Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 59

Feb 6, 2023

Linux version of Royal Ransomware targets VMware ESXi servers

Posted by in category: cybercrime/malcode

Royal Ransomware is the latest ransomware operation to add support for encrypting Linux devices to its most recent malware variants, specifically targeting VMware ESXi virtual machines.

BleepingComputer has been reporting on similar Linux ransomware encryptors released by multiple other gangs, including Black Basta, LockBit, BlackMatter, AvosLocker, REvil, HelloKitty, RansomEXX, and Hive.

The new Linux Royal Ransomware variant was discovered by Will Thomas of the Equinix Threat Analysis Center (ETAC), and is executed using the command line.

Feb 5, 2023

7 ways to use ChatGPT at work to boost your productivity, make your job easier, and save a ton of time

Posted by in categories: cybercrime/malcode, economics, employment, internet, robotics/AI

Basically I underestimated chat gpt it is Basically much more powerful than I realized not just a Jetson society but it could even bring realities like we have seen in star trek the next generation where one can ask an AI anything and it can do anything given a task. This could also bring upon a superintelligence once programmed much like a wolfram alpha is for homework but for everything. It can nearly do any job and can replace all tech jobs eventually to get to universal basic income or even bring an end to the wild west of the internet it could create a near perfect cyber defense because it could simply know everything and make everything bug free. In short it can a near God like AI to answer and do any digital task. This can make nearly all jobs eventually automated:3.


It’ll be a while before ChatGPT takes your job entirely, and in the meantime you can use it to make work life easier.

Feb 4, 2023

Want to build a website? Just ask ChatGPT in plain English

Posted by in categories: cybercrime/malcode, education, engineering

Juan Andres Guerrero-Saade’s speciality is picking apart malicious software to see how it attacks computers.

It’s a relatively obscure cybersecurity field, which is why last month he hosted a weeklong seminar at Johns Hopkins University where he taught students the complicated practice of reverse engineering malware.

Continue reading “Want to build a website? Just ask ChatGPT in plain English” »

Feb 4, 2023

New Wave of Ransomware Attacks Exploiting VMware Bug to Target ESXi Servers

Posted by in category: cybercrime/malcode

A new wave of #ransomware attacks is exploiting a #VMware vulnerability to target #ESXi hypervisor servers.

Feb 3, 2023

Until further notice, think twice before using Google to download software

Posted by in category: cybercrime/malcode

Searching Google for downloads of popular software has always come with risks, but over the past few months, it has been downright dangerous, according to researchers and a pseudorandom collection of queries.

“Threat researchers are used to seeing a moderate flow of malvertising via Google Ads,” volunteers at Spamhaus wrote on Thursday. “However, over the past few days, researchers have witnessed a massive spike affecting numerous famous brands, with multiple malware being utilized. This is not ‘the norm.’”.

Feb 2, 2023

Cybersecurity Budgets Are Going Up. So Why Aren’t Breaches Going Down?

Posted by in category: cybercrime/malcode

Stay ahead of the game with top-notch cybersecurity measures. The attacks may be becoming more severe, but so are our defenses.

Feb 2, 2023

Google ads push ‘virtualized’ malware made for antivirus evasion

Posted by in category: cybercrime/malcode

An ongoing Google ads malvertising campaign is spreading malware installers that leverage KoiVM virtualization technology to evade detection when installing the Formbook data stealer.

KoiVM is a plugin for the ConfuserEx. NET protector that obfuscates a program’s opcodes so that the virtual machine only understands them. Then, when launched, the virtual machine translates the opcodes back to their original form so that the application can be executed.

“Virtualization frameworks such as KoiVM obfuscate executables by replacing the original code, such as NET Common Intermediate Language (CIL) instructions, with virtualized code that only the virtualization framework understands,” explains a new report by SentinelLabs.

Feb 2, 2023

Hackers weaponize Microsoft Visual Studio add-ins to push malware

Posted by in category: cybercrime/malcode

Security researchers warn that hackers may start using Microsoft Visual Studio Tools for Office (VSTO) more often as method to achieve persistence and execute code on a target machine via malicious Office add-ins.

The technique is an alternative to sneaking into documents VBA macros that fetch malware from an external source.

Since Microsoft announced it would block the execution of VBA and XL4 macros in Office by default, threat actors moved to archives (.ZIP,.ISO) and. LNK shortcut files to distribute their malware.

Feb 2, 2023

Over 1,800 Android phishing forms for sale on cybercrime market

Posted by in categories: cryptocurrencies, cybercrime/malcode, finance, robotics/AI

A threat actor named InTheBox is promoting on Russian cybercrime forums an inventory of 1,894 web injects (overlays of phishing windows) for stealing credentials and sensitive data from banking, cryptocurrency exchange, and e-commerce apps.

The overlays are compatible with various Android banking malware and mimic apps operated by major organizations used in dozens of countries on almost all continents.

Being available in such numbers and at low prices, allows cybercriminals to focus on other parts of their campaigns, development of the malware, and to widen their attack to other regions.

Feb 2, 2023

Performing matrix multiplications at the speed of light for enhanced cybersecurity

Posted by in categories: cybercrime/malcode, mathematics, robotics/AI

“All things are numbers,” avowed Pythagoras. Today, 25 centuries later, algebra and mathematics are everywhere in our lives, whether we see them or not. The Cambrian-like explosion of artificial intelligence (AI) brought numbers even closer to us all, since technological evolution allows for parallel processing of a vast amounts of operations.

Progressively, operations between scalars (numbers) were parallelized into operations between vectors, and subsequently, matrices. Multiplication between matrices now trends as the most time-and energy-demanding operation of contemporary AI computational systems. A technique called “tiled matrix multiplication” (TMM) helps to speed computation by decomposing matrix operations into smaller tiles to be computed by the same system in consecutive time slots. But modern electronic AI engines, employing transistors, are approaching their intrinsic limits and can hardly compute at clock-frequencies higher than ~2 GHz.

The compelling credentials of light—ultrahigh speeds and significant energy and footprint savings—offer a solution. Recently a team of photonic researchers of the WinPhos Research group, led by Prof. Nikos Pleros from the Aristotle University of Thessaloniki, harnessed the power of light to develop a compact silicon photonic computer engine capable of computing TMMs at a record-high 50 GHz clock frequency.

Page 59 of 220First5657585960616263Last