article thumbnail

LemonDuck Shows Malware Can Evolve, Putting Linux and Microsoft at Risk

eSecurity Planet

The LemonDuck malware that for the past couple of years has been known for its cryptocurrency mining and botnet capabilities is evolving into a much broader threat, moving into new areas of cyber attacks, targeting both Linux and Microsoft systems and expanding its geographical reach, according to security researchers with Microsoft.

Risk 144
article thumbnail

Group-IB presented latest cybercrime and nation-state hacking trends in Asia

Security Affairs

According to Group-IB’s report findings, Asia is one of the most actively attacked regions in the world, the company presented latest cybercrime trends. According to Group-IB’s report findings, Asia is one of the most actively attacked regions in the world. Espionage as one of the main APT groups’ goals.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Adversarial ML Attack that Secretly Gives a Language Model a Point of View

Schneier on Security

.” This is what I wrote in my upcoming book (to be published in February): One example of an extension of this technology is the “persona bot,” an AI posing as an individual on social media and other online groups. They hang out in various interest groups: gardening, knitting, model railroading, whatever.

Mining 92
article thumbnail

Security Affairs newsletter Round 203 – News of the week

Security Affairs

Paper Copy. CoinHive Cryptocurrency Mining Service will shut down on March 8, 2019. Ransomware, Trojan and Miner together against PIK-Group. Analyzing the evolution of MageCart cybercrime groups TTPs. A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs.

article thumbnail

Security Affairs newsletter Round 175 – News of the week

Security Affairs

Paper Copy. The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal. 20% discount. Kindle Edition. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Pierluigi Paganini. Security Affairs – Newsletter ).

article thumbnail

Attacks against machine learning — an overview

Elie

this paper. A very recent example of such behavior is the rise of abusing cloud services such as Google Cloud to mine cryptocurrencies in response to the surge of bitcoin price late 2017. skyrocketed past $10,000, we saw a surge of new attacks that attempted to steal Google cloud compute resources to mine. adversarial examples.

Mining 107
article thumbnail

Security Affairs newsletter Round 181 – News of the week

Security Affairs

Paper Copy. Magecart cybercrime group stole customers credit cards from Newegg electronics retailer. Ngrok Mining Botnet. The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal. 20% discount. Kindle Edition. Once again thank you!