Enhancing Botnet Detection with AI using LLMs and Similarity Search

As botnets continue to evolve, so do the techniques required to detect them. While Transport Layer Security (TLS) encryption is widely adopted for secure communications, botnets leverage TLS to obscure command-and-control (C2) traffic. These malicious actors often have identifiable characteristics Read More …

First Israeli-built quantum computer now in operation

Israel’s first domestically built quantum computer, using advanced superconducting technology, is now operational. The 20-qubit quantum computer was developed under the leadership of the Israel Innovation Authority, Israel Aerospace Industries (IAI), Hebrew University, and Yissum, the university’s technology transfer company. Read More …

Texas medical school says hackers stole sensitive health data of 1.4 million individuals

The Texas Tech University Health Sciences Center (TTUHSC) confirmed hackers accessed the personal and sensitive health data of over 1.4 million individuals during a September cyberattack. The cyberattack, which also affected TTUHSC’s El Paso campus, saw attackers steal information including Read More …

Midnight Blizzard conducts large-scale spear-phishing campaign using RDP files

Since October 22, 2024, Microsoft Threat Intelligence has observed Russian threat actor Midnight Blizzard sending a series of highly targeted spear-phishing emails to individuals in government, academia, defense, non-governmental organizations, and other sectors. This activity is ongoing, and Microsoft will Read More …

Chinese researchers break RSA encryption with a quantum computer

The research team, led by Wang Chao from Shanghai University, found that D-Wave’s quantum computers can optimize problem-solving in a way that makes it possible to attack encryption methods such as RSA. In a potentially alarming development for global cybersecurity, Read More …

Education under siege: How cybercriminals target our schools​​

Education is essentially an “industry of industries,” with K-12 and higher education enterprises handling data that could include health records, financial data, and other regulated information. At the same time, their facilities can host payment processing systems, networks that are Read More …

Meta Glasses can be used to dox strangers via facial recognition

Two Harvard students have created a privacy nightmare, according to 404 Media. Real-time facial recognition smart glasses, which pull up names, contacts, addresses, and more about a complete stranger just by looking at them. The students – AnhPhu Nguyen and Read More …

Heriot-Watt University begins work on new £2.5m cyber attack station

Work has begun on the development of a new optical ground station at Heriot-Watt University in Edinburgh. The £2.5m facility will demonstrate and test satellite quantum secure communications and is scheduled to be fully operational by late autumn this year. Read More …

5G network flaws could be abused to let hackers spy on your phone

5G basebands could be exploited by attackers to allow them to send fake messages to your contacts, or even hand over your credentials using a very real-looking website, experts have warned. Unveiled at the Black Hat cybersecurity conference, a research Read More …

NATO releases revised AI strategy

On Wednesday (10 July 2024), NATO released its revised artificial intelligence (AI) strategy, which aims to accelerate the use of AI technologies within NATO in a safe and responsible way. AI or Artificial intelligence concept. It builds on one published Read More …