Sat.Feb 16, 2019

article thumbnail

Astaroth Trojan relies on legitimate os and antivirus processes to steal data

Security Affairs

A new Astaroth Trojan campaign was spotted by the Cybereason’s Nocturnus team, hackers are targeting Brazil and European countries. Researchers at Cybereason’s Nocturnus team have uncovered a new Astaroth Trojan campaign that is currently exploiting the Avast antivirus and security software developed by GAS Tecnologia to steal information and drop malicious modules. “The campaign exploits legitimate operating system processes as well as security vendor products from companies l

article thumbnail

Chinese Surveillance, Facebook Tracking, and More Security News This Week

WIRED Threat Level

3-D printed rifles, Iran missile hacking, and more of the week's top security news.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia is going to disconnect from the internet as part of a planned test

Security Affairs

Russia plans to disconnect the country from the internet as part of an experiment aimed at testing the response to cyber attacks that should isolate it. Russia plans to conduct the country from the Internet for a limited period of time to conduct a test aimed at assessing the security of its infrastructure. Russian citizens will be able to reach only Internet resources within the national territory, any other only resource hosted outside the country will be not reachable.

article thumbnail

Dolphins and Pufferfish

Adam Shostack

Apparently, “ Dolphins Seem to Use Toxic Pufferfish to Get High.” Of course, pufferfish toxins are also part of why the fish is a delicacy in Japan. It just goes to show that nature finds its own, chaotic, uses for things.

IT 45
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

A new batch of 127 million records appears in the dark web

Security Affairs

A new batch of 127 million records appears in the dark web , this time the huge trove of data appears to be originated from eight companies. A hacker that goes online with the moniker ‘ gnosticplayers ‘ is offering for sale the data on the Dream Market marketplace asking $14,500 worth of Bitcoin. Early this week, the same seller also listed another batch of 620 million accounts coming from other 16 breached websites including Dubsmash, Armor Games, 500px, Whitepages, and ShareThis.

article thumbnail

The Story Behind the V.D. Radio Project

Archives Blogs

“ It struck me as odd, even bizarre, that the conqueror of the Nazis, liberator of Europe, should now be sitting before me with a furrowed brow, listening to this dialogue. But there he was.”. You’re right, Dr. Barnouw. The idea of the future leader of the free world , perched in his new aerie atop the ivory towers of Columbia University, listening with sincere attentiveness to a syrupy, organ-drenched melodrama about the great unspeakable anathema of syphilis, is bizarre, even ridiculo