Start your day with intelligence. Get The OODA Daily Pulse.

Home > OODA Analysis and Briefs

Analysis

  • The Ultimate Targeted Attack: Malvertisments

    I’ve been in evil genius mode with Lou a few times on this. The advertising networks provide a tremendous amount of granularity that can be used for very focused attacks. For network defenders, they can also be very useful for attribution operations as well.

  • Blood Sacrifices

    OODA Loop is hosting this image gallery from Robert Bunker’s book Blood Sacrifices.

  • Brian Michael Jenkins on 40 Years of Terrorism

    Brian Michael Jenkins provides perspective from 40 years of countering terrorism. “Terrorism is violence or the threat of violence that’s calculated to create an atmosphere of fear and alarm that will cause people to exaggerate the threat posed by the terrorists and the importance of their cause.”

  • Terrorist and Insurgent Unmanned Aerial Vehicles

    This manuscript focuses on the present threat posed by terrorist and insurgent use of unmanned aerial vehicles (UAVs) as well as the associated future threat potentials identified. The work presents a counterintuitive analysis in the sense that armed drones are typically viewed as a component of America’s conventional warfighting prowess—not a technology that would be…

  • 10 Red Teaming Lessons Learned Over 20 Years

    I’ve been a red teamer for twenty years now, perhaps even longer, but I didn’t know what to call it until 1995 when I started working with the Department of Defense. I’ve also been fortunate to participate in or lead hundreds of red teams within many divergent disciplines ranging from strategic and tactical cyber to…

  • Burundi Conflict: Current Unrest is Not an Ethnic Conflict

    Before late-Spring of this year, few internationally-minded Americans would have been able to say anything of consequence about Burundi, perhaps beyond that it is in Africa. The country is small, resource-poor, and relatively politically insignificant, both regionally and internationally. In May, however, an election-related political conflict escalated into a military coup. The coup quickly failed…

  • Asymmetric naval warfare in the Taiwan Strait

    The recent landing in Taiwan by two USMC F/A-18C Hornet, allegedly due to a mechanical fault and the object of a prompt protest by Beijing, has served as a reminder of the Island’s key location. Sitting astride essential sea lanes of communication (SLOCs), halfway between Japan and South East Asia and between China and the…

  • Every Cyber Attacker is an Insider

    I recently witnessed the CIO of a publicly traded company dismissing the results of a successful red team to the Board of Directors by stating that the “the test wasn’t realistic as the red team had insider access.” The “insider” access in this instance was a network connection with no user credentials that was obtained…

  • Terrorism Reference CDROM

    This CDROM was created as an academic research resource for those with an interest in terrorism and counterterrorism issues. This edition was developed in collaboration with the American Society for Industrial Security’s (ASIS) National Capital Region for exclusive distribution to the attendees of the 2002 Countering Terrorism Seminar on June 12, 2002. It provides a…

  • The Devourers – Al-Baghdadi and The Islamic State

    “ISIS is an ‘imminent threat to every interest we have,’ warned Secretary of Defense Chuck Hagel. ‘This is beyond anything we’ve seen. We must prepare for everything.’ In an article appearing in The Hill, long-time Congressional staffer Brent Budowsky argued that it is ‘highly probable’ ISIS will…obtain nuclear, chemical, biological or other weapons of mass…

  • Somalia and Libya Intelligence Reports

    Download the weekly reports below. If you are interested in subscribing to these intel reports, please contact us. Somalia June 15 2014 Report Libya June 15 2014 Report

  • Russia’s Economic Powerplay: The EaEU

    On May 29th, Russia signed an economic treaty with Belarus and Kazakhstan that if successfully expanded, could significantly alter the balance of regional power in favor of Russia. Through free trade blocs and common programs, the Eurasian Economic Union (EaEU) also promises to reinvigorate economies that never successfully transitioned into market economies after the dissolution…

  • The American Redoubt and Homeland Security

    Introduction Although terrorism in the 21st century has become nearly synonymous with Islamist extremism, the United States has suffered from many non-Islamist domestic terrorist attacks over recent decades. In fact, over two-thirds of terrorist attacks in the US since 1980 have been carried out by non-Islamic extremists. These attacks have been the ferment of extremist…

