Malware
Search documents
X @Decrypt
Decrypt· 2025-10-21 09:39
DPRK Hackers Use 'EtherHiding' to Host Malware on Ethereum, BNB Blockchains: Google► https://t.co/O70NURkPvp https://t.co/O70NURkPvp ...
Part 2: Social engineering, malware, and the future of cybersecurity in AI
Google DeepMind· 2025-10-16 16:08
Cybersecurity Threats & Actors - Nation-state actors are primarily motivated by geopolitical aims and espionage, often engaging in offensive cyberattacks to support warfare or prepositioning for potential conflicts [5][6] - Subnation-state actors and some nation-state activities are financially motivated, commonly using ransomware attacks to steal and encrypt data, demanding cryptocurrency for its release [9][10] - A gray market exists for zero-day vulnerabilities, with buyers including companies equipping law enforcement and governments, with some vulnerabilities worth millions of dollars [12][14] - AI is exacerbating social engineering risks by enabling deep fakes, making phishing attacks more tailored and effective, such as cloning voices for ransom demands or impersonating executives for financial fraud [30][32][33] Vulnerability Disclosure & Mitigation - Project Zero introduced a 90-day disclosure timeline for vulnerabilities, compelling companies to prioritize security patches to prevent exploitation by malicious actors [19][20] - Governments have been known to deliberately withhold vulnerability information for exploitation purposes, as exemplified by the Eternal Blue case [24] - Healthcare and critical infrastructure sectors often struggle with patch management due to the risk of disrupting essential services, leading to long-term vulnerabilities [29] - Multi-factor authentication and pass keys are emerging as strong defenses against phishing and password-related attacks, enhancing security and user experience [37][39][40] AI & Agent Security - Risk-based authentication, enhanced by AI, assesses user behavior to determine trust levels and adjust security friction accordingly, such as requiring multi-factor authentication based on anomalous activity [43][46] - The rise of AI agents acting on behalf of humans introduces new security challenges, requiring careful consideration of agent identity, permissions, and potential for misuse [50][51] - Contextual integrity is crucial for training AI agents to respect privacy norms and avoid disclosing sensitive data inappropriately, necessitating mechanisms for agents to seek permission before sharing information [57][58][59]
China’s cyber forces are targeting every American #shorts
60 Minutes· 2025-10-13 01:48
Cybersecurity Threats & Tactics - Chinese actors are gaining access to US systems, stealing login credentials, and masquerading as legitimate employees to lay dormant within the network [1] - Automated scanning activity targeting millions of devices occurs daily [2] - The White House is working to assess exposure and mitigate damage from Chinese hacking [2] Impact & Remediation - One network rebuild cost more than $50,000 [3] - Removing an intruder from a network is more resource-intensive than preventing access [3] - Getting the basics right in critical infrastructure is crucial to avoid expending more resources on rooting out intruders [3] Challenges & Capabilities - Perfect knowledge of the extent of Chinese infiltration into US systems is lacking [2] - Scaling cybersecurity efforts remains a challenge [3]
X @Decrypt
Decrypt· 2025-10-11 19:35
The keylogging malware is capable of using GitHub to redirect itself to new servers whenever existing servers go offline. https://t.co/8zqRd3KlVt ...
X @Crypto Rover
Crypto Rover· 2025-10-06 08:49
Core Technology & Vision - Nonossystems (NOX) aims to create a base layer system encompassing OS and Network [1] - The system focuses on user-controlled memory, generating proofs on demand [1] - The system is designed to block malware and prevent data leakage [1] Industry Implications - In the AI era, systems prioritizing user data control and security will be crucial [1]
X @The Block
The Block· 2025-09-12 11:55
Threat Landscape - New ModStealer malware targets cryptocurrency wallets [1] - Malware utilizes fake recruiter advertisements as a lure [1] - Malware is designed to evade antivirus detection [1]
X @Decrypt
Decrypt· 2025-09-12 03:58
Researchers Uncover Undetectable Malware Draining Crypto Browser Wallets► https://t.co/cWAM51x0QC https://t.co/cWAM51x0QC ...
X @Cointelegraph
Cointelegraph· 2025-09-04 21:30
🚨 ALERT: Hackers are hiding malware in Ethereum smart contracts, disguising malicious traffic as normal blockchain activity, ReversingLabs reports. https://t.co/Bg1IyrZo7W ...
X @Decrypt
Decrypt· 2025-09-04 14:27
Hackers Using Ethereum Smart Contracts to Deliver Malware: Report► https://t.co/EMqOtvc4mR https://t.co/EMqOtvc4mR ...
X @BNB Chain
BNB Chain· 2025-09-04 11:32
Threat Landscape - DPRK threat actors are actively using fake Zoom links and Deepfakes to target macOS users in cryptocurrency scams [1] - These scams involve tricking users into installing malware to drain their crypto funds [1] - The crypto community needs to be well-informed to combat these persistent threats [1] Red Flags - Unexpected DMs on Telegram asking for meeting calls should raise suspicion [1] - Discrepancies in the account's behavior or Telegram handle are warning signs [1] - Be cautious of prompts to download security updates or fixes from forwarded "Zoom" links [1] - Inconsistencies in voice, visuals, or lighting during meeting calls are potential indicators of a scam [1] Security Recommendations - It's crucial to recognize that macOS is not inherently immune to malware attacks [1] - Individuals who suspect they have been targeted should seek assistance immediately [2]