to drop additional malicious payloads on the compromised systems.

Malware 89
article thumbnail

Video Verification API: The Technology Behind Video KYC

Security Boulevard

What is Video KYC? Video KYC (Know Your Customer) is a process for customer Identity verification using remote video technology. It is a secure and efficient way for financial institutions, online businesses, and other organizations to verify the identity of their customers without requiring them to physically visit a branch or office. Why use Video […] The post Video Verification API: The Technology Behind Video KYC appeared first on Security Boulevard.

article thumbnail

Security Affairs newsletter Round 404 by Pierluigi Paganini

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the newsletter with the international press subscribe here. Copycat Criminals mimicking Lockbit gang in northern Europe Sandworm APT targets Ukraine with new SwiftSlicer wiper ISC fixed high-severity flaws in DNS software suite BIND Patch management is crucial to protect Exchange servers, Microsoft warns Hac

DNS 88
article thumbnail

USENIX Security ’22 – ‘Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols’

Security Boulevard

Complete Title : 'USENIX Security '22 - Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu - ‘Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols’' Permalink The post USENIX Security ’22 – ‘Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols’ appeared first on Security Boulevard.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

The healthcare industry has massively adopted web tracking tools, including pixels and trackers. Tracking tools on user-authenticated and unauthenticated web pages can access personal health information (PHI) such as IP addresses, medical record numbers, home and email addresses, appointment dates, or other info provided by users on pages and thus can violate HIPAA Rules that govern the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates.

article thumbnail

Watch out! Experts plans to release VMware vRealize Log RCE exploit next week

Security Affairs

Horizon3’s Attack Team made the headlines again announcing the releasse of a PoC exploit code for remote code execution in VMware vRealize Log. Researchers from the Horizon3’s Attack Team announced the release of PoC exploit code for remote code execution in VMware vRealize Log. Exploitation of multiple vulnerabilities affecting #VMware vRealize Log Insight leads to unauth RCE CVE-2022-31704, CVE-2022-31706, CVE-2022-31711 IOC Blog tomorrow POC / Deep-Dive Blog next week See VMware S

article thumbnail

Pro-Russia group Killnet targets Germany due to its support to Ukraine

Security Affairs

Pro-Russia group Killnet launched last week DDoS attacks against the websites of German airports, administration bodies, and banks. The Pro-Russia group Killnet is behind the DDoS attacks that last week hit the websites of German airports, administration bodies, and banks. The attacks are the hacktivists’ response to the German government’s decision to send Leopard 2 tanks to Ukraine.

DDOS 85