  • Sochi 2014 Threat Overview

    Fear Before the March of Flames Even as the flames of the Olympic torch approach their destination in Sochi, Russia, security officials race to respond to emerging threats by non-state actors. Multiple terrorist organizations have issued ominous threats against the games while reports of other threats, both credible and doubtful, continually emerge. The games have,…

  • NIMS Intelligence/Investigations Function Guidance and Field Operations Guide

    The National Incident Management System (NIMS) represents a core set of doctrine, concepts, principles, terminology, and organizational processes that enables effective, efficient, and collaborative incident management. The Incident Command System (ICS), as a component of NIMS, establishes a consistent operational framework that enables government, private sector, and nongovernmental organizations to work together to manage incidents,…

Briefs

  • OpenAI acquires AI design studio Global Illumination

    OpenAI, the AI company behind the viral AI-powered chatbot ChatGPT, has acquired Global Illumination, a New York–based startup leveraging AI to build creative tools, infrastructure and digital experiences. It’s OpenAI’s first public acquisition in its roughly seven-year history. The terms of the deal weren’t disclosed. “We’re very excited for the impact they’ll have here at OpenAI,” OpenAI…

  • G20 Set to Crystalize Global Crypto Rules as India Wraps Up Presidency

    Leading economic officials pushed for greater global coordination of crypto regulations during a recent roundtable discussion held during a G20 meeting. International Monetary Fund Managing Director Kristalina Georgieva opposed the idea of an outright ban, likening crypto to water: “You try to plug it from one side, it will find some hole and come out.”…

  • Meet ‘Pibot,’ the humanoid robot that can safely pilot an airplane better than a human

    Both artificial intelligence (AI) and robotics have made significant strides in recent years, meaning most human jobs could soon be overtaken by technology – on the ground and even in the skies above us. A team of engineers and researchers from the Korea Advanced Institute of Science & Technology (KAIST) is currently developing a humanoid…

  • The history of Artificial Intelligence: A Complete AI Timeline

    Artificial intelligence, or at least the modern concept of it, has been with us for several decades, but only in the recent past has AI captured the collective psyche of everyday business and society. AI is about the ability of computers and systems to perform tasks that typically require human cognition. Our relationship with AI…

  • A.I. Can’t Build a High-Rise, but It Can Speed Up the Job

    Meant as a sly swipe at the inflated hype around artificial intelligence, a billboard at a construction site in Antwerp, Belgium, in June read “Hey ChatGPT, finish this building.” Artificial intelligence, the technology that powers chatbots like ChatGPT, won’t be assembling apartments or erecting stadiums any time soon, but in construction — an industry stereotypically known…

  • Troops guard Pakistani Christians after mob torches churches

    Violence erupted in eastern Pakistan after two men in a Christian settlement were accused of desecrating the Koran. A Muslim mob entered the settlement and set multiple churches and homes on fire before police ended the altercation 10 hours later. Troops have now blocked off the Christian colony located in the industrial district of Faisalabad.…

  • Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing Attacks

    Dutch cybersecurity company EclecticIQ recently published a report on a phishing campaign targeting NATO-aligned countries. The threat actor used the open-source chat application Zulip for command-and-control and to disguise its activities behind genuine web traffic. The campaign disguises malicious payloads as PDF documents with diplomatic lures to deliver the Duke malware. This malware has previously…

  • CISA Releases Cyber Defense Plan to Reduce RMM Software Risks

    The Cybersecurity and Infrastructure Security Agency (CISA) announced a new strategic plan to help infrastructure organizations safely use remote monitoring and management (RMM) software solutions. The RMM Cyber Defense Plan was developed by the Joint Cyber Defense Collaborative (JCDC). CISA stated that the plan is intended to identify ways RMM vendors can improve cybersecurity, as…

