Thursday, June 19, 2025
CISOs Anticipate Surge in Cyber Attacks Next Three Years
The report, “CISO Outlook 2025: Navigating Evolving Domain-Based Threats in an Era of AI and Tightening Regulation,” names cybersquatting, domain and DNS hijacking, and distributed denial-of-service (DDoS) attacks as the top three global cyber threats in 2024. These risks are only projected to escalate, as cybercriminals leverage new techniques and capabilities from AI and other modern technologies to launch more sophisticated attacks. Looking ahead, cybersquatting, domain-based attacks, and ransomware top the list of cybersecurity concerns for CISOs over the next three years. more
Protecting Electronic Devices When Crossing U.S. Borders
- Consider leaving your device behind.
- Password-protect your electronic devices with strong passwords
- Back up data before traveling.
- Remove sensitive data from a device before traveling.
- Remember that “deleted” files can be searched.
- Log out of cloud accounts
- Know your rights and legal status.
- Keep emergency contact information (including for an attorney) on paper to make this information available if a device is seized.
- If your device is seized, request a receipt (CBP Form 6051D)
- After a search, be sure to change your passwords.
Wednesday, June 11, 2025
Laptop Microphone Could Be Spying — Through Walls — Even When It’s Off
• The attack is surprisingly accessible: Researchers achieved over 94% accuracy in speech recognition using simple equipment like copper tape antennas, making this vulnerability exploitable by anyone with basic technical knowledge.
• Your “off” microphone might still be listening: Testing revealed that microphones often activate automatically when playing audio or video content, and some remain active even when apps appear muted. more
OpenAI's New Threat Report is Full of Spies, Scammers, and Spammers
Ever wonder what spies and scammers are doing with ChatGPT?
OpenAI just dropped a wild new threat report detailing how threat actors from China, Russia, North Korea, and Iran are using its models for everything from cyberattacks to elaborate schemes, and it reads like a new season of Mr. Robot.
The big takeaway: AI is making bad actors more efficient, but it's also making them sloppier. By using ChatGPT, they’re leaving a massive evidence trail that gives OpenAI an unprecedented look inside their playbooks.
1. North Korean-linked actors faked remote job applications. They automated the creation of credible-looking résumés for IT jobs and even used ChatGPT to research how to bypass security in live video interviews using tools like peer-to-peer VPNs and live-feed injectors.
2. A Chinese operation ran influence campaigns and wrote its own performance reviews. Dubbed “Sneer Review,” this group generated fake comments on TikTok and X to create the illusion of organic debate. The wildest part? They also used ChatGPT to draft their own internal performance reviews, detailing timelines and account maintenance tasks for the operation.
3. A Russian-speaking hacker built malware with a chatbot. In an operation called “ScopeCreep,” an actor used ChatGPT as a coding assistant to iteratively build and debug Windows malware, which was then hidden inside a popular gaming tool.
4. Another Chinese group fueled U.S. political division. “Uncle Spam” generated polarizing content supporting both sides of divisive topics like tariffs. They also used AI image generators to create logos for fake personas, like a “Veterans for Justice” group critical of the current US administration.
5. A Filipino PR firm spammed social media for politicians. “Operation High Five” used AI to generate thousands of pro-government comments on Facebook and TikTok, even creating the nickname “Princess Fiona” to mock a political opponent.
Why this matters: It’s a glimpse into the future of cyber threats and information warfare. AI lowers the barrier to entry, allowing less-skilled actors to create more sophisticated malware and propaganda. A lone wolf can now operate with the efficiency of a small team. This type of information will also likely be used to discredit or outright ban local open-source AI if we’re not careful to defend them (for their positive uses).
Now get this: The very tool these actors use to scale their operations is also their biggest vulnerability. This report shows that monitoring how models are used is one of the most powerful tools we have to fight back. Every prompt, every code snippet they ask for help with, and every error they try to debug is a breadcrumb. They're essentially telling on themselves, giving researchers a real-time feed of their tactics. For now, the spies using AI are also being spied on by AI.
FBI: Home Internet Connected Devices Facilitate Criminal Activity
The Federal Bureau of Investigation (FBI) is issuing this Public Service Announcement to warn the public about cyber criminals exploiting Internet of Things (IoT) devices connected to home networks to conduct criminal activity using the BADBOX 2.0 botnet. Cyber criminals gain unauthorized access to home networks through compromised IoT devices, such as TV streaming devices, digital projectors, aftermarket vehicle infotainment systems, digital picture frames and other products. Most of the infected devices were manufactured in China. Cyber criminals gain unauthorized access to home networks by either configuring the product with malicious software prior to the users purchase or infecting the device as it downloads required applications that contain backdoors, usually during the set-up process. Once these compromised IoT devices are connected to home networks, the infected devices are susceptible to becoming part of the BADBOX 2.0 botnet and residential proxy services known to be used for malicious activity.
WHAT IS BADBOX 2.0 BOTNET
BADBOX 2.0 was discovered after the original BADBOX campaign was disrupted in 2024. BADBOX was identified in 2023, and primarily consisted of Android operating system devices that were compromised with backdoor malware prior to purchase. BADBOX 2.0, in addition to compromising devices prior to purchase, can also infect devices by requiring the download of malicious apps from unofficial marketplaces. The BADBOX 2.0 botnet consists of millions of infected devices and maintains numerous backdoors to proxy services that cyber criminal actors exploit by either selling or providing free access to compromised home networks to be used for various criminal activity.
