Search This Blog

Powered by Blogger.

Blog Archive

Labels

Report: Spanish Authorities Discover CPF Nomination Note on iPad of Slain Singaporean Woman in Spain

 

Singaporean authorities, along with two banks and Hong Kong police, thwarted a scam targeting a 70-year-old victim, recovering over S$370,000. The Singapore Police Force (SPF) disclosed that DBS detected suspicious transactions amounting to about S$180,000, promptly blocking further transfers and alerting the Anti-Scam Centre (ASC) who then informed Hong Kong's Anti-Deception Coordination Centre (ADDC).

The investigation into the killing of a Singaporean woman in Spain has taken a curious turn with the discovery of a Central Provident Fund (CPF) nomination note on her iPad. The note indicated her intention to nominate an individual as a beneficiary due to their longstanding friendship and mentioned a loan of US$50,000, raising questions about the motive behind the crime.

CPF, a mandatory social security savings scheme, allows individuals to nominate beneficiaries to receive their savings in the event of death. The presence of the note, dated Mar 24, found on the victim's iPad, suggests premeditation. The woman, identified as Ms Audrey Fang, was found dead with multiple stab wounds in Spain, where a Singaporean man, Mitchell Ong, was arrested in connection with her murder.

Concerns have arisen regarding the possibility of Ong being nominated as the beneficiary of Ms Fang's CPF money. Her family is taking steps to verify this and investigate any financial transactions, including transfers from her bank account. Doubts have been raised about the authenticity of the note, particularly regarding currency discrepancies and language usage.

Details surrounding Ms Fang's last-minute trip to Spain and her interactions with Ong before her death have also come to light. Her family finds the circumstances of her trip unusual, especially considering her impending plans for another holiday. Ong's behaviour, including extending his hotel stay and making dubious claims to hotel staff, adds complexity to the investigation.

Ms Fang's family is seeking closure and clarity on her relationship with Ong, as prosecutors pursue a significant sentence if he is convicted.

Hackers are Targeting Routers Across the Globe

 

When hackers identify an unsecured router, they penetrate it by installing malware that provides them persistence, the ability to launch distributed denial of service (DDoS) assaults, hide malicious data, and more. But what happens when the hackers discover a router that has already been infiltrated by a rival gang? 

Trend Micro cybersecurity researchers published a report that discovered one of two things: either one party allows the other to use the compromised infrastructure for a charge, or they both find a separate technique to break into the device and use it simultaneously. 

The researchers used Ubiquity's EdgeRouters as an example of internet routers that were exploited concurrently by a number of hacker groups, some of which were state-sponsored and others were financially motivated. 

“Cybercriminals and Advanced Persistent Threat (APT) actors share a common interest in proxy anonymization layers and Virtual Private Network (VPN) nodes to hide traces of their presence and make detection of malicious activities more difficult,” the researchers stated. “This shared interest results in malicious internet traffic blending financial and espionage motives.” 

When it comes to Ubiquity, Trend Micro analysts reported that the APT28 criminal leveraged the endpoints for "persistent espionage campaigns." APT28 is a Russian state-sponsored outfit also known as Fancy Bear or Pawn Storm. At the same time, they discovered a financially motivated group known as the Canadian Pharmacy Gang, which used the same infrastructure to launch pharmaceutical-related phishing activities. Finally, they discovered the Ngioweb malware being loaded directly into the RAM of these devices, which was attributed to the Ramnit group.

The main reason EdgeRouters were so often targeted was that their victims either left them completely undefended or with only weak security. They don't stand out much from other routers, which are all equally desirable targets for hackers. Trend Micro found that this is due to the fact that they have less stringent password demands, are rarely updated, and operate on powerful operating systems that can be utilised for a variety of purposes.

NSW Cybercrime Squad Arrests Suspect in Million-Person Data Breach Case

 

In a significant development, the Cybercrime Squad in New South Wales (NSW) has made a crucial breakthrough in a case involving a mass data breach affecting approximately one million individuals. The arrest of a 46-year-old man from Fairfield West marks a pivotal moment in the investigation into this alarming cyber incident. The suspect was apprehended following a raid on a property in Fairfield West by Cybercrime Squad detectives, underscoring law enforcement's dedication to combating cyber threats and protecting individuals' privacy and security. 

