Maria Reznikova and her associates at Maria Concetto Winery are into gadgets. Their Calistoga tasting room features “levitating” wine bottle holders, spinning top-like decanters, small drones, a 3D wine bottle hologram sign, a karaoke machine and a replica of a 1922 Model T Ford parked out front. But the most notable is RobinoVino, their wine serving robot sommelier. Working with an engineering friend, Reznikova commissioned RobinoVino, described as “the world’s first” such robot sommelier. M
All Articles (2242)
A newly disclosed security flaw in the Microsoft Defender SmartScreen has been exploited as a zero-day by an advanced persistent threat actor called Water Hydra (aka DarkCasino) targeting financial market traders. Trend Micro, which began tracking the campaign in late December 2023, said it entails the exploitation of CVE-2024-21412, a security bypass vulnerability related to Internet Shortcut Files (.URL). "In this attack chain, the threat actor leveraged CVE-2024-21412 to bypass Microsoft Def
The US Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed state government organization's network environment was compromised via an administrator account belonging to a former employee. "This allowed the threat actor to successfully authenticate to an internal virtual private network (VPN) access point," the agency said in a joint advisory published 15 February 2024 alongside the Multi-State Information Sharing and Analysis Center (MS-ISAC). "The threat actor
Spynote is a Remote Access Trojan that initially surfaced in 2020. Since then, it has grown into one of Android's most common malware families, with multiple samples, integration of other RATs (e.g., CypherRat), and a large family of over 10,000 samples. There are numerous variants and integrations of other RATs, and since 2023, there has been a growing interest in financial institutions.
On 1 February 2024, analysts found a malicious sample posing as a legitimate crypto wallet that included th
When discussing access security, one recommendation stands out; multi-factor authentication (MFA). With passwords alone being simple work for hackers, MFA provides an essential layer of protection against breaches. It is important to remember that MFA still is not foolproof. It can be bypassed. If a password is compromised, several options are available to hackers looking to circumvent the added protection of MFA. The following are four social engineering tactics hackers successfully use to
Red Sky Alliance monthly queries our backend databases, identifying all new data containing Motor Vessel (MV) and Motor Tanker (MT) in the subject line of malicious emails. Malicious actors use emails with Motor Vessel (MV) or Motor Tanker (MT) in the subject line as a lure to entice users in the maritime industry to open emails containing malicious attachments. Red Sky Alliance is providing this list of Motor Vessels in which we directly observed the vessel being impersonated, with associated
Facebook and Instagram users will start seeing labels on AI-generated images on their social media feeds, part of a broader tech industry initiative to sort between what is real and what is not. A Meta spokesman said on 06 February 2024 that it is working with industry partners on technical standards to make it easier to identify images and, eventually, video and audio generated by artificial intelligence tools.[1]
See: https://redskyalliance.org/xindustry/why-do-some-ai-images-look-like-me
Ju
As artificial intelligence continues advancing at a rapid pace, criminals are increasingly using AI capabilities to carry out sophisticated scams and attacks. Technologies that synthesize realistic fake media, known as deepfakes, are among the newest tools being deployed to enable fraud. A finance clerk working at a Hong Kong branch of a large multinational corporation recently fell victim to an elaborate scam utilizing deepfake technology to impersonate senior executives and swindle more than
A new form of mobile malware named "GoldPickaxe" has been uncovered, which collects facial recognition data to produce deepfake videos, enabling hackers to bypass biometric authentication protections on banking apps. Recently uncovered by cyber security investigators, GoldPickaxe exists in both Android and iOS versions and was developed by a suspected Chinese hacking group called "GoldFactory." The malware has been active since 2023, specifically targeting victims in Vietnam and Thailand.
See:
Cyber-attacks cost the world economy a huge $8 trillion USD in 2023 and are expected to rise to an incredible $18 trillion by 2030. Technology has advanced so rapidly that most devices in a 2024 household are always online smart devices perpetually connected to the cloud. Beyond this, no workforce, industry, or government agency exists without a complex and interconnected web of users, systems, and online technologies. Is it any wonder that cyber-attacks are on the rise and have cost the worl
A malware tactic named ‘hunter-killer’ is growing, based on an analysis of more than 600,000 malware samples. This may become the standard approach for advanced attacks. There has been a notable rise in a malware tactic referred to as ‘hunter-killer’ malware. The name comes from modern submarine warfare: submarines remain hidden until they strike. The use of hunter-killer malware grew over 2023, and it is expected to continue growing.
