Cyber attack prevention for Small businesses very has to get serious about their cybersecurity. Hackers are now actively Performing Targeted cyber attack due to their weak security. In fact, 43 percent of cyberattacks today are aimed at smaller firms. Unfortunately, falling victim to cyberattacks can be devastating. Cyberattacks can cause downtime, damaged reputation, and lost […]
The post Top 5 Best Cyber Attack Prevention Methods for Small Businesses With Breach & Attack Simulation appeared first on GBHackers On Security.
Top 5 Best Cyber Attack Prevention Methods for Small Businesses With Breach & Attack Simulation
MixCloud investigating a data breach that impacts more than 20 million registered users for the service. MixCloud is a popular music streaming service. The platform allows the listening and distribution of radio shows, DJ mixes, and podcasts which are uploaded by its users. The company said it has more than 17 million users. MixCloud was […]
The post MixCloud Hacked – 20 Million+ Users Stolen Personal Records Selling in Dark Web for $4,000 appeared first on GBHackers On Security.
MixCloud Hacked – 20 Million+ Users Stolen Personal Records Selling in Dark Web for ,000
The Sea Hunting Autonomous Reconnaissance Drone (SHARD) swims like a squid and can explode on command.
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
Read my blog posting guidelines here.
Friday Squid Blogging: Squid-Like Underwater Drone
Earlier this week Spanish security firm Prosegur shut down its network after its systems were hit by a ransomware infection.
Read more in my article on the Hot for Security blog.
Customers complain after alarms go offline, as security firm hit by ransomware attack
Amazon’s facial recognition would alert Ring users if “suspicious” individuals are near their house.
Amazon Plans Ring Facial Recognition-Based ‘Watch List’, Report
In a coordinated International law enforcement operation, Europol today announced to shut down the global organized cybercrime network behind Imminent Monitor RAT, yet another hacking tool that allows cybercriminals to gain complete control over a victim’s computer remotely.
The operation targeted both buyers and sellers of the IM-RAT (Imminent Monitor Remote Access Trojan), which was sold to
Europol Shuts Down 'Imminent Monitor' RAT Operations With 13 Arrests
Interesting research: “TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents“:
Abstract:: Recent work has identified that classification models implemented as neural networks are vulnerable to data-poisoning and Trojan attacks at training time. In this work, we show that these training-time vulnerabilities extend to deep reinforcement learning (DRL) agents and can be exploited by an adversary with access to the training process. In particular, we focus on Trojan attacks that augment the function of reinforcement learning policies with hidden behaviors. We demonstrate that such attacks can be implemented through minuscule data poisoning (as little as 0.025% of the training data) and in-band reward modification that does not affect the reward on normal inputs. The policies learned with our proposed attack approach perform imperceptibly similar to benign policies but deteriorate drastically when the Trojan is triggered in both targeted and untargeted settings. Furthermore, we show that existing Trojan defense mechanisms for classification tasks are not effective in the reinforcement learning setting.
From a news article:
Together with two BU students and a researcher at SRI International, Li found that modifying just a tiny amount of training data fed to a reinforcement learning algorithm can create a back door. Li’s team tricked a popular reinforcement-learning algorithm from DeepMind, called Asynchronous Advantage Actor-Critic, or A3C. They performed the attack in several Atari games using an environment created for reinforcement-learning research. Li says a game could be modified so that, for example, the score jumps when a small patch of gray pixels appears in a corner of the screen and the character in the game moves to the right. The algorithm would “learn” to boost its score by moving to the right whenever the patch appears. DeepMind declined to comment.
Manipulating Machine Learning Systems by Manipulating Training Data
Researchers discovered a new wave of spyware apps named Stalkerware emerging in wide for the past few months that spies victims’ online activities and steal sensitive data from the infected devices. Recently FTC warned that Retina-X developed and sold MobileSpy, PhoneSheriff and TeenShield shared sensitive information about your smartphone activities – such as call history, […]
The post Stalkerware – New Android Spyware Apps Remotely Gain Admin-level Access to Spy Your Activities & Steal The Data appeared first on GBHackers On Security.
Stalkerware – New Android Spyware Apps Remotely Gain Admin-level Access to Spy Your Activities & Steal The Data