Archive for the ‘cybercrime/malcode’ category

Mar 13, 2024

Researchers achieve quantum key distribution for cybersecurity in novel experiment

Posted by in categories: cybercrime/malcode, quantum physics

Researchers at the Department of Energy’s Oak Ridge National Laboratory have demonstrated that advanced quantum-based cybersecurity can be realized in a deployed fiber link.

Mar 13, 2024

Surgeons Use Apple VR Headset During Spinal Operation

Posted by in categories: augmented reality, biotech/medical, cybercrime/malcode

A surgery team in the UK successfully utilized the recently-released Apple Vision Pro to assist spinal surgery — a fascinating use case for the augmented reality (AR) headsets that goes far beyond movie-watching, productivity-hacking, or distracted driving.

As Business Insider reports, the expensive “spatial computing” device was used to execute two microspinal procedures at London’s Cromwell Hospital. To be clear, it wasn’t the surgeons themselves who were wearing bunky AR headsets. The device was instead donned by an assisting surgical scrub nurse, who according to a press release used headset-integrated software called eXeX to access things like “surgical setup and the procedural guides from within the sterile field of the operating theatre,” in addition to any needed data or surgical visualizations.

So, in short: coupled with the eXeX software, the headset offered the folks in the operating room hands-free access to documents and other information related to the procedure and its workflow. Pretty cool!

Mar 13, 2024

Google Search Cracking Down on Mass-Produced AI-Generated Slime

Posted by in categories: cybercrime/malcode, robotics/AI

Google announced a substantial overhaul to its spam policies for search yesterday, introducing a crackdown on AI content.

Mar 11, 2024

VR headsets can be hacked with an Inception-style attack

Posted by in categories: cybercrime/malcode, virtual reality

Researchers managed to crack Meta’s Quest VR system, allowing them to steal sensitive information, and manipulate social interactions.

Mar 9, 2024

Russian state-backed hackers breached Microsoft’s core software systems, company says

Posted by in category: cybercrime/malcode

A Russian state-backed group that Microsoft said hacked into its corporate email accounts was able to gain access to its core software systems, the company announced on Friday.

Microsoft said its security team detected the attack in January and identified the group responsible as Midnight Blizzard, “the Russian state-sponsored actor also known as Nobelium.”

“In recent weeks, we have seen evidence that Midnight Blizzard is using information initially exfiltrated from our corporate email systems to gain, or attempt to gain, unauthorized access,” Microsoft said in a blog post update on Friday. “This has included access to some of the company’s source code repositories and internal systems.”

Mar 9, 2024

Transform Data Into Knowledge With Generative AI

Posted by in categories: cybercrime/malcode, robotics/AI

Generative AI is quickly transforming the way we do things in almost every facet of life, including the evolving landscape of data management and cybersecurity. Cohesity, a company focused on AI-powered data management and security, launched Cohesity Gaia to apply generative AI in a unique way designed to enable customers to access, analyze, and interact with their data.

Cohesity Gaia is a generative AI-powered conversational search assistant. Cohesity blends Large Language Models with an enterprise’s own data and provides organizations with a tool to interact with and extract value from their information repositories. The platform is designed to enable natural language interactions, making it easier for users to query their data without needing to navigate complex databases or understand specialized query languages.

At its heart, Cohesity Gaia leverages generative AI to facilitate conversational interactions with data. Instead of searching through files or databases in the traditional manner, users can engage in a dialogue with the data, asking questions and receiving contextually relevant, accurate answers.

Mar 9, 2024

How scientists are using sound waves to hack the brain

Posted by in categories: cybercrime/malcode, neuroscience

Korean researchers have developed a new form of ultrasound brain stimulation that could help the brain form new connections.

Mar 9, 2024

Hackers abuse QEMU to covertly tunnel network traffic in cyberattacks

Posted by in category: cybercrime/malcode

Malicious actors were detected abusing the open-source hypervisor platform QEMU as a tunneling tool in a cyberattack against a large company.

QEMU is a free emulator and hypervisor that allows you to run other operating systems as guests on a computer.

As part of the attack, threat actors used QEMU to create virtual network interfaces and a socket-type network device to connect to a remote server. This allowed the threat actors to create a network tunnel from the victim’s system to the attacker’s server with negligible impact on system performance.

Mar 9, 2024

AI worm infects users via AI-enabled email clients — Morris II generative AI worm steals confidential data as it spreads

Posted by in categories: cybercrime/malcode, robotics/AI

A group of researchers created a first-generation AI worm that can steal data, spread malware, and spam others via an email client to spread through multiple systems.

Researchers successfully tested this Morris II worm and published its findings using two methods.

Mar 4, 2024

Researchers Create AI-Powered Malware That Spreads on Its Own

Posted by in categories: cybercrime/malcode, robotics/AI

Researchers have developed a computer “worm” that can spread from one computer to another using generative AI, a warning sign that the tech could be used to develop dangerous malware in the near future — if it hasn’t already.

As Wired reports, the worm can attack AI-powered email assistants to obtain sensitive data from emails and blast out spam messages that infect other systems.

“It basically means that now you have the ability to conduct or to perform a new kind of cyberattack that hasn’t been seen before,” Cornell Tech researcher Ben Nassi, coauthor of a yet-to-be-peer-reviewed paper about the work, told Wired.

Page 1 of 20012345678Last