  • Thousands of Systems Turned Into Proxy Exit Nodes via Malware

    AT&T Alien Labs researchers discovered a network of over 400,000 systems where threat actors have leveraged access to malware-infected systems to deploy proxy applications. Researchers are unsure how many of the devices are infected, but the proxy service claims all devices are owned by users who understand the proxy’s functionality. The company also identified 10,000…

  • Experts Uncover Weaknesses in PowerShell Gallery Enabling Supply Chain Attacks

    Aqua security researchers discovered active flaws in the PowerShell Gallery, a central repository operated by Microsoft. Threat actors could leverage the vulnerabilities to execute supply chain attacks against the repository’s users. The PowerShell Gallery allows users to share and obtain PowerShell code, modules, scripts, and Desired State Configuration resources. The repository currently hosts 11,829 unique…

  • Singapore arrests 10 foreigners, seizes S$1 bln assets in money laundering probe

    Singapore police arrested 10 foreigners for alleged forgery and money laundering charges. A police statement announced that prohibition of disposal orders were imposed against 94 properties and 50 vehicles valued at over S$815 million. Other seized assets included various luxury items, electronic devices, and bank accounts, bringing the total assets impacted by the case to…

  • BRICS nations to meet in South Africa seeking to blunt Western dominance

    BRICS leaders will meet in South Africa next week to discuss expanding bloc membership to dozens of other “Global South” nations. Chinese President Xi Jinping, Brazilian President Luiz Inacio Lula da Silva, and Indian Prime Minister Narendra Modi will all represent their nations at the two-day summit beginning August 22. Although BRICS countries are not…

  • New US ambassador to Niger will arrive in country later this week

    The U.S. Senate confirmed Kathleen FitzGibbon as the new U.S. ambassador to Niger late last month after the coup took place. FitzGibbon, a career foreign service officer, will arrive in Niamey later this week. State Department deputy spokesperson Vedant Patel stated that FitzGibbon will not present her credentials to coup leaders and that her arrival…

  • Catholic Church in South Africa begins class action against mining firms

    The Catholic Church is leading a class-action lawsuit against mining companies in South Africa on behalf of coal miners suffering from lung diseases. The Southern African Bishops Conference has filed papers in South Africa’s High Court on behalf of 17 former and current mine workers, targeting mining giants BHP and South32, as well as South…

  • Libya militias battle in Tripoli after commander’s arrest

    Clashes between two powerful militias supporting Libya’s UN-backed government erupted in Tripoli, resulting in the deaths of 55 people and injuries to 146 others. The fighting caused the city’s main airport to close and only ceased after one side released a detained commander that had triggered the conflict. Libya has been marked by political chaos…

  • Ukraine war: Ship leaves Odesa despite Russia Black Sea attack fears

    Despite concerns of potential Russian targeting in the Black Sea, a merchant ship, the Hong Kong-flagged Joseph Schulte, has left the Ukrainian port of Odesa. The ship had been trapped in the port since Russia’s invasion of Ukraine in February 2022. Kyiv had announced a “humanitarian corridor” in the Black Sea after a deal to…

  • Ukrainian prisoners of war say they were tortured at Russian prison

    Former Ukrainian detainees who were released in prisoner exchanges have alleged that they were subjected to torture, including beatings and electric shocks, while in custody at a detention facility in Russia. The detainees claimed that Russian officers and guards at the Pre-Trial Detention Facility Number Two in Taganrog were involved in physical and psychological abuse.…

  • GitHub Paid Out $1.5 Million in Bug Bounties in 2022

    GitHub, the code hosting platform owned by Microsoft, has revealed that it paid out more than $1.57 million in rewards through its bug bounty program from February 2022 to February 2023. In total, the platform has awarded over $3.8 million in bug bounty rewards since it started the program on the HackerOne platform in 2016.…

  • Cleaning Products Giant Clorox Takes Systems Offline Following Cyberattack

    Cleaning products manufacturer Clorox Company has taken some of its systems offline in response to a cyberattack. The company detected unusual activity on its IT systems and quickly took steps to halt the activity and secure the affected systems. While Clorox has not disclosed the nature of the attack, taking systems offline is a common…

