Menu

Blog

Page 193

Sep 23, 2024

Hacktivist Group Twelve Targets Russian Entities with Destructive Cyber Attacks

Posted by in categories: cybercrime/malcode, finance

Twelve hacktivist group targets Russian entities with destructive cyber attacks, using public tools for maximum damage without financial gain.

Sep 23, 2024

Critical Flaw in Microchip ASF Exposes IoT Devices to Remote Code Execution Risk

Posted by in categories: computing, internet

Severe vulnerabilities in Microchip ASF and MediaTek Wi-Fi chipsets expose IoT devices to remote code execution risks. No fix for CVE-2024–7490.

Sep 23, 2024

Discord Introduces DAVE Protocol for End-to-End Encryption in Audio and Video Calls

Posted by in category: encryption

Discord launches DAVE, a custom end-to-end encryption protocol for audio and video calls, enhancing user privacy while maintaining safety measures.

Sep 23, 2024

New PondRAT Malware Hidden in Python Packages Targets Software Developers

Posted by in category: cybercrime/malcode

North Korean hackers use poisoned Python packages from PyPI to spread PondRAT malware, targeting developers in a supply chain attack.

Sep 23, 2024

New Google Chrome feature will translate complex pages in real time

Posted by in categories: internet, robotics/AI

Google is testing a new API that uses machine learning models to offer real-time language translation for inputted text and to make it easier to translate web pages.

According to a proposal spotted by Bleeping Computer, the feature is being developed by Chrome’s built-in AI team and is aimed at exposing the web browser’s built-in translation functionality and the ability to download additional language models to translate text.

While Chrome and Edge already have built-in translation features, they can sometimes have issues translating web pages that have dynamic or complex content. For example, Chrome may not be able to translate all sections of an interactive website correctly.

Sep 23, 2024

Global infostealer malware operation targets crypto users, gamers

Posted by in categories: cryptocurrencies, cybercrime/malcode, finance

A massive infostealer malware operation encompassing thirty campaigns targeting a broad spectrum of demographics and system platforms has been uncovered, attributed to a cybercriminal group named “Marko Polo.”

The threat actors use a variety of distribution channels, including malvertising, spearphishing, and brand impersonation in online gaming, cryptocurrency, and software, to spread 50 malware payloads, including AMOS, Stealc, and Rhadamanthys.

According to Recorded Future’s Insikt Group, which has been tracking the Marko Polo operation, the malware campaign has impacted thousands, with potential financial losses in the millions.

Sep 23, 2024

Dell investigates data breach claims after hacker leaks employee info

Posted by in category: cybercrime/malcode

Dell has confirmed to BleepingComputer that they are investigating recent claims that it suffered a data breach after a threat actor leaked the data for over 10,000 employees.

The allegations were published yesterday by a threat actor named “grep,” who alleges that the computing vendor suffered a “minor data breach” in September 2024, exposing internal employee and partner information.

In a post to a hacking forum, the threat actor says the stolen data includes employees’ unique identifiers, full names of employees for Dell and partners, status of employees (active or not), and an internal identification string.

Sep 23, 2024

Scientists Reveal: We’re Nearly Living in a Simulation. AI Can Help Us Hack and Escape

Posted by in categories: cybercrime/malcode, information science, robotics/AI

The potential pathways through which AI could help us escape a simulated reality are both fascinating and complex. One approach could involve AI discovering and manipulating the underlying algorithms that govern the simulation. By understanding these algorithms, AI could theoretically alter the simulation’s parameters or even create a bridge to the “real” world outside the simulation.

Another approach involves using AI to enhance our cognitive and perceptual abilities, enabling us to detect inconsistencies or anomalies within the simulation. These anomalies, often referred to as “glitches,” could serve as clues pointing to the artificial nature of our reality. For instance, moments of déjà vu or inexplicable phenomena might be more than just quirks of human perception—they could be signs of the simulation’s imperfections.

While the idea of escaping a simulation is intriguing, it also raises profound ethical and existential questions. For one, if we were to confirm that we are indeed living in a simulation, what would that mean for our understanding of free will, identity, and the meaning of life? Moreover, the act of escaping the simulation could have unforeseen consequences. If the simulation is designed to sustain and nurture human life, breaking free from it might expose us to a harsher and more dangerous reality.

Sep 23, 2024

Scientists Reconstruct Oldest Human Genomes Ever Found in South Africa

Posted by in category: biotech/medical

An ancient code of human life from 10,000 years ago.

Sep 23, 2024

AMD to Launch Affordable ‘Kraken Point’ Zen 5 Mobile in 2025

Posted by in category: computing

Page 193 of 11,946First190191192193194195196197Last