The data breach, which has sent shockwaves across NSW, particularly among patrons of specific clubs, has raised serious concerns about the safety and integrity of personal information online. Individuals of "prominence" are among those affected by the breach, highlighting the far-reaching implications of such cyber incidents. The Cybercrime Squad, part of State Crime Command’s Serious Crime Directorate, has been at the forefront of the investigation, aiming to unravel the complexities surrounding the breach and identify any criminal activities associated with it. 

According to Detective Chief Superintendent Grant Taylor, the personal details compromised in the data breach were collected by certain NSW clubs as part of their membership or entry procedures. The breach has potentially exposed sensitive information, including portions of individuals' driver's license details or membership data. The Cybercrime Squad is diligently investigating the breach, delving into the circumstances surrounding its occurrence and pursuing those responsible for perpetrating this cybercrime. While the investigation is ongoing, it is crucial to acknowledge the broader implications of such data breaches and the risks they pose to individuals' privacy and security. 

The proliferation of cyber threats underscores the need for heightened vigilance and robust cybersecurity measures. With cybercriminals becoming increasingly sophisticated in their tactics, it is imperative for organizations and individuals alike to prioritize cybersecurity and adopt proactive strategies to safeguard sensitive information. The arrest made by the Cybercrime Squad serves as a stark reminder of the pervasive threat posed by cybercriminals and the importance of law enforcement agencies' proactive efforts in combatting cybercrime. 

The collaboration between law enforcement agencies and cybersecurity experts is essential in addressing the evolving landscape of cyber threats and ensuring the safety and security of individuals' digital identities. In response to the data breach, law enforcement authorities are working tirelessly to mitigate the impact on affected individuals and prevent further dissemination of compromised information. Efforts are underway to take down the website responsible for publishing the personal information and prevent unauthorized access to individuals' data. 

Additionally, law enforcement agencies are urging individuals to remain vigilant and exercise caution when sharing personal information online. The incident underscores the critical role of cybersecurity awareness and education in empowering individuals to protect themselves against cyber threats effectively. By staying informed about best practices for online security and adopting secure password practices, individuals can significantly reduce their risk of falling victim to cybercrime. 

As the investigation into the data breach continues, law enforcement agencies remain committed to holding accountable those responsible for compromising individuals' personal information. Through collaborative efforts and proactive cybersecurity measures, stakeholders can work together to strengthen defenses against cyber threats and safeguard the integrity of digital ecosystems.

CISA Ask Companies to Fix Path Traversal Vulnerabilities


CISA and FBI urge companies to take patch actions 

CISA and the FBI recommended software companies today to assess their products and fix route traversal security flaws before selling.

Attackers can leverage path traversal vulnerabilities (also known as directory traversal) to create or overwrite important files used to execute malware or circumvent security systems such as authentication. 

“Additionally, this Alert highlights the prevalence, and continued threat actor exploitation of, directory traversal defects. Currently, CISA has listed 55 directory traversal vulnerabilities in our Known Exploited Vulnerabilities (KEV) catalog,” says the CISA and FBI joint report.

Impact of these security loops

Such security holes can also allow threat actors to acquire sensitive data, such as credentials, which can then be used to brute-force existing accounts and compromise the targeted systems.

Another option is to disable or limit access to vulnerable systems by overwriting, destroying, or altering critical authentication files (which would lock out all users).

CISA and the FBI propose that software buyers ask vendors if they completed formal directory traversal testing. 

To eliminate this type of problem from all goods, manufacturers should ensure that their software developers immediately install the necessary mitigations. Integrating security into products from the start can eliminate directory traversal issues.

About directory traversal vulnerabilities

Directory traversal vulnerabilities occur when users manipulate inputs, such as file paths, to gain unauthorized access to application files and directories. Malicious cyber actors can use these exploits to access restricted directories and read, change, or write arbitrary files, which can have adverse effects.

How Can Software Vendors Avoid Directory Traversal Risks?