  • Ivanti Patches Critical Vulnerability in Avalanche Enterprise MDM Solution

    Ivanti has issued patches for seven critical- and high-severity vulnerabilities in its enterprise mobile device management (MDM) solution, Avalanche. The most severe vulnerability, CVE-2023-32563, is a directory traversal flaw that could allow remote code execution. Additionally, multiple stack-based buffer overflow bugs (CVE-2023-32560) and other high-severity remote code execution vulnerabilities (CVE-2023-32562 and CVE-2023-32564) were also patched.…

  • Google Releases Security Key Implementation Resilient to Quantum Attacks

    Google has collaborated with ETH Zurich to develop a quantum-resilient security key implementation that combines traditional elliptic-curve cryptography (ECDSA) with the quantum scheme CRYSTALS-Dilithium, which NIST recently standardized. This hybrid signature scheme aims to provide resistance to quantum attacks. The project, released as part of Google’s OpenSK initiative, offers proof-of-concept (PoC) source code and focuses…

  • Beaming Solar Energy From Space to Earth Could Soon Be a Reality

    The idea of space-based solar power (SBSP) – using satellites to collect energy from the Sun and “beam” it to collection points on Earth – has been around since at least the late 1960s. Despite its huge potential, the concept has not gained sufficient traction due to cost and technological hurdles. Can some of these problems now…

  • Ready but irresponsible? Analysis of the Government Artificial Intelligence Readiness Index

    Many are the promises of artificial intelligence (AI) and algorithms. Governments around the world are increasingly investing in AI and multiple voices have touted this seemingly unmatched revolution. Better performance, cost reduction, efficient management, crime prediction, and prevention are but a few of the pledges of the AI era. While such promises are recognized, research…

  • The Desperate Hunt for the A.I. Boom’s Most Indispensable Prize

    For the past year, Jean Paoli, chief executive of the artificial intelligence start-up Docugami, has been scrounging for what has become the hottest commodity in tech: computer chips. In particular, Mr. Paoli needs a type of chip known as a graphics processing unit, or GPU, because it is the fastest and most efficient way to…

  • Three DeFi Projects Shut Down, Is DeFi Shaken?

    Following Saddle Finance and Spirit Swap, another DeFi project is shutting down. Hundred Finance, a multi-chain leading protocol on Optimism, declared a shutdown following a special vote. The poll, starting on July 26, raised the question of whether or not the project should sunset its lending services and compensate mveHND impacted by the latest hack.…

  • The AI Power Paradox

    It’s 2035, and artificial intelligence is everywhere. AI systems run hospitals, operate airlines, and battle each other in the courtroom. Productivity has spiked to unprecedented levels, and countless previously unimaginable businesses have scaled at blistering speed, generating immense advances in well-being. New products, cures, and innovations hit the market daily, as science and technology kick…

  • Beijing Tries to Regulate China’s AI Sector Without Crushing It

    Beijing is poised to implement sweeping new regulations for artificial intelligence services this week, trying to balance state control of the technology with enough support that its companies can become viable global competitors. The government issued 24 guidelines that require platform providers to register their services and conduct a security review before they’re brought to…

  • AI a Top Risk and the Preferred Solution to Financial Crime

    Generative AI tools are the most effective way to tackle financial crime, but also a number one threat, according to a new survey of anti-money laundering (AML) professionals. Feedzai interviewed hundreds of compliance workers in the sector to compile its latest study, The State of Global Anti Money Laundering Compliance Report 2023. It found that…

  • More Than Half The Complexity Of Robots Is In The Hands

    Today might be the golden age of humanoid robot development. Tesla is building Optimus, Figure AI is working on Figure 01, which it hopes will be the “world’s first commercially-viable autonomous humanoid robot.” Fourier Exo is building the GR-1, Agility Robotics is making Digit, and Boston Dynamics is always making some vaguely human or dog-like…

