A new deceptive campaign has been observed hijacking GitHub accounts and committing malicious code disguised as Dependabot contributions with an aim to steal passwords from developers. The malicious code exfiltrates the GitHub project's defined secrets to a malicious C2 server and modify any existing javascript files in the attacked project with a web-form password-stealer malware code effecting any end-user submitting its password in a web form. The malware is also designed to capture GitHub
All Articles (2242)
Do oil and gas tankers have a use for artificial intelligence (AI)? That is the question Rigzone posed to maritime risk intelligence company Dryad Global, who in turn outlined a range of ways these tankers can utilize the technology. Data mining was one use case Dryad highlighted in its response. “Throughout a tanker’s journey, they create and receive a continuous stream of data,” a company spokesperson told Rigzone. “People are limited in their abilities to process and sort it. AI mines rea
A previously unknown government-backed hacking group is targeting organizations in the manufacturing, IT, and biomedical sectors across Taiwan, Vietnam, the US and an unnamed Pacific island, according to new research from Symantec.
Researchers are tracking the group under the name “Grayling” and said in a report released earlier this week that it is using custom-made malware as well as publicly available tools to attack its targets. The attacks, which began in February and continued through May
A group of academic researchers has devised a technique to extract sounds from still images captured using smartphone cameras with rolling shutter and movable lens structures. The movement of camera hardware, such as the Complementary Metal-oxide–Semiconductor (CMOS) rolling shutters and the moving lenses used for Optical Image Stabilization (OIS) and Auto Focus (AF), create sounds that are modulated into images as imperceptible distortions.[1]
These types of smartphone cameras, the researchers
US Authorities have shared a joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn
Red Sky Alliance has long presented evident of China’s modern-day Silk Road initiatives. Much of the Chinese targets were in Africa; many tying in cyber as the linkage. Below is a good exposé by Sentinel Labs. In the evolving cyber threat landscape, it’s always important to constantly challenge our biases. There are large pockets of important threat activity occurring in regions around the world less commonly addressed in Western threat research. While much attention has rightfully been dra
Elon Musk’s SpaceX has received its first contract from the US Space Force to provide customized satellite communications for the military under the company’s new Starshield program, extending the provocative billionaire’s role as a defense contractor.
See: https://redskyalliance.org/xindustry/starlink-to-the-rescue-1
Space Exploration Technologies Corp. is competing with 15 companies, including Viasat Inc., for $900 million in work orders through 2028 under the Space Force’s new “Proliferated
Politically-motivated hackers from all over the world have leapt into the escalating conflict between Israel and the Palestinian group Hamas. Hacktivists are using tactics similar to what was seen at the beginning of the Ukraine-Russia war: leaking stolen documents and launching distributed denial-of-service and defacement attacks on government websites, media outlets, and critical infrastructure.[1]
The recent surge in hacktivism comes on the heels of the Red Cross issuing ethical guidelines f
A new malware-as-a-service option for cybercriminals known as BunnyLoader was released on September 4th, 2023. It has since seen a variety of updates and has reached version 2.0. As one might expect from any number of the “as a service” monikers, malware-as-a-service is a business model for cybercriminals. The business model is such that malware and its associated infrastructure are provided to customers for a fee. This can also be seen as a variation to the software-as-a-service model.
Thos
The International Committee of the Red Cross (ICRC) has released the first-ever ethical guidelines for civilian hackers, or hacktivists, engaged in armed conflicts. The organization asks hacktivists to comply with eight “humanitarian law-based rules” to protect themselves and avoid harming others.
The ICRC said that international humanitarian law does not prohibit hacking military targets during armed conflicts, but those involved in such operations must adhere to basic humanitarian principles.
Cyber-attacks and crimes are no ‘new’ news. However, with more of our information being shared online than ever before, we might be more vulnerable than we might like to believe. A 2020 report suggests that cyberattacks on infrastructure were the fifth top risk of the year. Not only that but it is expected that the cost of cybercrimes might reach $10.5 trillion dollars by 2025.