To minimize directory traversal vulnerabilities in software products, developers should apply proven mitigations such as:

  • Use random identification and store metadata independently (e.g., in a database) instead of relying on user input for a file name.
  • If the previous strategy is not followed, restrict file names to alphanumeric characters. Please ensure that submitted files do not have executable permissions.

Path vulnerabilities ranked eighth on MITRE's list of the 25 dangerous software issues, trailing only out-of-bounds write, cross-site scripting, SQL injection, use-after-free, OS command injection, and out-of-bounds read flaws.

In March, CISA and the FBI released another "Secure by Design" alert, advising executives of software manufacturing companies to develop mitigations to prevent SQL injection (SQLi) security risks.

SQLi vulnerabilities were listed third among MITRE's top 25 most hazardous software vulnerabilities between 2021 and 2022, trailing only out-of-bounds writes and cross-site scripting.

Insect Farmers Embrace AI to Drive Down Production Costs

 


The insect farming industry, previously thought of as an industry that was in desperate need of development, has rapidly gained popularity as a practical and sustainable solution to the severe worldwide challenges of food safety, environmental degradation, and aid shortages that are affecting the world today. Insect farming techniques that are both green and charge-powerful are becoming increasingly important as the demand for alternative protein resources increases. 

To respond, forward-thinking insect farmers are turning to artificial intelligence (AI) to optimize their operations and reduce expenses. Non-entity husbandry is a form of animal husbandry that involves the raising and keeping of insects, such as mealworms, justices, and black dogface canvases, to be used for human consumption or to prevent disease, create diseases, or perform unique tasks. 

Insect farming has several advantages over conventional farm animal farming, including a higher feed conversion rate, a reduction in greenhouse gas emissions, and a reduction in the amount of land and water required. As opposed to soybean-based animal feed, insect farming can help reduce greenhouse gas emissions. If larvae are fed natural food waste, insect-based feed has a lower carbon footprint. 

Full Circle Biotechnology optimises production and reduces costs using artificial intelligence. There is a company called Full Circle, which is located outside Bangkok, and that produces 20 million black soldier fly larvae to provide sustainable food for shrimp farms and pig farms. Fruit and vegetable wastes are provided by food and beverage manufacturers to the larvae, which are then combined with probiotic bacteria and mushrooms to create a sustainable food source for Thailand's shrimp and pig farms. 

The company is located in a small, enclosed facility just outside of Bangkok that produces animal feed for shrimp farms and pig farms in the country. To survive in this dark, warm, humid environment, the larvae feed on the wastes of fruit and vegetables sourced from food manufacturers before they are harvested in combination with probiotic bacteria and mushrooms, which can produce a probiotic effect. 

Using insect-based feeds is Collins' belief that they will be able to reduce deforestation in South America, which is associated with soybean-based feeds. Moreover, studies have shown that insect-based feeds have a much lower carbon footprint than soymeal, and Full Circle's feed is "100 times lower than that of soymeal." Additionally, Full Circle's feed has a much lower carbon footprint than soymeal. 

As an insect food, people are not only ensuring the environment is protected but also ensuring that they get the best nutrition. There is generally no doubt that insect-based feed does reduce the carbon footprint of the environment if the larvae are fed natural food waste, which is the only way to make sure that the larvae are fed organic matter. According to one report, soybean-based feed produces less carbon than soybean feed if the insects have been fed processed food sources. 

A Full Circle feed contains a substantial amount of protein, which is more than twice as much protein as a soy feed. Because of this, animal feed is more filling and nutritious than soy. Full Circle is a rural market supplier based in Thailand that supplies 49 farms across the country, employing 14 people at the moment. 

Despite this, the company faces a challenge - soybeans-based feed is significantly cheaper than insect-based feeds, so it is a challenge to provide both. It is for this reason that Full Circle is turning to artificial intelligence (AI) to optimize its production and decrease its costs to overcome this barrier. Full Circle is now turning to artificial intelligence in an attempt to recoup some of the price it pays for its feed by maximising production while reducing its cost. 

