Cyber Defense Advisors

News

  • by
  • September 17, 2024

The AI Fix #16: GPT-4o1, AI time travelers, and where’s my driverless car?

In episode 16 of The AI Fix, Mark and Graham meet GPT-4o1 and ask if it knows how many cousins Alice’s sister has, a top cop wants AI injected into his colleagues “like heroin”, Mark finds an AI that might actually be able to help with that, and our hosts start a conspiracy theory about […]

Cyber News
  • by
  • September 17, 2024

Remotely Exploding Pagers

@ Ranir, Re : Occam had a razor for reason. You are needlessly multiplying hypotheses when you say, “It’s possible that the detonation signal doesn’t use the normal paging protocols or radios at all. It could be more secure—or less” Yes it could but it is unnecessary, and currently there is no evidence to that […]

Cyber News
  • by
  • September 17, 2024

Google Chrome Switches to ML-KEM for Post-Quantum Cryptography Defense

Google has announced that it will be switching from KYBER to ML-KEM in its Chrome web browser as part of its ongoing efforts to defend against the risk posed by cryptographically relevant quantum computers (CRQCs). “Chrome will offer a key share prediction for hybrid ML-KEM (codepoint 0x11EC),” David Adrian, David Benjamin, Bob Beck, and Devon […]

Cyber News
  • by
  • September 17, 2024

U.S. Treasury Sanctions Executives Linked to Intellexa Predator Spyware Operation

The U.S. Department of Treasury has imposed fresh sanctions against five executives and one entity with ties to the Intellexa Consortium for their role in the development, operation, and distribution of a commercial spyware called Predator. “The United States will not tolerate the reckless propagation of disruptive technologies that threatens our national security and undermines […]

Cyber News
  • by
  • September 17, 2024

How to Investigate ChatGPT activity in Google Workspace

Since launching ChatGPT in 2022, OpenAI has defied expectations with a steady stream of product announcements and enhancements. One such announcement came on May 16, 2024, and for most consumers, it probably felt innocuous. Titled “Improvements to data analysis in ChatGPT,” the post outlines how users can add files directly from Google Drive and Microsoft […]

Cyber News
  • by
  • September 17, 2024

Meta to Train AI Models Using Public U.K. Facebook and Instagram Posts

Meta has announced that it will begin training its artificial intelligence (AI) systems using public content shared by adult users across Facebook and Instagram in the U.K. in the coming months. “This means that our generative AI models will reflect British culture, history, and idiom, and that UK companies and institutions will be able to […]

Cyber News
  • by
  • September 17, 2024

Python Developers Targeted with Malware During Fake Job Interviews

Interesting social engineering attack: luring potential job applicants with fake recruiting pitches, trying to convince them to download malware. From a news article These particular attacks from North Korean state-funded hacking team Lazarus Group are new, but the overall malware campaign against the Python development community has been running since at least August of 2023, […]

Cyber News
  • by
  • September 17, 2024

Ticketmaster boss who repeatedly hacked rival firm sentenced

Graham CLULEY September 17, 2024 Promo Protect all your devices, without slowing them down. Free 30-day trial A former boss of Ticketmaster has been sentenced after pleading guilty to illegally accessing computer servers of a rival company and stealing sensitive business information. In 2012, Stephen Mead left ticket company CrowdSurge, signing a $52,970 separation agreement […]

Cyber News
  • by
  • September 17, 2024

Binance Warns of Rising Clipper Malware Attacks Targeting Cryptocurrency Users

Cryptocurrency exchange Binance is warning of an “ongoing” global threat that’s targeting cryptocurrency users with clipper malware with the goal of facilitating financial fraud. Clipper malware, also called ClipBankers, is a type of malware that Microsoft calls cryware, which comes with capabilities to monitor a victim’s clipboard activity and steal sensitive data a user copies, […]

Cyber News