These numbers are alarming, and for us to better understand the tremendous impact that cyber-attacks might have on c
**Critical**
Advisory ID:
cisco-sa-cer-priv-esc-B9t3hqk9
First Published:
2023 October 4 16:00 GMT
Version 1.0:
Final
Workarounds:
No workarounds available
Cisco Bug IDs:
CSCwh34565
CVSS Score:
Base 9.8
CVE-2023-20101
Summary - A vulnerability in Cisco Emergency Responder could allow an unauthenticated, remote attacker to log in to an affected device using the root account, which has default, static credentials that cannot be changed or deleted.[1] This vu
To celebrate the 20th Cybersecurity Awareness Month, CISA has launched a new program, meant to promote four critical actions that businesses and individuals can take to improve cybersecurity. Since 2004, October has been dedicated to raising awareness on the importance of cybersecurity for both private and public sectors, as part of a collaborative effort between government and industry. This year, CISA is introducing Secure Our World, an initiative to deliver an “enduring message” to be integ
Agility Robotics, creator of the bipedal humanoid robot Digit, says it is planning to open what it calls “RoboFab”, the company’s robot manufacturing facility in Salem, Oregon with the capability to produce more than 10,000 robots per year. Initial construction of Agility’s 70,000 square foot robot factory began last year, and it is set to open later this year. Agility anticipates production capacity of hundreds of Digit robots in the first year, with the capability to scale to more than 10,00
Every month, I feel as if ChatGPT is bringing us closer to the life we watched on The Jetsons. The Jetsons is an American animated sitcom produced by Hanna-Barbera Productions. It aired on ABC in prime time from September 23, 1962, to March 17, 1963. Don’t get me started on smart lawnmowers and vacuum cleaners.
ChatGPT can perform many technical tasks, such as writing, coding, and researching. Much hype surrounding the chatbot has been on its ability to revolutionize the workspace. However
Companies are gripped by labor shortages in the security services market segment, and some are turning to robots. Ed Bacco, a technology executive who joined ADT’s commercial arm just over four years ago, sees androids as a way of getting around the intense battle for talent and high turnover rates that have always been a problem for the industry. “We wanted to have more consistency in our guards, and so when I came over to ADT, I saw an opportunity to introduce something to the market,” said
Malicious ADs served inside Microsoft Bing's artificial intelligence (AI) chatbot are being used to distribute malware when searching for popular tools. The findings come from researchers, who revealed that unsuspecting users can be tricked into visiting booby-trapped sites and installing malware directly from Bing Chat conversations.
Introduced by Microsoft in February 2023, Bing Chat is an interactive search experience that's powered by OpenAI's large language model called GPT-4. A month lat
Cybersecurity agencies from Japan and the US have warned of attacks mounted by a state-backed hacking group from China to stealthily tamper with branch routers and use them as jumping-off points to access the networks of various companies in the two countries. The attacks have been tied to a malicious cyber actor dubbed BlackTech by the US National Security Agency (NSA), Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Japan National Police Agency
Web browser security has undergone significant changes over the past decade. While Browser Isolation was once considered the gold standard for protecting against browser exploits and malware downloads, it has become increasingly inadequate and insecure in today's SaaS-centric world.
The limitations of Browser Isolation, such as degraded browser performance and inability to tackle modern web-borne threats like phishing and malicious extensions, necessitate a shift towards more advanced solutions
In 1923, the Soviet Union created the Nagorno-Karabakh Autonomous Oblast (an oblast is an administrative region or province) within the Azerbaijan Soviet Socialist Republic. This oblast has a 95% ethnically Armenian population. In 1988, Nagorno-Karabakh intended to leave Azerbaijan and join the neighboring Republic of Armenia. While the Soviet Union was able to keep the resulting tension under control, once the USSR began to collapse, armed conflict between Azerbaijan and Armenia began for co