Tech news from MIST
Latest news from CyberManipal, that matters.
Page 5
VULNERABILITIES
Vulnerabilities exploited to Hack Linux Systems
3 years ago
Linux-based frameworks are presented to the web directly—attackers can, hence, undoubtedly target them to introduce noxious web shells, ransomware, Trojans, and so on. The US-Japanese firm Trend Micro distributed a point-by-point examination on the Linux danger setting, featuring the difficulties and weaknesses that affected the OS in the main portion... Read more
Linux-based frameworks are presented to the web directly—attackers can, hence, undoubtedly target them to introduce... Read more
BREACHES
38 million data records spilled by Microsoft power apps
3 years ago
Microsoft power apps is described as a service that enables users to build and use custom business apps that connect to their data and work across the internet. It saves them time and expenses for custom software development. The Microsoft Power apps portal has exposed personal data tied to 38... Read more
Microsoft power apps is described as a service that enables users to build and use... Read more
VULNERABILITIES
Web Shells and Ransomware transmitted exploiting ProxyShell Vulnerabilities
3 years ago
The Cybersecurity and Infrastructure Security Agency (CISA) has recently warned that various attackers use three so-called “ProxyShell” vulnerabilities to compromise Microsoft Exchange Servers worldwide. They were discovered and demonstrated by Orange Tsai and his fellow research colleagues from DEVCORE Research Team at the Pwn2Own contest and also mentioned at the... Read more
The Cybersecurity and Infrastructure Security Agency (CISA) has recently warned that various attackers use three... Read more
RESEARCH AND DEVELOPMENT
OPAD: A New Adversarial Attack Targeting Artificial Intelligence
3 years ago
Researchers have discovered a new adversarial attack that can fool AI technologies. This new attack—OPtical ADversarial attack (OPAD)—is based on three main objects—a camera, a low-cost projector, and a computer. OPAD is based on a low-cost projector-camera system in which researchers have projected calculated patterns to modify the appearance of... Read more
Researchers have discovered a new adversarial attack that can fool AI technologies. This new attack—OPtical... Read more
RESEARCH AND DEVELOPMENT
Elon Musk unveils an AI humanoid Robot
3 years ago
Speaking at Tesla's AI Day event, Tesla CEO Elon Musk unveiled a humanoid robot called the Tesla Bot that works on the similar AI used by Tesla's vehicle. It is designed to eliminate repetitive, dangerous, boring tasks. Tesla Bot is 173 centimeters tall, weighs 57 kilograms, and has 40 electromechanical... Read more
Speaking at Tesla's AI Day event, Tesla CEO Elon Musk unveiled a humanoid robot called... Read more
BREACHES
DDoS attack three times bigger than the largest to date recorded
3 years ago
The largest-ever volumetric DDoS attack to date has been recorded on Thursday by web infrastructure and website security company Cloudflare. The attacker has bombarded the Cloudflare edge with over 330 million requests at a speed of 17.2 million requests per second, making the attack three times larger than the previously... Read more
The largest-ever volumetric DDoS attack to date has been recorded on Thursday by web infrastructure... Read more
VULNERABILITIES
'Bad Example' by Accenture for lack of transparency during ransomware attacks
3 years ago
When ransomware and cyber-attacks are at an all-time high, solution providers believe that high profile IT companies such as Accenture could help the industry by disclosing the attack details upfront. Their lack of disclosure is being heavily criticised and is seen as a missed opportunity to keep others well informed.... Read more
When ransomware and cyber-attacks are at an all-time high, solution providers believe that high profile... Read more
VULNERABILITIES
Terrorist watchlist with nearly 1.9M Records exposed
3 years ago
Volodymyr Diachenko, aka ‘Bob,’ the head of security research at Comparitech, revealed the discovery of a federal terror watchlist in his LinkedIn post on July 19th. It was a no-fly list with over 1.9 million records without any security protections or passwords. The no-fly list lists individuals considered dangerous from... Read more
Volodymyr Diachenko, aka ‘Bob,’ the head of security research at Comparitech, revealed the discovery of... Read more
POLICIES AND REGULATIONS
Crypto Market Reclaims Market Cap Of $2 Trillion
3 years ago
With the development of Bitcoin, cryptocurrency has made the leap from academic concepts to virtual reality. Recent news states that Bitcoin has topped $48,152 over the weekend, its highest level since May 2021. Bitcoin’s rise helped push the value of the entire cryptocurrency market above $2 trillion on Saturday, the... Read more
With the development of Bitcoin, cryptocurrency has made the leap from academic concepts to virtual... Read more
FRAUDS AND SCAMS
Experts Shed Light On New Russian Malware-as-a-Service Written in Rust
3 years ago
A new type of information-stealing malware has been discovered and sold on underground Russian forums, which indicates that threat actors are increasingly resorting to exotic programming languages to evade security protections. Dubbed as Ficker Stealer, it is a browser hijacker that lures users to fraudulent landing pages that offer free... Read more
A new type of information-stealing malware has been discovered and sold on underground Russian forums,... Read more