  • Saudi Arabia and UAE race to buy Nvidia chips to power AI ambitions

    Saudi Arabia and the United Arab Emirates are buying up thousands of the high-performance Nvidia chips crucial for building artificial intelligence software, joining a global AI arms race that is squeezing the supply of Silicon Valley’s hottest commodity. The Gulf powerhouses have publicly stated their goal of becoming leaders in AI as they pursue ambitious…

  • Taiwan VP has No Plans to Change Island’s Formal Name

    Taiwanese Vice President William Lai has arrived in Paraguay after a stopover in the U.S. to attend the inauguration of new Paraguayan President Santiago Pena on Tuesday. This trip has sparked fears that it could spur more Chinese military drills near Taiwan, as Beijing has criticized Lai’s trip. Taiwan has defended the visit saying Taiwanese…

  • Russia’s Central Bank Hikes Rates to 12 Percent to Halt Rouble’s Slide

    Russia’s central bank has hiked its key interest rate by 350 basis points to 12 percent, an emergency move to try and halt the rouble’s recent slide after a public call from the Kremlin for tighter monetary policy. On Monday, the rouble plummeted past the 100 threshold against the US dollar, dragged down by the…

  • Taliban Fighters, Unsettled by Peace, Seek New Battles Abroad

    As a generation of fighters raised in war now finds itself stuck in a country at peace, hundreds of young Taliban soldiers have crossed illegally into Pakistan to battle alongside an insurgent group, according to Taliban members, local leaders and security analysts. They are determined to continue waging jihad — wherever in the world it…

  • Black Sea Clashes Grow as Russia Fires Warning Shots and Boards a Freighter

    Moscow made good on its threats to enforce its blockade of Ukraine by firing warning shots in the Black Sea this weekend. This reflects the rising tension of the Black Sea, which Western analysts have warned could escalate into violence involving countries not directly involved in the war. State Department spokesman, Vedant Patel, says they…

  • 5 Tips for Securing Data When Using a Personal Mac for Work

    Security risks arise when using your personal Mac for work. However, there are ways to secure your Mac and protect your organization’s information. The first tip is to encrypt your Mac’s hard drive using FileVault. FileVault provides protection against your company’s proprietary information being stolen from your Mac. Other tips include, using a separate email…

  • Microsoft: Critical CODESYS Flaws Could Shut Down Power Plants

    Microsoft researchers have identified multiple vulnerabilities that could enable threat actors to shut down power plants. There were 15 bugs discovered in the CODESYS software development kit (SDK), which is used to program and engineer programmable logic controllers in industrial operation technology (OT) systems. Exploitation of these discovered vulnerabilities put critical infrastructure at risk of…

  • Iagona ScrutisWeb Vulnerabilities Could Expose ATMs to Remote Hacking

    Several vulnerabilities discovered in the ScrutisWeb ATM fleet monitoring software made by French company Iagona could be exploited to remotely hack ATMs. These security holes were found by Synack Red Team members and were patched by the vendor in July 2023 with the release of ScrutisWeb version 2.1.38. ScrutisWeb allows organizations to monitor banking or…

  • Following Pushback, Zoom Says It Won’t Use Customer Data to Train AI Models

    Zoom recently introduced two generative artificial intelligence (AI) features. Zoom then updated their terms of services, which gave them the right to use customer data for training these AI models without needing customer consent. However, after criticism from customers on social media concerned with privacy implications, Zoom says it will take back this change to…

  • PayPal to roll out Cryptocurrencies Hub for select users

    Payments giant PayPal, which recently launched the dollar-backed stablecoin PayPal USD (PYUSD), updated its terms and conditions to introduce Cryptocurrencies Hub — a feature that allows users to hold and interact with Bitcoin and cryptocurrencies in their PayPal account. The latest PayPal terms and conditions detail the prerequisites for crypto users interested in using the platform…

  • The Space Force Is Launching Its Own Swarm of Tiny Satellites

    Four years after it was formed, the US Space Force has begun deploying its first satellite network. For the military, it marks a significant shift from relying on a handful of powerful, expensive satellites to a swarm of smaller, cheaper ones. From the Pentagon’s perspective, they’ll be a harder target for rivals to strike; a…

