News

  • On the Poisoning of LLMs

    PRIVACY PRIVACY Interesting essay on the poisoning of LLMs—ChatGPT in particular: Given that we’ve known about model poisoning for years, and given the strong incentives the black-hat SEO crowd has to manipulate results, it’s entirely possible that bad actors have been poisoning ChatGPT for months. We don’t know because OpenAI doesn’t talk about their processes,…

    Read More

  • Microsoft links attacks on American critical infrastructure systems to China

    PRIVACY PRIVACY Microsoft and a few American intelligence agencies have detected malware of Chinese origin deployed in critical infrastructure systems in Guam and elsewhere in the United States. The malicious activity, focused on post-compromise credential access and network security discovery, has been linked to Volt Typhoon, a state-sponsored threat actor in China. “Volt Typhoon has…

    Read More

  • Smashing Security podcast #323: Botched Bitcoin blackmail, iSpoof, and Meta’s billion dollar data bungle

    PRIVACY PRIVACY 13 years jail for spoofing scammer, a rogue IT security expert’s Bitcoin blackmail goes wrong, and Facebook’s eyewatering GDPR fine may be only the beginning of its problems. All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by computer security veterans Graham Cluley and Carole…

    Read More

  • SMBs Targeted by State-Aligned Actors for Financial Theft and Supply Chain Attacks

    PRIVACY PRIVACY Proofpoint researchers have found that small and medium-sized businesses are increasingly being targeted by APT actors globally Read More

    Read More

  • Attributes of a mature cyber-threat intelligence program

    PRIVACY PRIVACY Earlier this year, ESG published a research report focused on how enterprise organizations use threat intelligence as part of their overall cybersecurity strategy. The research project included a survey of 380 cybersecurity professionals working at enterprise organizations (i.e., more than 1,000 employees). Survey respondents were asked questions about their organization’s cyber-threat intelligence (CTI)…

    Read More

  • 6 ways generative AI chatbots and LLMs can enhance cybersecurity

    PRIVACY PRIVACY The rapid emergence of Open AI’s ChatGPT has been one of the biggest stories of the year, with the potential impact of generative AI chatbots and large language models (LLMs) on cybersecurity a key area of discussion. There’s been a lot of chatter about the security risks these new technologies could introduce —…

    Read More

  • AI Used to Create Malware, WithSecure Observes

    PRIVACY PRIVACY The cybersecurity firm confirms that it has observed AI being used to generate malware Read More

    Read More

  • Why Are Some Countries Banning TikTok?

    PRIVACY PRIVACY Waiting in the checkout line. Waiting to fall asleep. Waiting for your boring work call to finally end.  When you find yourself in these situations, do you usually have your phone in hand? And does it usually include scrolling through videos on TikTok? You’re far from alone! The app has 150 million users…

    Read More

  • Mobile Spyware—How You Can Keep Stalkers Off Your Phone

    PRIVACY PRIVACY When you wind up with mobile spyware, you may wind up with a stalker on your phone.  In its most malicious forms, mobile spyware can steal information like text messages and photos, capture passwords as you tap them in, secretly turn on your microphone or camera for recording, and track your movements using…

    Read More

  • SMBs and regional MSPs are increasingly targeted by state-sponsored APT groups

    PRIVACY PRIVACY Advanced persistent threat (APT) attacks were once mainly a concern for large corporations in industries that presented cyberespionage interest. That’s no longer the case and over the past year in particular, the number of such state-sponsored attacks against small- and medium-sized businesses (SMBs) has increased significantly. Cybersecurity firm Proofpoint analyzed its telemetry data…

    Read More

News, Advisories and much more

Exit mobile version