New Sysrv Botnet Variant Makes Use of Google Subdomain to Spread XMRig Miner
Sysrv is a well-documented botnet first identified in 2020, with the main payload being a worm written in Golang. It drops a cryptominer onto infected hosts before attempting to propagate itself using ...
AI and the Evolution of Social Media
Oh, how the mighty have fallen. A decade ago, social media was celebrated for sparking democratic uprisings in the Arab world and beyond. Now front pages are splashed with stories of social ...
Google Splashes the Cash in Bug Bounty Bonanza: $59 Million to Date
Wanna be a VRP VIP? Last year, $GOOG paid $10 million to ethical hackers for finding vulnerabilities ...
Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware
In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part. They ...
Google Initiative Aims to Boost AI for Cybersecurity
Google is pushing AI as the technology that will shift the balance of power from cyberattackers to security professionals and is launching a new project to make that a reality. The AI ...
Google Pushes Software Security Via Rust, AI-Based Fuzzing
Google is making moves to help developers ensure that their code is secure. The IT giant this week said it is donating $1 million to the Rust Foundation to improve interoperability between ...
Malicious AdTech Spies on People as NatSec Targets
Targeted ads target targets: Patternz and Nuviad enable potentially hostile governments to track individuals by misusing ad bidding ...
Most Advanced iPhone Exploit Ever, Google’s $5 Billion Settlement, Apple’s Journal App
In this episode, we discuss the most sophisticated iPhone exploit ever, Google’s agreement to settle a $5 billion lawsuit about tracking users in ‘incognito’ mode, and a new iOS app, Journal. The ...
GKE Case Highlights Risks of Attackers Chaining Vulnerabilities
Palo Alto Network’s cybersecurity recently outlined two vulnerabilities it found in Google Kubernetes Engine (GKE) that, individually, don’t represent much of a threat. However, if a threat actor who already had access ...
Google Cloud Report Spotlights 2024 Cybersecurity Challenges
Google Cloud suggests that it will become simpler for cybersecurity teams to leverage AI to better defend IT environments ...