Tag: detection methods

  • Hacker News: Reverse Engineering Call of Duty Anti-Cheat

    Source URL: https://ssno.cc/posts/reversing-tac-1-4-2025/ Source: Hacker News Title: Reverse Engineering Call of Duty Anti-Cheat Feedly Summary: Comments AI Summary and Description: Yes **Summary:** The text presents an in-depth analysis of the user-mode anti-cheat mechanism employed in the video game “Call of Duty: Black Ops Cold War,” referred to as TAC (Treyarch Anti-Cheat). It details the obfuscation…

  • Slashdot: AI Tools Crack Down on Wall Street Trader Code Speak

    Source URL: https://slashdot.org/story/25/01/17/1356236/ai-tools-crack-down-on-wall-street-trader-code-speak?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: AI Tools Crack Down on Wall Street Trader Code Speak Feedly Summary: AI Summary and Description: Yes Summary: The text discusses how compliance software firms are leveraging AI technology to enhance the detection of potential financial crimes on trading floors by deciphering complex trader communications. This marks a significant…

  • Cloud Blog: Google Cloud and Swift pioneer advanced AI and federated learning tech to help combat payments fraud

    Source URL: https://cloud.google.com/blog/products/identity-security/google-cloud-and-swift-pioneer-advanced-ai-and-federated-learning-tech/ Source: Cloud Blog Title: Google Cloud and Swift pioneer advanced AI and federated learning tech to help combat payments fraud Feedly Summary: Conventional fraud detection methods have a hard time keeping up with increasingly sophisticated criminal tactics. Existing systems often rely on the limited data of individual institutions, and this hinders the…

  • Wired: A New Phone Scanner That Detects Spyware Has Already Found 7 Pegasus Infections

    Source URL: https://www.wired.com/story/iverify-spyware-detection-tool-nso-group-pegasus/ Source: Wired Title: A New Phone Scanner That Detects Spyware Has Already Found 7 Pegasus Infections Feedly Summary: The mobile device security firm iVerify has been offering a tool since May that makes spyware scanning accessible to anyone—and it’s already turning up victims. AI Summary and Description: Yes Summary: The text discusses…

  • Hacker News: Computing with Time: Microarchitectural Weird Machines

    Source URL: https://cacm.acm.org/research-highlights/computing-with-time-microarchitectural-weird-machines/ Source: Hacker News Title: Computing with Time: Microarchitectural Weird Machines Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the development and implications of microarchitectural weird machines (µWMs), which exploit CPU microarchitectural features to create powerful obfuscation techniques for malware. This research provides insights into how these µWMs can…

  • The Register: Here’s what happens if you don’t layer network security – or remove unused web shells

    Source URL: https://www.theregister.com/2024/11/22/cisa_red_team_exercise/ Source: The Register Title: Here’s what happens if you don’t layer network security – or remove unused web shells Feedly Summary: TL;DR: Attackers will break in and pwn you, as a US government red team demonstrated The US Cybersecurity and Infrastructure Agency often breaks into critical organizations’ networks – with their permission,…

  • Hacker News: When machines could see you

    Source URL: https://dnlserrano.github.io//2024/10/20/when-machines-could-see-you.html Source: Hacker News Title: When machines could see you Feedly Summary: Comments AI Summary and Description: Yes Summary: The text details the historical development of facial recognition technologies, particularly highlighting the contributions of Geoffrey Hinton and the Viola-Jones algorithm. It emphasizes the transition from earlier methods used for face detection to modern…

  • The Register: Pixel perfect Ghostpulse malware loader hides inside PNG image files

    Source URL: https://www.theregister.com/2024/10/22/ghostpulse_malware_loader_png/ Source: The Register Title: Pixel perfect Ghostpulse malware loader hides inside PNG image files Feedly Summary: Miscreants combine it with an equally tricky piece of social engineering The Ghostpulse malware strain now retrieves its main payload via a PNG image file’s pixels. This development, security experts say, is “one of the most…