Sat.Sep 07, 2019

article thumbnail

Thousands of servers infected with the Lilocked Ransomware

Security Affairs

A new ransomware tracked as Lilocked (or Lilu) by researchers is actively targeting servers and encrypting the data stored on them. The Lilocked ransomware has already infected thousands of Linux-based web servers since mid-July. The Lilocked ransomware was first reported at the end of July by the popular malware researcher Michael Gillespie after a sample has been uploaded to his ID Ransomware service.

article thumbnail

An Unprecedented Cyberattack Hit the US Power Grid

WIRED Threat Level

Exposed Facebook phone numbers, an XKCD breach, and more of the week's top security news.

Security 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experts add a BlueKeep exploit module to MetaSploit

Security Affairs

Maintainers of the open-source Metasploit penetration testing framework have added a public exploit module for the BlueKeep Windows flaw. There is a surprise for Metasploit users, maintainers of the open-source penetration testing framework have added a public exploit module for the BlueKeep Windows flaw. The BlueKeep vulnerability , tracked as CVE-2019-0708, impacts the Windows Remote Desktop Services (RDS) and was addressed by Microsoft with May 2019 Patch Tuesday updates.

article thumbnail

The Windows 10 Privacy Settings You Should Check Right Now

WIRED Threat Level

Whether you're new to Windows 10 or have been using it for years, take a minute to lock down your privacy.

Privacy 98
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Google report on iPhone hack created ‘False Impression,’ states Apple

Security Affairs

Apple replied to Google about the recent report suggesting iPhones may have been hacked as part of a long-running hacking campaign. Apple criticized the report recently published by Google that claims that iPhones may have been hacked by threat actors as part of a long-running hacking campaign. Apple defines the report as inaccurate and misleading. At the end of August, researchers at Google Project Zero published an analysis that claims it was possible to hack iPhone devices by visiting special