There is no excerpt because this is a protected post.
Category: Cyber Crime
High-performance mice can be used as a microphone to spy on users thanks to AI — Mic-E-Mouse technique harnesses mouse sensors, converts acoustic vibrations into speech | Tom’s Hardware
The processing works like this: the raw audio data is run through digital signal processing using a Wiener Filter, where you can start to hear some information. This is then further cleared up through a neural model, giving the researchers clear audio.
Cyber criminals pull off $1.5 million heist, exploiting Baltimore’s outdated defenses
A cyber heist has cost the city more than $1.5 million after thieves manipulated the city’s electronic Workday system, according to a report released this week by Inspector General Isabel Cumming. The breach allowed cybercriminals to access a vendor’s account, alter bank account information, and redirect payments intended for city work.
Hackers Leverage Google Classroom in Phishing Attack Targeting Over 13,500 Organizations
The operation demonstrated significant scale and coordination, delivering a high volume of emails in just one week. The use of a widely used collaboration tool like Google Classroom allowed the attackers to reach a broad, multi-sector audience with minimal initial effort.
Hackers are looking to steal Microsoft logins using some devious new tricks – here’s how to stay safe | TechRadar
instead of sending victims directly to the site, which would probably get flagged by security solutions and quickly blocked, they used a Microsoft feature called Active Directory Federation Services (ADFS). Companies normally use it to connect their internal systems to Microsoft services.
Pentests once a year? Nope. It’s time to build an offensive SOC
In the real world, adversaries don’t operate in bursts. Their recon is continuous, their tools and tactics are always evolving, and new vulnerabilities are often reverse-engineered into working exploits within hours of a patch release.
So, if your offensive validation isn’t just as dynamic, you’re not just lagging, you’re exposed.
After $380M hack, Clorox sues its “service desk” vendor for simply giving out passwords – Ars Technica
According to The Clorox Company, which makes everything from lip balm to cat litter to charcoal to bleach, this is exactly what happened to it in 2023. But Clorox says that the “debilitating” breach was not its fault. It had outsourced the “service desk” part of its IT security operations to the massive services company Cognizant—and Clorox says that Cognizant failed to follow even the most basic agreed-upon procedures for running the service desk.
Microsoft says China-backed cybercriminals hacked into US nuclear weapons agency
“The early exploitation resembled government-sponsored activity, and then spread more widely to include hacking that ‘looks like China’,” Meyers told Bloomberg News. CrowdStrike’s investigation into the campaign remains ongoing.
Florida woman tricked into forking over $15k by AI cloning her daughter’s voice: ‘I know my daughter’s cry’
The phone number didn’t match Monroe’s, and the voice claimed that the police had taken her personal cellphone after the accident. But the AI-generated sound was so similar to her daughter’s voice — even her sobs — that Brightwell was completely convinced the call was real.