  • OpenAI likely to go bankrupt by the end of 2024

    OpenAI’s ChatGPT became the fastest-growing app in history after its launch in November 2022. Since its launch, it created both excitement and alarm to replace human in jobs. Now a report by Analytics India Magazine has stated that the company might go bankrupt by the end of 2024. As per the report, when OpenAI applied…

  • Google-backed Anthropic raises $100 mln from South Korea’s SK Telecom

    South Korea’s largest telco SK Telecom said it will invest $100 million in U.S. artificial intelligence firm Anthropic to strengthen its telecommunications-driven AI business. Anthropic, a startup competing with OpenAI in building AI foundation models, is among the most well-funded AI firms, having raised $450 million from investors including Alphabet Inc’s (GOOGL.O) Google and Spark…

  • Time To Redesign Your Career For The Age Of Artificial Intelligence

    It’s clear that technology professionals will see their roles transformed with artificial intelligence, requiring skills refreshes and learning new approaches. Not so clear is the impact of AI on career prospects for business managers and professionals, with confusing messages about job replacement and usurping of decision-making authority. The rise of AI, particularly generative AI, is likely…

  • Britain warns of possible terrorist attacks in Sweden

    On Sunday, Britain released a travel advisory for British citizens visiting Sweden. The statement identified an increase in possible terrorist attacks following Koran burnings by anti-Islam activists in the country. In a later update, Britain’s foreign ministry said Swedish authorities foiled some planned attacks and made multiple arrests. Sweden’s National Security Advisor Henrik Landerhold noted…

  • Power Management Product Flaws Can Expose Data Centers to Damaging Attacks, Spying

    Trellix researchers discovered nine vulnerabilities in CyberPower’s PowerPanel Enterprise data center power management software and Dataprobe’s iBoot power distribution unit (PDU). The vulnerabilities could allow threat actors to spy on organizations, cause significant damage, and even gain full access to the targeted system. The four CyberPower Powerpanel Enterprise vulnerabilities included authentication bypass and OS command…

  • US Shuts Down Bulletproof Hosting Service LolekHosted, Charges Its Polish Operator

    US authorities seized LolekHosted.net and the domain used by the bulletproof hosting service LolekHosted. Court documents claim that cybercriminals used the domain for almost a decade to distribute ransomware, phishing, and DDoS attacks. Polish national Artur Karol Grabowksi first registered the web hosting service company in 2014. In his tenure as the company’s primary operator,…

  • IS claims responsibility for an attack that killed 33 Syrian soldiers, and vows to keep fighting

    The Islamic State (IS) claimed responsibility for an ambush that killed 33 Syrian soldiers in eastern Syria. The Saturday attack is one of the deadliest extremist events in Syria this year. The two army trucks carrying the soldiers were transporting weapons through the eastern Deir el-Zour province. IS claims that the ambush killed 40 soldiers…

  • Far-right populist Javier Milei is the biggest vote-getter in Argentina’s presidential primary

    Javier Milei surprised Argentina’s political establishment by emerging from the primary elections as a front-runner on Sunday. Milei recently gained notoriety and was not viewed as a serious contender for the presidency in the October general election. Discontent with the current government is widespread in Argentina. Annual inflation is over 100% and the Argentine Peso…

  • Niger’s coup leaders say they will prosecute deposed President Mohamed Bazoum for ‘high treason’

    Hours after announcing they were open to dialogue with ECOWAS, Niger’s military junta stated they will prosecute President Mohamed Bazoum for high treason and undermining state security. According to the country’s penal code, Bazoum could face the death penalty for these charges. Bazoum and his family have been under house arrest since the coup on…

  • Ford Says Wifi Vulnerability Not a Safety Risk to Vehicles

    Texas Instruments recently disclosed a bug in the Wi-Fi driver of its SYNC 3 infotainment system, which is used in multiple Ford and Lincoln vehicles. Ford announced that the vulnerability does not pose a safety risk to its customers. Ford also stated that it is working with TI to address the bug, which has a…

