kubikpixel, to python
@kubikpixel@chaos.social avatar

:python: Lazarus Exploits Typos to Sneak PyPI into Systems:
The notorious 'n state-backed hacking group Lazarus uploaded four packages to the Package Index () repository with the goal of infecting 'er systems with malware.

😁 https://thehackernews.com/2024/02/lazarus-exploits-typos-to-sneak-pypi.html

YourAnonRiots, to Cybersecurity Japanese
@YourAnonRiots@mstdn.social avatar

🚨 Multiple U.S. agencies are warning about Phobos , a RaaS deployed in widespread attacks against critical infrastructure.

Organizations need up-to-date threat intelligence https://thehackernews.com/2024/03/phobos-ransomware-aggressively.html

remixtures, to Cybersecurity Portuguese
@remixtures@tldr.nettime.org avatar

: "As generative AI systems like OpenAI's ChatGPT and Google's Gemini become more advanced, they are increasingly being put to work. Startups and tech companies are building AI agents and ecosystems on top of the systems that can complete boring chores for you: think automatically making calendar bookings and potentially buying products. But as the tools are given more freedom, it also increases the potential ways they can be attacked.

Now, in a demonstration of the risks of connected, autonomous AI ecosystems, a group of researchers has created one of what they claim are the first generative AI worms—which can spread from one system to another, potentially stealing data or deploying malware in the process. “It basically means that now you have the ability to conduct or to perform a new kind of cyberattack that hasn't been seen before,” says Ben Nassi, a Cornell Tech researcher behind the research."

https://arstechnica.com/ai/2024/03/researchers-create-ai-worms-that-can-spread-from-one-system-to-another/?utm_medium=social&utm_brand=ars&utm_social-type=owned&utm_source=twitter

itnewsbot, to security
@itnewsbot@schleuss.online avatar

Researchers create AI worms that can spread from one system to another - Enlarge (credit: Jacqui VanLiew; Getty Images)

As generative A... - https://arstechnica.com/?p=2007366 #syndication #security #malware #worms #ai

mattotcha, to Russia
@mattotcha@mastodon.social avatar
techhelpkb, to linux
@techhelpkb@mastodon.social avatar

Security researchers at Palo Alto Networks have uncovered a new variant of the notorious Bifrost malware, now targeting Linux systems with a cunning twist.

#linux #security #bifrost #malware
https://tchlp.com/3UZTTPe

YourAnonRiots, to linux Japanese
@YourAnonRiots@mstdn.social avatar

A new variant of the notorious BIFROSE RAT targets systems with sophisticated evasion techniques, employing deceptive domains to mimic .

https://thehackernews.com/2024/03/new-bifrose-linux-malware-variant-using.html

itnewsbot, to medical
@itnewsbot@schleuss.online avatar

WhatsApp finally forces Pegasus spyware maker to share its secret code - Enlarge (credit: NurPhoto / Contributor | NurPhoto)

WhatsApp w... - https://arstechnica.com/?p=2007345

itnewsbot, to machinelearning
@itnewsbot@schleuss.online avatar

Hugging Face, the GitHub of AI, hosted code that backdoored user devices - Enlarge (credit: Getty Images)

Code uploaded to AI developer p... - https://arstechnica.com/?p=2007291

AAKL, to linux
@AAKL@noc.social avatar

deleted_by_author

  • Loading...
  • PC_Fluesterer,
    @PC_Fluesterer@social.tchncs.de avatar

    @AAKL @thehackernews Well, here we go again.
    Once more: Bifrose is NOT, repeat NOT, a in the sense that it exploits a vulnerability in Linux. Bifrose is distributed various ways but it must be installed manually! The source says "Once installed on a victim's computer, Bifrost allows ..."
    But HOW is it installed in the first place? That needs an "evil maid" and/or severe administration shortcomings. A Linux that is run according best practice is immune against Bifrose & Co.

    bornach, to linux
    @bornach@fosstodon.org avatar

    Malware that targets users?!
    https://youtu.be/25Txv9MmrYA
    [ThioJoe]

    br00t4c, to random
    @br00t4c@mastodon.social avatar
    br00t4c, to random
    @br00t4c@mastodon.social avatar