There is a surge in ultra-evasive, highly aggressive malwar
As we enter the age of the software-defined automobile, especially those with electric drivetrains, we’re facing unprecedented risk from cyberattacks, say a wide coterie of experts. According to the Israel-based Upstream firm, from 2019 to 2023 disclosed cybersecurity incidents in the automotive and mobility space increased by more than 50%, with 295 such occurrences in 2023. Some 64% of these attacks were executed by “bad hat actors” with malevolent intent, the report said. And 65% of deep and
Between November and December 2023, a threat actor successfully stole more than two million email addresses and other personal information from at least 65 websites, threat intelligence firm Group-IB reports. ResumeLooters is confirmed to have stolen several databases containing 2,079,027 unique emails and other records, such as names, phone numbers, dates of birth, and information about job seekers’ experience and employment history. The stolen data was then offered for sale by ResumeLooters
Since the Internet Age and cybercrime were invented, it is hard to imagine when crimes were committed in person, and rivalries were settled with gunfire. Nearly 100 years ago, St. Valentine’s Day had more than a passing interest for the citizens of Chicago, Illinois.
On the morning of 14 February 1929, two men dressed as police officers and two men dressed as civilians entered gangster Bugs Moran’s headquarters on North Clark Street in Chicago. Inside, they lined up seven of Moran’s unarmed he
DarkReading recently provided an editorial on the recent cyber security repose to Ivanti’s VPN issues. “Here's what's clear about the current cybersecurity state of Ivanti's VPN appliances, they have been widely vulnerable to cyberattack, and threat actors are onto the possibilities. It's up to enterprise cyber teams to decide what comes next.”
So far, Ivanti has disclosed five VPN flaws in 2024, most exploited as zero-days — with two of them publicly announced weeks before patches became avai
A United States federal judge has sentenced Joshua Adam Schulte, a former CIA employee, to 40 years in prison for one of the most significant disclosures of classified information in US history. Schulte worked as a software developer for the CIA's cyber operations division from 2012 to 2016, where he built hacking tools for intelligence gathering. According to the US Department of Justice, an internal dispute in 2016 led to Schulte's administrator privileges being revoked. He had secretly ope
Bitdefender researchers have discovered a new backdoor targeting Mac OS users. This previously undocumented family of malware is written in Rust and includes several interesting features. While the investigation is ongoing, we’re sending out this alert to share indicators of compromise with the community. Bitdefender products identify this threat as Trojan.MAC.RustDoor.*.
Here’s what we know so far: Distribution - The backdoor seems to impersonate a Visual Studio update, and all identified fi
The US State Department announced a $10 million reward for information leading to the identification or location of key members of the Hive ransomware gang. The FBI disrupted the gang’s operations almost exactly one year ago, shutting the ransomware group’s infrastructure after a seven-month operation.
Last week, the State Department said that in addition to the $10 million for information on those holding key leadership positions in the gang, they are offering $5 million “for information leadi
A bipartisan congressional investigation has found that US venture capital firms invested billions in Chinese technology companies in semiconductor, AI, and cybersecurity, sectors that threaten US national security. According to a report released on 08 February 2024 by the House Select Committee on China, five prominent venture firms, GGV Capital, GSR Ventures, Qualcomm Ventures, Sequoia Capital, and Walden International, invested in hundreds of Chinese companies that directly or indirectly sup
The Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Federal Bureau of Investigation (FBI) assess that People’s Republic of China (PRC) state-sponsored cyber actors are seeking to pre-position themselves on IT networks for disruptive or destructive cyberattacks against US critical infrastructure in the event of a significant crisis or conflict with the United States.[1]
CISA, NSA, FBI and the following partners are releasing this advisory to warn criti