A machine learning algorithm is being developed to be able to examine and analyze all available past and current data on the evolution of insect farming to figure out and then continuously fine-tune the most efficient methods. There can be a wide range of variables to consider in this regard, ranging from the temperature to the amount of food used, the optimum space the larvae need, tracking thousands of flies quickly and accurately, and whether or not to introduce new strains of flies. 

To improve the quality of their products, Full Circle seeks to fine-tune their methods by training an AI system that analyses historical and current data on insect farming. Optimising temperatures, food supplies, the necessary space for larvae, or even introducing new strains or species of bacteria are all examples of how to accomplish this. 

AI is believed to be an invaluable tool for speeding up trial and error so that a better understanding of the production and harvesting processes of insects can be achieved. At the same time, in Lithuania, a software provider for insect farm management Cogastro is also working on a system based on artificial intelligence. 

Indeed, they are currently providing data analysis software to analyze data, but the AI upgrade will allow the system to adjust, adapt, and make changes autonomously within an insect farm if it learns from the data. Cogastro is poised to launch its AI commercially within the next three years, a move spearheaded by its founder and CEO, Mante Sidlauskaite. 

However, Sidlauskaite advises caution against the proliferation of companies claiming immediate access to AI systems, stressing the significance of time and experience in refining accurate AI models. The integration of AI into insect farming heralds a significant shift in the agricultural landscape, as emphasized by Sidlauskaite. By leveraging the capabilities of AI, insect farmers stand to benefit from reduced costs, enhanced efficiency, and expedited progress towards a more sustainable and resilient food production system. 

With the demand for alternative protein sources on the rise, AI-driven insect farming is positioned to play a pivotal role in shaping the future of agriculture. At Full Circle, collaboration with Singapore-based AI specialist Simon Christofides is underway to develop their AI system. Full Circle's spokesperson, Collins, acknowledges the relative novelty of black soldier fly larvae farming compared to traditional agricultural practices, indicating that there is much to learn. 

He expresses confidence in AI's ability to accelerate the learning curve by analyzing extensive data collected from various sensors. While AI optimization is deemed essential for production enhancement, Collins underscores the necessity of maintaining a hands-off approach in certain aspects of insect farming.

DropBox E-Signature Breach Exposes Customer Data

 


DropBox has announced a breach in its DropBox Sign eSignature platform, formerly known as HelloSign. The breach, uncovered on April 24, has left customer data vulnerable, including authentication tokens, MFA keys, hashed passwords, and personal information.

The breach was first detected on April 24, prompting DropBox to launch a thorough investigation into the matter. Through this investigation, it was revealed that threat actors had gained unauthorised access to a crucial configuration tool within the backend services of the DropBox Sign platform. This access granted them added privileges, allowing them to penetrate the customer database.

The compromised data encompasses a bulk of sensitive information, ranging from customer emails, usernames, and phone numbers to hashed passwords and account settings. Even individuals who had not registered accounts with DropBox Sign had their email addresses and names exposed, magnifying the scope of the breach.

Some Measures To Consider 

DropBox readily took action to restore the collateral damage. All user passwords were reset, and all sessions to DropBox Sign were logged out as a precautionary measure. Furthermore, the company imposed restrictions on the usage of API keys until they could be rotated by the respective customers. Additionally, users who employ Multi-Factor Authentication (MFA) are advised to delete and reconfigure their settings with new keys obtained from the official website.

No Access to Documents

DropBox has reassured its users that the threat actors did not manage to access any customer documents or agreements. Moreover, the breach did not extend to other DropBox services, offering a semblance of relief amidst the security concerns.

Precautions for Users

Users are urged to remain cautious against potential phishing attempts indulging the compromised data. Should users receive an email prompting a password reset, it is imperative to refrain from clicking any links within the email. Instead, users should reset their passwords directly through the DropBox Sign website to ensure their security.

This breach isn't DropBox's first encounter with security challenges. In 2022, the company disclosed a breach wherein threat actors stole 130 code repositories by infiltrating the company's GitHub accounts using stolen employee credentials.

DropBox is actively addressing the breach and has provided comprehensive guidance to affected users. While the breach surfaces the critical importance of robust cybersecurity measures, users can play their part by staying informed and adhering to the precautionary measures outlined by DropBox. By doing so, users can help mitigate the impact of the breach and safeguard their sensitive information in the face of emerging cyber threats.