    Ransomware gangs are paying attention to infostealers, so why aren't you?

    https://go.theregister.com/feed/www.theregister.com/2024/02/29/infostealers_increased_use/

    br00t4c, to random
    @br00t4c@mastodon.social avatar
    AAKL, to linux
    @AAKL@noc.social avatar
    AAKL, to apple
    @AAKL@noc.social avatar
    gcluley, to Cybersecurity
    @gcluley@mastodon.green avatar

    New podcast alert! "Smashing Security" ep 361 is out now, with special guest Paul Ducklin, yours truly, and my erstwhile co-host Carole Theriault.

    We discuss how your smartphone may be toast – if you use a hacked wireless charger, we take a closer look at the latest developments in the unfolding LockBit ransomware drama, and Carole dips her toe into online AI romance apps.

    https://grahamcluley.com/smashing-security-podcast-361/

    @smashingsecurity

    smallcircles, to github
    @smallcircles@social.coop avatar

    Beware infected repositories having in them.

    https://apiiro.com/blog/malicious-code-campaign-github-repo-confusion-attack

    > In order to maximize the chances of infection the malicious actor is flooding GitHub with malicious repos

    Like this:

    • Clone existing repos (for example: TwitterFollowBot, WhatsappBOT, discord-boost-tool, Twitch-Follow-Bot)

    • Infect them with malware loaders

    • Upload them back to GitHub with identical names

    • Automatically fork each thousands of times

    • Covertly promote them across the web

    br00t4c, to random
    @br00t4c@mastodon.social avatar

    GitHub besieged by millions of malicious repositories in ongoing attack

    https://arstechnica.com/?p=2006797

    arstechnica, to random
    @arstechnica@mastodon.social avatar

    GitHub besieged by millions of malicious repositories in ongoing attack

    GitHub keeps removing malware-laced repositories, but thousands remain.

    https://arstechnica.com/security/2024/02/github-besieged-by-millions-of-malicious-repositories-in-ongoing-attack/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

    kikobar, (edited )
    @kikobar@acc4e.com avatar

    @michael @arstechnica pretty ugly.

    Surprising that after the May and July 2023 proofs of concept were detected, no effective measures were able to be implemented. 🤔

    mstankiewicz, (edited ) to Software Polish
    @mstankiewicz@pol.social avatar

    Czy używasz oprogramowania antywirusowego?

    Do you use antivirus software?

    Używŏsz softwaru antywirusowego?

    #ankieta #poll #anketa #antywirus #antivirus #software #wirus #virus #malware

    br00t4c, to random
    @br00t4c@mastodon.social avatar
    Morishima, to security
    @Morishima@ieji.de avatar

    It is advisable to NEVER pay ransom to cybercriminals and to use "No More Ransom" to restore files.
    Details: https://www.wired.com/story/blackcat-ransomware-disruptions-comebacks/

    No More Ransome: https://www.nomoreransom.org/en/index.html

    schizanon, to Windows11
    @schizanon@mas.to avatar

    All a sudden there's this little red icon of a microphone in the top left corner of my screen and a little black and white microphone icon it my system tray. No process in task viewer. No startup app. Can't click either of them.

    If it's , it's a little obvious. I don't even have a microphone plugged into this PC.

    YourAnonRiots, to Cybersecurity Japanese
    @YourAnonRiots@mstdn.social avatar

    🚨 Malicious cyber campaign targets Ukrainian entities in Finland with Remcos via IDAT Loader, utilizing rare steganography technique.

    https://thehackernews.com/2024/02/new-idat-loader-attacks-using.html

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • tacticalgear
  • thenastyranch
  • ngwrru68w68
  • magazineikmin
  • khanakhh
  • rosin
  • mdbf
  • Youngstown
  • slotface
  • everett
  • cisconetworking
  • kavyap
  • DreamBathrooms
  • anitta
  • InstantRegret
  • Durango
  • osvaldo12
  • ethstaker
  • modclub
  • GTA5RPClips
  • Leos
  • cubers
  • tester
  • normalnudes
  • megavids
  • provamag3
  • lostlight
  • All magazines