-
Governments and Tech Giants Unite Against Commercial Spyware
Over 25 governments and 14 tech companies vowed to fight against the proliferation of commercial spyware Read More
-
From Cybercrime Saul Goodman to the Russian GRU
In 2021, the exclusive Russian cybercrime forum Mazafaka was hacked. The leaked user database shows one of the forum’s founders was an attorney who advised Russia’s top hackers on the legal risks of their work, and what to do if they got caught. A review of this user’s hacker identities shows that during his time…
-
Patched Critical Flaw Exposed JetBrains TeamCity Servers
Tracked as CVE-2024-23917, the flaw carries a CVSS rating of 9.8 Read More
-
Google and CSA Singapore Combat Android Fraud With New Pilot
The initiative aim to tackle mobile fraud by auto-blocking apps seeking sensitive permissions Read More
-
Meta to Introduce Labeling for AI-Generated Images Ahead of US Election
Meta will start working on detecting AI images generated from rival services ahead of the November 2024 US presidential election Read More
-
Ransomware Payments Hit $1bn All-Time High in 2023
Chainalysis monitoring of blockchain transactions reveals ransomware payments hit a record $1bn in 2023 Read More
-
Teaching LLMs to Be Deceptive
Interesting research: “Sleeper Agents: Training Deceptive LLMs that Persist Through Safety Training“: Abstract: Humans are capable of strategically deceptive behavior: behaving helpfully in most situations, but then behaving very differently in order to pursue alternative objectives when given the opportunity. If an AI system learned such a deceptive strategy, could we detect it and remove…
-
The Covert Art of Steganography
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In cybersecurity, where information is both an asset and a potential target, various techniques are used to secure data and communications. One such…
-
The Covert Art of Steganography
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In cybersecurity, where information is both an asset and a potential target, various techniques are used to secure data and communications. One such…
-
Chinese Spies Hack Dutch Networks With Novel Coathanger Malware
Dutch intelligence services have blamed China for an attack last year targeting FortiGuard devices Read More