Tag: abuse

  • The Register: The biggest microcode attack in our history is underway

    Source URL: https://www.theregister.com/2025/02/10/microcode_attack_trump_musk/ Source: The Register Title: The biggest microcode attack in our history is underway Feedly Summary: When your state machines are vulnerable, all bets are off Opinion All malicious attacks on digital systems have one common aim: taking control. Mostly, that means getting a CPU somewhere to turn traitor, running code that silently…

  • Hacker News: Onlookers freak out as 25-year-old set loose on Treasury computer system

    Source URL: https://www.rawstory.com/musk-treasury-doge/ Source: Hacker News Title: Onlookers freak out as 25-year-old set loose on Treasury computer system Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The article discusses concerns over Marko Elez, a 25-year-old engineer previously associated with Elon Musk, gaining “read-and-write” access to fundamental U.S. Treasury Department systems that handle Social Security…

  • The Register: US senator wants to slap prison term, $1M fine on anyone aiding Chinese AI with … downloads?

    Source URL: https://www.theregister.com/2025/02/03/us_senator_download_chinese_ai_model/ Source: The Register Title: US senator wants to slap prison term, $1M fine on anyone aiding Chinese AI with … downloads? Feedly Summary: As UK proposes laws against neural-nets-for-pedophiles Americans may have to think twice about downloading a Chinese AI model or investing in a company behind such a neural network in…

  • Cloud Blog: CVE-2023-6080: A Case Study on Third-Party Installer Abuse

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/cve-2023-6080-third-party-installer-abuse/ Source: Cloud Blog Title: CVE-2023-6080: A Case Study on Third-Party Installer Abuse Feedly Summary: Written By: Jacob Paullus, Daniel McNamara, Jake Rawlins, Steven Karschnia Executive Summary Mandiant exploited flaws in the Microsoft Software Installer (MSI) repair action of Lakeside Software’s SysTrack installer to obtain arbitrary code execution. An attacker with low-privilege access…

  • Slashdot: Google Stops Malicious Apps With ‘AI-Powered Threat Detection’ and Continuous Scanning

    Source URL: https://it.slashdot.org/story/25/02/03/040259/google-stops-malicious-apps-with-ai-powered-threat-detection-and-continuous-scanning?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Google Stops Malicious Apps With ‘AI-Powered Threat Detection’ and Continuous Scanning Feedly Summary: AI Summary and Description: Yes Summary: Google’s security initiatives for Android and Google Play focus on proactively protecting users from harmful apps through advanced AI-driven threat detection, strict privacy policies, and enhanced developer requirements. In 2024,…