Friday, June 10, 2022

Chinese hackers exploited years-old software flaws to break into telecom giants | MIT Technology ...

Hackers employed by the Chinese government have broken into numerous major telecommunications firms around the world in a cyber-espionage campaign that has lasted at least two years, according to a new advisory from American security agencies.

The hackers allegedly breached their targets by exploiting old and well-known critical vulnerabilities in popular networking hardware.

Publisher: MIT Technology Review
Reference: (Read more) Visit Source



Keeping web-browsing data safe from hackers | MIT News | Massachusetts Institute of Technology

Malicious agents can use machine learning to launch powerful attacks that steal information in ways that are tough to prevent and often even more difficult to study.

Researchers at MIT have shown that machine-learning-assisted side-channel attacks are both extremely robust and poorly understood. The use of machine-learning algorithms, which are often impossible to fully comprehend due to their complexity, is a particular challenge.

logo
Publisher: MIT News | Massachusetts Institute of Technology
Author: Adam Zewe MIT News Office
Twitter: @mit
Reference: (Read more) Visit Source



Why AIs Will Become Hackers

RSA CONFERENCE 2022 — San Francisco — "Nice to see you all again," Bruce Schneier told the audience at his keynote for the in-person return of RSA Conference, taking off his trademark cap. "It's kinda neat. Kinda a little scary." 

Schneier is a security technologist , researcher, and lecturer at Harvard Kennedy School. He has a long list of publications, including books from as early as 1993 and as recent as 2019's We Have Root , with a new one launching in January 2023.

Publisher: Dark Reading
Date: 2022-06-09T15:15:24.000Z
Author: https www darkreading com author karen spiegelman
Reference: (Read more) Visit Source



Hackers Can Steal Your Tesla by Creating Their Own Personal Keys | WIRED

Last year, Tesla issued an update that made its vehicles easier to start after being unlocked with their NFC key cards. Now, a researcher has shown how the feature can be exploited to steal cars.

Martin Herfurt, a security researcher in Austria, quickly noticed something odd about the new feature: Not only did it allow the car to automatically start within 130 seconds of being unlocked with the NFC card, but it also put the car in a state to accept entirely new keys—with no authentication ...

Publisher: Wired
Date: 2022-06-09T20:20:00.000Z
Author: Cond Nast
Twitter: @wired
Reference: (Read more) Visit Source



Hackers exploit recently patched Confluence bug for cryptomining

A cryptomining hacking group has been observed exploiting the recently disclosed remote code execution flaw in Atlassian Confluence servers to install miners on vulnerable servers.

The vulnerability, tracked as CVE-2022-26134, was discovered as an  actively exploited zero-day  at the end of May, while the vendor released a fix on June 3, 2022.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



More Wiggle Room for White Hat Hackers? | Bracewell LLP - JDSupra

The CFAA, 18 U.S.C.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

Publisher: JD Supra
Twitter: @jdsupra
Reference: (Read more) Visit Source



Iranian hackers target energy sector with new DNS backdoor

The Iranian Lycaeum APT hacking group uses a new .NET-based DNS backdoor to conduct attacks on companies in the energy and telecommunication sectors.

Lyceum is a state-supported APT, also known as Hexane or Spilrin, that has previously targeted communication service providers in the Middle East using DNS-tunneling backdoors.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



New Soul Hackers 2 Trailer Teases English Dub - Noisy Pixel

During today’s Summer Game Fest event, a new trailer for the upcoming turn-based Atlus developed Soul Hackers 2 was shared, briefly teasing the game’s English dub.

Pre-orders are also now available across all platforms, with digital pre-orders granting the Persona 5 Phantom Thieves outfit pack at launch.

logo
Publisher: Noisy Pixel
Date: 2022-06-09T12:24:19-07:00
Author: https www facebook com NoisyPixelNews
Twitter: @NoisyPixelNews
Reference: (Read more) Visit Source



Hackers using stealthy Linux backdoor Symbiote to steal credentials | CSO Online

Researchers have come across a stealthy Linux backdoor that uses sophisticated techniques to hide itself on compromised servers and steal credentials.

To prevent its presence from being discovered, for example in the output of the ldd command that can be used to list a running process's dependencies, the malware intercepts calls to this command by hooking execve and then scrubs itself from the output.

Publisher: CSO Online
Date: 2022-06-09T07:48-05:00
Author: Lucian Constantin
Twitter: @csoonline
Reference: (Read more) Visit Source







We love trees 🥰🍀💕❤️💋😘

#NFT #ETH #nftgiveaways #nftcommunity #Giveaways #NFTPromotion #ART

https://opensea.io/collection/aotam

Hot NFT tree art collection available. This is BIG!
See the amazing artwork. Click here.



Earth is nice. We want it.





No comments:

Post a Comment

Popular Posts