Russian army targeted by new Android malware hidden in mapping app
A new Android malware has been discovered hidden inside trojanized versions of the Alpine Quest mapping app, which is reportedly used by Russian soldiers as part of war zone operational planning.
Millions impacted by data breaches at Blue Shield of California, mammography service and more
Blue Shield of California said an improper Google Analytics configuration exposed the data of more than 4.5 million people, while state regulators recently received more than a dozen other reports involving healthcare-related organizations.
Cloudflare: Government-backed internet shutdowns plummet to zero in first quarter
Governments around the world have appeared to ease off from using internet shutdowns to silence protesters and control access to information, according to new data from internet infrastructure company Cloudflare.
Understanding the threat landscape for Kubernetes and containerized assets
The dynamic nature of containers can make it challenging for security teams to detect runtime anomalies or pinpoint the source of a security incident, presenting an opportunity for attackers to stay undetected. Microsoft Threat Intelligence has observed threat actors taking advantage of unsecured workload identities to gain access to resources, including containerized environments. Microsoft data […]
Regulating AI Behavior with a Hypervisor - Schneier on Security
Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.” Abstract:As AI models become more embedded in critical sectors like finance, healthcare, and the military, their inscrutable behavior poses ever-greater risks to society. To mitigate this risk, we propose Guillotine, a hypervisor architecture for sandboxing powerful AI models—models that, by accident or malice, can generate existential threats to humanity. Although Guillotine borrows some well-known virtualization techniques, Guillotine must also introduce fundamentally new isolation mechanisms to handle the unique threat model posed by existential-risk AIs. For example, a rogue AI may try to introspect upon hypervisor software or the underlying hardware substrate to enable later subversion of that control plane; thus, a Guillotine hypervisor requires careful co-design of the hypervisor software and the CPUs, RAM, NIC, and storage devices that support the hypervisor software, to thwart side channel leakage and more generally eliminate mechanisms for AI to exploit reflection-based vulnerabilities. Beyond such isolation at the software, network, and microarchitectural layers, a Guillotine hypervisor must also provide physical fail-safes more commonly associated with nuclear power plants, avionic platforms, and other types of mission critical systems. Physical fail-safes, e.g., involving electromechanical disconnection of network cables, or the flooding of a datacenter which holds a rogue AI, provide defense in depth if software, network, and microarchitectural isolation is compromised and a rogue AI must be temporarily shut down or permanently destroyed. ...
Ransomware groups test new business models to hit more victims, increase profits
The DragonForce and Anubis groups are attempting to entice hackers to come and work with them by adopting affiliate models that would increase the volume of incidents their services can be used in.
Blue Shield of California leaked health data of 4.7 million members to Google
Blue Shield of California disclosed it suffered a data breach after exposing protected health information of 4.7 million members to Google's analytics and advertisement platforms.
Phishing detection is broken: Why most attacks feel like a zero day
Phishing attacks now evade email filters, proxies, and MFA — making every attack feel like a zero-day. This article from Push Security breaks down why detection is failing and how real-time, in-browser analysis can help turn the tide.
ASUS releases fix for AMI bug that lets hackers brick servers
ASUS has released security updates to address CVE-2024-54085, a maximum severity flaw that could allow attackers to hijack and potentially brick servers.
Unlocking the Distillation of AI & Threat Intelligence | CSA
As AI research advances, model distillation will likely expand into new applications and improve the ability to address complex challenges like disinformation.
ActiveProtect : une solution de sauvegarde conçue pour répondre aux nouvelles exigences de résilience
Synology renforce son positionnement sur le marché des solutions de sauvegarde avec ActiveProtect, une appliance tout-en-un pensée pour...-Publi-rédaction
Telegram menace de quitter la France si une loi est votée contre le chiffrement de bout en bout
Le patron du service messagerie russe considère que la création d’une backdoor par les autorités mettrait en danger la sécurité des données de...-Messagerie instantanée
Introducing ToyMaker, an Initial Access Broker working in cahoots with double extortion gangs
Cisco Talos discovered a sophisticated attack on critical infrastructure by ToyMaker and Cactus, using the LAGTOY backdoor to orchestrate a relentless double extortion scheme.
RSAC Fireside Chat: Enterprise storage security – ground zero for protecting data, preserving resilience
It’s no secret that cyber criminals go after data. What’s often overlooked is shoring up direct protection where that data typically resides: in enterprise storage systems. That’s beginning to change. Related: The data storage economy Enterprise storage security has moved to the front burner. The emerging best practice is to approach it as a core