INDICATORS
The public is urged to evaluate IoT devices in their home for any indications of compromise and consider disconnecting suspicious devices from their networks. more
Friday, June 6, 2025
Book: Cyber for Builders: The Essential Guide to Building a Cybersecurity Startup
Cyber for Builders: The Essential Guide to Building a Cybersecurity Startup
Thursday, May 22, 2025
Find Out if Someone is Spying on Your Facebook Account
You should be the only one to control your account. To ensure this, periodically verifying that everything’s secure is a wise idea...
Meta buries this info in its account center. To go directly there, head to https://accountscenter.facebook.com/password_and_security/login_activity.
- Open the Facebook website in your browser
- Click on your profile icon at the top right of the window
- Choose Settings & privacy
- Select Settings
- Under Accounts Center in the upper left, click on See more in Accounts Center
- Choose Password and security
- Under Security checks, click on Where you’re logged in
Wednesday, May 7, 2025
Vatican to Deactivate Mobile Phone Signals
The Vatican also plans to use signal jammers around the Sistine Chapel to prevent electronic surveillance or communication outside the Conclave that will see 133 Cardinals vote on who will succeed Pope Francis and lead the world’s 1.4 billion Catholics, Italian news agency ANSA reported.
Phone signal will be cut off at 3.00 pm local time (9.00 am ET) today, an hour and a half before the Cardinals are scheduled to proceed to the Sistine Chapel to begin the papal conclave, Italian state broadcaster RAI reported on Monday. more
So get down without your phone,
Comfort knowing you're not alone,
Bow your head with great respect,
And disconnect, disconnect, disconnect!
Apple’s iPhone Warning—400 Million Chrome Users Must Now Act
Wednesday, April 16, 2025
EU Hands Out Burner Phones to US-bound Staff Over Spying Fears
The Financial Times reported on Monday that European Commissioners and senior officials travelling to the IMF and World Bank spring meetings next week have been given the new guidance to take basic phones and laptops. "They are worried about the US getting into the commission systems," FT quoted one official as saying. "The transatlantic alliance is over," the report said, quoting another anonymous EU official. more
Friday, April 4, 2025
Threat Actors Allegedly Selling SnowDog RAT Malware With Control Panel on Hacker Forums
The malware advertisement, discovered on Thursday, April 3, 2025, describes sophisticated capabilities that could threaten organizations worldwide.
Lawsuit Alleges Pharmacist Hacked Hundreds of Computers to Watch Women Undress
Tuesday, March 11, 2025
Secret Commands Found in Bluetooth Chip - Used in a Billion Devices
According to researchers at the cybersecurity firm Tarlogic, a hidden command has been found coded into a bluetooth chip installed in devices around the world. This secret functionality can be weaponized by bad actors and, according to the researchers, used as an exploit into these devices.
Using these commands, hackers could impersonate a trusted device and then connect to smartphones, computers, and other devices in order to access information stored on them. Bad actors can continue to utilize their connection to the device to essentially spy on users. more
Wednesday, February 19, 2025
Mom Hears a Stranger Talking to Child Through WiFi Baby Monitor
The OP asked their husband if there was anything in the room that talks or if the camera made noise when turning the audio on. The answers were no and no. “I go back upstairs, and as I’m opening the door to my son’s room I hear the same woman talking to my son through the camera,” the OP writes. “She said, ‘Hi baby! It’s OK!’
“Consumer Reports found that most of these models have pretty lax security and privacy and didn't earn a recommendation in our ratings,” explains Allen St. John, the content manager for baby monitors of Consumer Reports. more
An Extra Defense Against Keyless Car Theft
“The idea of measuring fluctuations in a car’s electrical system seems simple, but designing one device that can do it accurately on thousands of different vehicle models in varying environmental conditions gets quite complicated,” said Liang He , assistant professor of computer science and engineering at the University of Colorado, Denver and a researcher on the project. “We’re working to design a system that’s smart enough to measure the parameters of the vehicle it’s installed on and then customize itself to work effectively on that vehicle.” more
Monday, December 30, 2024
Check Before Opening Encrypted Microsoft Word Documents Emailed to You
Like so many other attack campaigns, Paper Werewolf uses phishing emails and brand impersonation to distribute its malicious payload. These messages contain an encrypted Microsoft Word document that prompts the recipient to enable macros in order to read it. If they do this, then the content of the document is decrypted, and the malicious program is installed on their device. The threat intelligence analysts said that, in some instances, they observed the use of PowerRAT, a remote access trojan, enabling the attackers to execute commands and carry out reconnaissance. more
Officials Deny Approving Sale of Israeli Spyware Firm to US Investors
Smart Home Cameras Spying
Which apps collect the most data?
Among the apps that collect the most data, Deep Sentinel and Lorex stand out for outdoor security cameras, each collecting 18 out of a possible 32 data points. Nest Labs, which leads the pack for indoor cameras, collects 17 data points, with Ring and Arlo each gathering 15. more