Posts

Showing posts with the label Cybersecurity

Executive Order issued on AI by President Biden

President Biden issued an executive order outlining new standards, safety and security procedures related to the use of AI in the United States. From my understanding, this is the first time anything has been put into writing by the US government regarding AI regulation. The idea of AI regulation is a divisive topic and many opinions have been raised. Overall, regulation can be an effective tool to ensure safety and security but can often go to far and stifle innovation or development. While it remains to be seen how these new guidelines will be implimented and utilized, I hope this is a step towards a safer and more innovative future. https://www.whitehouse.gov/briefing-room/statements-releases/2023/10/30/fact-sheet-president-biden-issues-executive-order-on-safe-secure-and-trustworthy-artificial-intelligence/ ai.gov

Wifi can read through walls

Using wifi for spacial analysis has been an idea tossed around for years. MIT has researched this and found that WIFI can be an effective tool to locate motion in rooms and even reveal building layouts. New research being done now shows that wifi can even be used to read letters, even through walls. While this technology is still in early stages, it will no doubt have uses in espionage and intelligence gathering. https://news.ucsb.edu/2023/021198/wifi-can-read-through-walls

Great website describing the details of ransomware attacks

The following website provides details about how real world ransomware attacks occur and what vulnerabilities led them to happen. https://thedfirreport.com/

Kali Purple - Network defense OS

For a long time, Kali linux has been highyly regarded on often utilized as an offensive network testing tool. With the release of Kali Purple, the focus shifts from an offensive approach to a defensive appoarch. This is great news for businesses and individuals looking to ensure their network security solutions are solid and not exposing anything inadvertently. New features include over 100 defensive tools such as Cyberchef, incident response plaforms, vulnerability scanners and intrusion detetection systems. Other features include a defensive community wiki and forum. https://www.kali.org/blog/kali-linux-2023-1-release/

Risks of public phone charging

Sometimes using public phone charging is not worth it. These chargers have the potential to transmit malware to your cell phone during the the charging process. https://www.cnbc.com/2023/04/10/fbi-says-you-shouldnt-use-public-phone-charging-stations.html

Theoretical attack can steal data from air-gapped devices

A new theoretical attack developed by Korea University involves using the built in speakers of a computer to transmit data to a smartphone even if the computer is not connected to the internet. The attack uses high pitch frequencies undetectable by humans to send data from an infected computer to a smartphone. https://www.bleepingcomputer.com/news/security/casper-attack-steals-data-using-air-gapped-computers-internal-speaker/

S1deload Stealer malware used to compromise social media accounts

A new type of malware is on the rise that's used to infect PCs and take over the users social media accounts. The user is tricked into opening and running malware with names like 'AlbumGirlSexy.exe'. https://www.infosecurity-magazine.com/news/s1deload-stealer-target-facebook/

Activision database breach

The video game publishing company Activision recently experienced a data breach. The was the result of a success SMS phishing attack. https://www.bleepingcomputer.com/news/security/activision-confirms-data-breach-exposing-employee-and-game-info/

500 hours worth of Cybersecurity training free

https://www.cybrary.it/blog/500-hours-free-content-to-address-cybersecurity-skills-shortage/

'Pig Butchering' scam found on Apple Store

This type of cyber scam involves 'fattening up' the victim before completing the scam. the victim is tricked into making fake financial investments then bullied into spending even more money to withdrawal funds, which will never happen. https://arstechnica.com/information-technology/2023/02/pig-butchering-scam-apps-sneak-into-apples-app-store-and-google-play/

Hacktivist finds FBI no fly list on unsecured network

 Interesting read on how simply browsing around unsecured networks can reveal interesting data.  I do believe a 'No Fly List' was made public sometime ago, however this list appears to be much larger.  https://www.businessinsider.com/hacktivist-finds-us-no-fly-list-reveals-systemic-bias-surveillance-2023-1

Sherlock Python Tool

Useful tool for OSINT operations https://github.com/sherlock-project/sherlock