Facial Recognition System Breach Sparks Privacy Concerns in Australia

A significant privacy breach has shaken up the club scene in Australia, as a facial recognition system deployed across multiple nightlife venues became the target of a cyberattack. Outabox, the Australian firm responsible for the technology, is facing intense scrutiny in the aftermath of the breach, sparking widespread concerns regarding personal data security in the era of advanced surveillance. Reports indicate that sensitive personal information, including facial images and biometric data, has been exposed, raising alarms among patrons and authorities. 

As regulators rush to assess the situation and ensure accountability, doubts arise about the effectiveness of existing safeguards against such breaches. Outabox has promised full cooperation with investigations but is under increasing pressure to address the breach's repercussions promptly and decisively. Initially introduced as a safety measure to monitor visitors' temperatures during the COVID-19 pandemic, Outabox's facial recognition kiosks evolved to include identifying individuals in self-exclusion programs for gambling, showcasing the company's innovative use of technology. 

However, recent developments have revealed a troubling scenario with the emergence of a website called "Have I Been Outaboxed." Claiming to be created by former Outabox employees based in the Philippines, the site alleges mishandling of over a million records, including facial biometrics, driver's licenses, and various personal identifiers. This revelation highlights serious concerns regarding Outabox's security and privacy practices, emphasizing the need for robust data protection measures and transparent communication with both employees and the public. 

Allegations on the "Have I Been Outaboxed" website suggest that the leaked data includes a trove of personal information such as facial recognition biometrics, driver's licenses, club memberships, addresses, and more. The severity of this breach is underscored by claims that extensive membership data from IGT, a major supplier of gaming machines, was also compromised, although IGT representatives have denied this assertion. 

This breach has triggered a robust reaction from privacy advocates and regulators, who are deeply concerned about the significant implications of exposing such extensive personal data. Beyond the immediate impact on affected individuals, the incident serves as a stark reminder of the ethical considerations surrounding the deployment of surveillance technologies. It underscores the delicate balance between security imperatives and the protection of individual privacy rights.

French Hospital CHC-SV Refuses to Pay LockBit Ransomware Demand

 

The Hôpital de Cannes - Simone Veil (CHC-SV) in France revealed that it has received a ransom demand from the Lockbit 3.0 ransomware gang and refused to pay the ransom. 

On April 17, the 840-bed hospital announced a serious operational disruption caused by a cyberattack, forcing it to shut down all computers and reschedule non-emergency procedures and appointments. 

Earlier this week, the establishment revealed on X that it had received a ransom demand from the Lockbit 3.0 ransomware operation, which it referred to the Gendarmerie and the National Agency for Information Systems Security (ANSSI). 

At the same time, the LockBit ransomware organisation added CHC-SV to their darkweb extortion site, warning to release the first sample pack of files stolen during the attack before the end of the day. The healthcare organisation tweeted that they will not pay the ransom and will notify affected individuals if the threat actors begin leaking data. 

“In the event of a data release potentially belonging to the hospital, we will communicate to our patients and stakeholders, after a detailed review of the files that may have been exfiltrated, about the nature of the stolen information.” 

Meanwhile, the hospital's IT workers are currently working to restore compromised systems to normal operational status, as internal inquiries into the incident continue. 

Ruthless stance 

 
The FBI's disruption of the LockBit ransomware-as-a-service operation through 'Operation Cronos' and the simultaneous release of a decryptor in mid-February 2024 have had a negative impact on the threat group. 

Affiliates have lost faith in the project, and others have chosen to remain anonymous for fear of being identified and prosecuted. Despite the inconvenience, the ransomware operation relaunched a week later, with fresh data leak sites and updated encryptors and ransom demands. 

LockBit's attitude regarding assaults on healthcare providers has always been ambiguous at best, with the group's leaders failing to enforce the declared restrictions on affiliates carrying out attacks that compromised patient care. The attack on CHC-SV confirms the threat group's utter disdain for the sensitive topic of preventing disruptions to healthcare services. 

