The sixth sense for cyber defense: Multimodal AI
Sophos X-Ops’ research, presented at Virus Bulletin 2024, uses ‘multimodal’ AI to classify spam, phishing, and unsafe web content
Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to facilitate credential harvesting attacks as part of an unusual campaign. The packages have been collectively downloaded 26,000 times, acting as an infrastructure for a widespread phishing campaign codenamed Beamglea targeting more than 135 industrial, technology,…
Giles Bruce reports: A Georgia hospital has defeated a class-action lawsuit over the use of data-tracking tools on its websites, Law.com reported. A state court granted Moultrie, Ga.-based Colquitt Regional Medical Center’s motion to dismiss the complaint, which alleged the hospital unlawfully collected patients’ protected health information and transmitted it to third parties like Meta’s Facebook, according…
You arrive at the office, power up your system, and panic sets in. Every file is locked, and every system is frozen. A ransom demand flashes on your screen: “Pay $2 million in Bitcoin within 48 hours or lose everything.” And the worst part is that even after paying, there’s no guarantee you’ll get your…
Open-source intelligence reveals the server-side code of this pernicious SEO-driven malware – without needing a lawyer afterward
BakerHostetler writes: On Thursday, Jan. 23, DISA Global Solutions, Inc. (DISA) provided an update to customers regarding its April 2024 cyber incident, including the results of its data review and notification plans. According to DISA, its investigation determined an unauthorized third party accessed its environment between Feb. 9, 2024, and April 22, 2024, and “procured…
Two high-severity security flaws have been disclosed in the open-source ruby-saml library that could allow malicious actors to bypass Security Assertion Markup Language (SAML) authentication protections. SAML is an XML-based markup language and open-standard used for exchanging authentication and authorization data between parties, enabling features like single sign-on (SSO), which allows