OpenAI’s meltdown prompts further questions around the future of AI safety surveillance
Risks related to autonomous AI and AI safety are increasingly seen as a concern within the tech industry. As more AI applications are developed, there is a need for comprehensive, real-time and adaptive AI safety metrics that encompass ethical usage, user demographics, cyber threats and real-time vulnerabilities. Industry-wide efforts should encompass unified standards, collaboration among […]
66% of employees will shop on mobile phones this holiday season
Phishing attacks are predicted to increase by over 100% during Thanksgiving week as employees spend more time online, according to a Lookout report.
Out for blood? For routine lab work, the hospital billed her $2,400
Reesha Ahmed, a pregnant woman in Texas, was charged over $9,000 by her local hospital for routine blood tests. Even after her insurer negotiated the amount down and paid a portion, Ahmed was left with a bill of over $2,000. The situation, which occurred in tandem with Ahmed’s miscarriage, highlights issues with hospitals’ high fees […]
New Agent Tesla Malware Variant Using ZPAQ Compression in Email Attacks
A new version of the Agent Tesla malware is being delivered through the ZPAQ file compression format, targeting multiple email clients and web browsers. The malware, initially identified in 2014, is often used to provide remote access to a compromised system for downloading other, more complex tools, such as ransomware. This recent development highlights possible […]
How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography
Cybercriminals are employing increasingly sophisticated methods, including QR codes (“quishing”), CAPTCHA, and steganography, to circumvent traditional phishing detection techniques. These tools enable attackers to mask malicious content, evade spam filters or hide credential-harvesting forms on illegitimate websites. Deceptive links concealed within QR codes or secret data hidden within media files obtained via email can bypass […]
The420 Daily Cyber Security Alert: Protecting Yourself from the Latest Scams
The content discusses various cybercrimes that took place in India, with victims losing significant amounts of money. Scams included posing as a hospital, a financial institution, and a bank official. One incident also mentions Myanmar transferring telecom fraud suspects to China as part of a cross-border alliance against such crimes. Authorities are warning citizens to […]
St Helens Council cyber attack caused substantial disruption
St Helens Council in North West England experienced a ransomware cyber attack in August, causing considerable disruption and compromising key systems. Attackers extracted and transferred data to the cloud. A comprehensive recovery plan is underway, with an action plan designed to restore normal operations. Future improvements in security will be based on lessons learned from […]
Outsourcing group Capita to cut 900 jobs in cost-saving drive | Capita
Capita, an outsourcing firm that provides services for the military, local councils, and NHS, is planning to cut 900 jobs as part of a cost-saving initiative. The job cuts will mainly affect support workers and administrative roles. Having been inflicted with a pre-tax loss of almost £68m in H1 2021 due to a cyber-attack, Capita […]
AI-Powered Impersonation Among Kaspersky’s Advanced Threat Projections For 2024
Advanced malicious actors are seeing more AI tools and are expected to use them for novel methods of cyberattacks in 2024, including supply chain attacks, hack-for-hire services, and new exploits for consumer devices. Security teams must anticipate the exploitation of software vulnerabilities, state-sponsored cyberattacks, and hacktivism. The rise in kernel rootkits, managed file transfer system […]
Hackers Exploit Asset Management Program to Deploy Malware
The Andariel hacker group has targeted South Korean corporations with malware, delivered via asset management programs, targeting servers and communication firms. The group has used multiple forms of attack including spear-phishing and supply chain attacks. The group has been known to previously associate with the Lazarus group and has used a variety of malware including […]