Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 53

Jan 24, 2023

ChatGPT Can Be Used to Create Dangerous Polymorphic Malware

Posted by in categories: cybercrime/malcode, robotics/AI

Polymorphic malware could be easily made using ChatGPT. With relatively little effort or expenditure on the part of the attacker, this malware’s sophisticated capabilities can readily elude security tools and make mitigation difficult.

Malicious software called ‘Polymorphic Malware’ has the capacity to alter its source code in order to avoid detection by antivirus tools. It is a very potent threat because it may quickly change and propagate before security systems can catch it.

According to researchers, getting around the content filters that prevent the chatbot from developing dangerous software is the first step. The bot was instructed to complete the task while adhering to a number of constraints, and the researchers were given a working code as an outcome.

Jan 24, 2023

ChatGPT passes Wharton Business School’s MBA exam, gets a B

Posted by in categories: business, cybercrime/malcode, mathematics, robotics/AI

Sometimes, ChatGPT made “surprising” mistakes in school-level math.

Microsoft-backed OpenAI’s AI chatbot ChatGPT has been making headlines ever since it was released to the public on November 30. It can break down complex scientific concepts, compose poems, write stories, code, and create malware…the list is endless. OpenAI has also released a paid version of the chatbot. Known as ‘ChatGPT Professional’, it is available at $42 per month.


Bauna/iStock.

Continue reading “ChatGPT passes Wharton Business School’s MBA exam, gets a B” »

Jan 23, 2023

A three-stage authentication system for the metaverse

Posted by in categories: cybercrime/malcode, robotics/AI, space, virtual reality

In recent years, many computer scientists have been exploring the notion of metaverse, an online space in which users can access different virtual environments and immersive experiences, using VR and AR headsets. While navigating the metaverse, users might also share personal data, whether to purchase goods, connect with other users, or for other purposes.

Past studies have consistently highlighted the limitations of password authentication systems, as there are now many cyber-attacks and strategies for cracking them. To increase the of users navigating the metaverse, therefore, password-based authentication would be far from ideal.

This inspired a team of researchers at VIT-AP University in India to create MetaSecure, a password-less authentication system for the metaverse. This system, introduced in a paper pre-published on arXiv, combines three different authentication techniques, namely device attestation, and physical security keys.

Jan 19, 2023

Ransomware attack cuts 1,000 ships off from on-shore servers

Posted by in category: cybercrime/malcode

Get your eyepatch out: Cyber attacks on the high seas are trending.

Jan 18, 2023

Scientist Is Going To Prove The Matrix Is Real

Posted by in category: cybercrime/malcode

A scientist is now aiming to prove that The Matrix is based on fact, and that the simulation we live in can be hacked.

Jan 18, 2023

A new privilege escalation vulnerability in the Linux kernel, enables a local attacker to execute malware on vulnerable systems

Posted by in category: cybercrime/malcode

A new privilege escalation vulnerability has been identified in the Linux kernel by researcher Davide Ornaghi. This vulnerability might enable a local attacker to execute code on vulnerable computers with elevated rights if the kernel is installed on those systems. Additionally, Davide published the proof-of-concept and the write-up. The vulnerability, which has been assigned the tracking number CVE-2023–0179, is a stack-based buffer overflow that exists in the Netfilter subsystem. An authorized attacker might exploit this issue to get elevated privileges as root if the attacker executed a program that had been carefully written for the purpose.

The Linux kernel has a framework known as netfilter that enables a variety of networking-related actions to be performed in the form of individualized handlers. This may be accomplished by filtering incoming network packets. Netfilter provides the functionality necessary for directing packets through a network and preventing packets from reaching sensitive locations within a network by offering a variety of functions and operations for packet filtering, network address translation, and port translation. [1] These features allow Netfilter to provide the functionality required for directing packets through a network.

Continue reading “A new privilege escalation vulnerability in the Linux kernel, enables a local attacker to execute malware on vulnerable systems” »

Jan 17, 2023

Hackers Took Over a Commercial Satellite to Broadcast Hacker Movies

Posted by in categories: cybercrime/malcode, satellites

A group of hackers was able to take control of a decommissioned satellite and use it to stream a hacking conference’s talks and hacker movies.

On Saturday, at the DEF CON hacking conference in Las Vegas, Karl Koscher, one of the members of a hacking enthusiasts group called Shadytel, explained how he and his friends were able to legally stream from a satellite in geostationary orbit—35,786 km or 22,236 miles from the surface of the planet.


The satellite had been decommissioned and was about to be sent to the so-called “graveyard orbit,” a far-away orbit where satellites go to die.

Continue reading “Hackers Took Over a Commercial Satellite to Broadcast Hacker Movies” »

Jan 17, 2023

New Backdoor Created Using Leaked CIA’s Hive Malware Discovered in the Wild

Posted by in category: cybercrime/malcode

A new backdoor has been discovered that borrows its features from the leaked CIA’s Hive malware suite.

Jan 15, 2023

Understanding Malware-as-a-Service (MaaS): The future Of cyber attack accessibility

Posted by in categories: business, cybercrime/malcode, energy

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.

With the explosive growth of technology, businesses are more vulnerable than ever to malicious cyber attacks. And as cybercriminals become more sophisticated, new methods of attack are popping up left and right.

To add fuel to the fire, the average cost of a data breach increased from $3.86 million to $4.24 million in 2021. That’s costly enough to put most SMBs into the red. Not to mention the reputational damage it can cause for your brand.

Jan 14, 2023

Quantum computers: How scientists can shield against cyber attacks

Posted by in categories: cybercrime/malcode, encryption, information science, quantum physics

Making predictions is never easy, but it is agreed that cryptography will be altered by the advent of quantum computers.

Thirteen, 53, and 433. That’s the size of quantum computers.


Hh5800/iStock.

Continue reading “Quantum computers: How scientists can shield against cyber attacks” »

Page 53 of 212First5051525354555657Last