Tux Machines

Security Leftovers

Posted by Roy Schestowitz on Feb 25, 2023

=> Today in Techrights | today's howtos

URL files and WebDAV used for IcedID (Bokbot) infection, (Fri, Feb 24th)

=> ↺ URL files and WebDAV used for IcedID (Bokbot) infection, (Fri, Feb 24th)

Putting Undetectable Backdoors in Machine Learning Models

=> ↺ Putting Undetectable Backdoors in Machine Learning Models

This is really interesting research from a few months ago:

=> ↺ research

=> ↺ research

Here’s How We Broke Into a Bank Account Using an AI-Voice

=> ↺ Here’s How We Broke Into a Bank Account Using an AI-Voice

In this week’s CYBER, Joseph Cox talks us through how he created a clone of his voice and used it to bypass his bank’s security checks.

Who’s Behind the Botnet-Based Service BHProxies?

=> ↺ Who’s Behind the Botnet-Based Service BHProxies?

A security firm has discovered that a six-year-old crafty botnet known as Mylobot appears to be powering a residential proxy service called BHProxies, which offers paying customers the ability to route their web traffic anonymously through compromised computers. Here’s a closer look at Mylobot, and a deep dive into who may be responsible for operating the BHProxies service.

How the Ukraine War Has Changed Russia’s Cyberstrategy [iophk: Windows TCO]

=> ↺ How the Ukraine War Has Changed Russia’s Cyberstrategy

Ransomware attacks, in which hackers gain control of an organization’s computer systems and demand large sums of money to return access, were among the biggest concerns when Russia invaded Ukraine a year ago. While there were some isolated ransomware attacks on Ukraine and Poland late last year that Microsoft attributed to Russian military-affiliated hackers, attacks on the scale that hit Colonial Pipeline and meat processor JBS in 2021—resulting in millions of dollars of ransom payments—have largely been absent from the conflict. Ransomware payments declined by double-digit percentages across the board in 2022, according to cybersecurity firms and analysis groups.

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2023/02/25/Security_Leftovers.1.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
138.809503 milliseconds
Gemini-to-HTML Time
0.552993 milliseconds

This content has been proxied by September (ba2dc).