Sweden Faces Influx of DDoS Attacks Following NATO Membership

 


A significant uptick in distributed denial of service (DDoS) attacks has plagued Sweden as the nation navigates its path towards joining NATO, reports network performance management provider Netscout.

The onslaught commenced notably in May 2023, following a colossal 500 Gbps attack targeting Swedish government infrastructure. Subsequent to this initial strike, the frequency and intensity of DDoS assaults against Swedish entities have steadily escalated, reaching a peak in late 2023 with attacks soaring to 730 Gbps.

However, the year 2024 witnessed a further exacerbation of the situation, particularly intensifying from February onwards. On February 14, Sweden’s Foreign Minister hinted at Hungary's support for their NATO bid, serving as a catalyst for a significant event. 

Netscout documented an astounding 1524 simultaneous DDoS attacks targeting Swedish organizations the subsequent day. This surge indicated a marked escalation in tensions and retaliatory actions from various politically motivated hacker groups, as underscored in Netscout's public statement.

The climax of the attacks occurred on March 4, 2024, when Netscout observed an unprecedented 2275 attacks in a single day, marking a staggering 183% increase compared to the same date in the previous year. Remarkably, this surge transpired merely three days before Sweden's formal admission into NATO.

Netscout's analysis has identified several hacker groups involved in these assaults, including NoName057, Anonymous Sudan, Russian Cyber Army Team, and Killnet, all of which are aligned with Russian interests.

Strengthening Password Security: Addressing Misconceptions and Best Practices

 

According to recent research by the Institution of Engineering and Technology (IET), conducted to mark World Password Day, only one in five people in the UK can correctly identify a secure password over a risky one. This alarming statistic underscores the widespread lack of awareness and understanding when it comes to password security among the public. 

The study revealed that despite expressing concern about the possibility of being hacked in the future, a significant portion of the population continues to engage in risky password practices. For example, 20% of respondents admitted to using the same password for multiple websites and devices, a practice strongly discouraged by cybersecurity experts. 

Additionally, many individuals rely on easily guessable passwords, such as pet names or significant dates, further compromising their online security. Despite the prevailing fear of cyber threats, there exists a notable discrepancy between public perception and best practices in password security. While 84% of respondents believe that hackers are becoming more inventive, many still hold misconceptions about what constitutes a secure password. 

For instance, a significant portion of the population mistakenly believes that replacing letters with numbers in passwords enhances security, when in reality, this practice does little to deter sophisticated cyberattacks. Dr. Junade Ali, a cybersecurity expert and IET fellow, highlighted the critical importance of strong passwords in today's digital landscape. Weak and predictable passwords serve as easy targets for cybercriminals, who employ various tactics, including credential stuffing, to gain unauthorized access to multiple accounts. Credential stuffing exploits the common practice of using the same password across multiple platforms, allowing hackers to compromise multiple accounts with minimal effort. 

To address these vulnerabilities, the IET has issued recommendations aimed at improving password security awareness and practices. Among these recommendations is the suggestion to create randomly generated, long, and unique passwords for each website or online service. Longer passwords are generally more resistant to brute-force attacks and provide an added layer of security against unauthorized access.  

Additionally, the use of a reputable password manager is encouraged to securely store and manage passwords across various platforms. Password managers not only simplify the process of generating and storing complex passwords but also provide alerts in the event of a data breach, allowing users to take immediate action to protect their accounts. 

By following these guidelines and adopting strong password security practices, individuals can significantly enhance their defenses against cyber threats and safeguard their sensitive information online. As cyberattacks continue to evolve in sophistication, proactive measures to strengthen password security are essential in mitigating the risk of unauthorized access and data breaches.

Google’s Med-Gemini: Advancing AI in Healthcare

Google’s Med-Gemini: Advancing AI in Healthcare

On Tuesday, Google unveiled a new line of artificial intelligence (AI) models geared toward the medical industry. Although the tech giant has issued a pre-print version of its research paper that illustrates the capabilities and methodology of these AI models, dubbed Med-Gemini, they are not accessible for public usage. 