  • Iagona ScrutisWeb Vulnerabilities Could Expose ATMs to Remote Hacking

    Vulnerabilities in Iagona’s ScrutisWeb ATM fleet monitoring software were discovered by Synack Red Team members. The French company’s software allows organizations to oversee a large number of retail and banking ATMs from a browser. Synack researchers discovered several vulnerabilities in the ScrutisWeb software, including arbitrary file upload, authorization bypass, and hardcoded cryptographic key issues. Unauthenticated…

  • India Passes Data Protection Legislation in Parliament. Critics Fear Privacy Violation

    Indian lawmakers have approved a data protection legislation aimed at regulating big tech firms and penalizing companies for data breaches. The legislation, known as the Digital Personal Data Protection bill, seeks to establish a framework for data protection and limit cross-border data transfers. However, concerns have been raised about the potential impact on citizens’ privacy…

  • Northern Ireland’s Top Police Officer Apologizes for ‘Industrial Scale’ Data Breach

    Northern Ireland’s Chief Constable, Simon Byrne, has issued an apology for a significant data breach that exposed the personal information of more than 10,000 police officers and staff. The breach, described as an “industrial scale” incident, has raised concerns due to the ongoing security situation in the region, which has a history of sectarian violence.…

  • Microsoft Discloses Codesys Flaws Allowing Shutdown of Industrial Operations, Spying

    Microsoft researchers have identified over a dozen vulnerabilities in Codesys products, used in industrial control systems (ICS). These vulnerabilities, assigned high severity ratings, were found in Codesys Control V3 versions prior to 3.5.19.0. Exploitation could lead to denial-of-service attacks or remote code execution, potentially affecting industrial operations or data theft. While requiring authentication for exploitation,…

  • In Other News: macOS Security Reports, Keyboard Spying, VPN Vulnerabilities

    SecurityWeek presents a weekly cybersecurity roundup featuring lesser-known but significant stories for a comprehensive grasp of the field. This week’s highlights include AI-assisted data theft through keystroke sound analysis, DHS announcing $374 million for state and local cybersecurity, Interpol’s closure of phishing platform 16shop with arrests in Indonesia and Japan, US Health and Human Services…

  • China’s internet giants order $5bn of Nvidia chips to power AI ambitions

    China’s internet giants are rushing to acquire high-performance Nvidia chips vital for building generative artificial intelligence systems, making orders worth $5bn in a buying frenzy fuelled by fears the US will impose new export controls. Baidu, ByteDance, Tencent and Alibaba have made orders worth $1bn to acquire about 100,000 A800 processors from the US chipmaker…

  • Sam Altman’s Eyeball-Scanning Crypto Project Worldcoin Is Having An Identity Crisis

    As“Beverly” stared into the orb, the machine continued to malfunction. The spartan silver sphere, which scans eyeballs for Sam Altman’s cryptocurrency project Worldcoin, had failed to record her iris despite several attempts. It was August 2021, and Beverly, a top executive at Tools For Humanity, the company behind Worldcoin, had come to Erlangen, Germany, to…

  • Russia launches first space mission to Moon in 47 years

    For the first time in nearly half a century, Russia has launched a spacecraft that is headed to the moon. On Friday morning at a spaceport in the far eastern part of Russia, a rocket lifted Luna-25, a robotic lander of moderate size, to Earth orbit. It will try to land in the moon’s south polar…

  • Web3 Security Experts Launch Telegram Bot For DeFi Hack Victims

    A new telegram bot, dubbed Seal 911, is an experimental security solution spearheaded by a group of Web3 security experts to provide a hotline in case of crypto emergencies. Multimillion-dollar hacks and exploits have become all too common in Web3, with losses amounting to at least $303M in July alone, according to security firm Certik. With so…

  • The Hard Realities of Setting AI Risk Policy

    Here’s some good news for artificial intelligence (AI) risk management: After years of warnings from cybersecurity, data science, and machine learning (ML) advocates, CISOs are finally paying attention. This is the year that cybersecurity professionals are waking up to the multilayered risks surrounding AI. The hard part now is figuring out what comes next. What substantive…