According to the business, in benchmark testing, the AI models outperform the GPT-4 models. This specific AI model's long-context capabilities, which enable it to process and analyze research papers and health records, are one of its standout qualities.

Benchmark Performance

The paper is available online at arXiv, an open-access repository for academic research, and is presently in the pre-print stage. In a post on X (formerly known as Twitter), Jeff Dean, Chief Scientist at Google DeepMind and Google Research, expressed his excitement about the potential of these models to improve patient and physician understanding of medical issues. I believe that one of the most significant application areas for AI will be in the healthcare industry.”

The AI model has been fine-tuned to boost performance when processing long-context data. A higher quality long-context processing would allow the chatbot to offer more precise and pinpointed answers even when the inquiries are not perfectly posed or when processing a large document of medical records.

Multimodal Abilities

Text, Image, and Video Outputs

Med-Gemini isn’t limited to text-based responses. It seamlessly integrates with medical images and videos, making it a versatile tool for clinicians.

Imagine a radiologist querying Med-Gemini about an X-ray image. The model can provide not only textual information but also highlight relevant areas in the image.

Long-Context Processing

Med-Gemini’s forte lies in handling lengthy health records and research papers. It doesn’t shy away from complex queries or voluminous data.

Clinicians can now extract precise answers from extensive patient histories, aiding diagnosis and treatment decisions.

Integration with Web Search

Factually Accurate Results

Med-Gemini builds upon the foundation of Gemini 1.0 and Gemini 1.5 LLM. These models are fine-tuned for medical contexts.

Google’s self-training approach has improved web search results. Med-Gemini delivers nuanced answers, fact-checking information against reliable sources.

Clinical Reasoning

Imagine a physician researching a rare disease. Med-Gemini not only retrieves relevant papers but also synthesizes insights.

It’s like having an AI colleague who reads thousands of articles in seconds and distills the essential knowledge.

The Promise of Med-Gemini

Patient-Centric Care

Med-Gemini empowers healthcare providers to offer better care. It aids in diagnosis, treatment planning, and patient education.

Patients benefit from accurate information, demystifying medical jargon and fostering informed discussions.

Ethical Considerations

As with any AI, ethical use is crucial. Med-Gemini must respect patient privacy, avoid biases, and prioritize evidence-based medicine.

Google’s commitment to transparency and fairness will be critical in its adoption.

AI vs Human Intelligence: Who Is Leading The Pack?

 




Artificial intelligence (AI) has surged into nearly every facet of our lives, from diagnosing diseases to deciphering ancient texts. Yet, for all its prowess, AI still falls short when compared to the complexity of the human mind. Scientists are intrigued by the mystery of why humans excel over machines in various tasks, despite AI's rapid advancements.

Bridging The Gap

Xaq Pitkow, an associate professor at Carnegie Mellon University, highlights the disparity between artificial intelligence (AI) and human intellect. While AI thrives in predictive tasks driven by data analysis, the human brain outshines it in reasoning, creativity, and abstract thinking. Unlike AI's reliance on prediction algorithms, the human mind boasts adaptability across diverse problem-solving scenarios, drawing upon intricate neurological structures for memory, values, and sensory perception. Additionally, recent advancements in natural language processing and machine learning algorithms have empowered AI chatbots to emulate human-like interaction. These chatbots exhibit fluency, contextual understanding, and even personality traits, blurring the lines between man and machine, and creating the illusion of conversing with a real person.

Testing the Limits

In an effort to discern the boundaries of human intelligence, a new BBC series, "AI v the Mind," will pit AI tools against human experts in various cognitive tasks. From crafting jokes to mulling over moral quandaries, the series aims to showcase both the capabilities and limitations of AI in comparison to human intellect.

Human Input: A Crucial Component

While AI holds tremendous promise, it remains reliant on human guidance and oversight, particularly in ambiguous situations. Human intuition, creativity, and diverse experiences contribute invaluable insights that AI cannot replicate. While AI aids in processing data and identifying patterns, it lacks the depth of human intuition essential for nuanced decision-making.

The Future Nexus of AI and Human Intelligence

As we move forward, AI is poised to advance further, enhancing its ability to tackle an array of tasks. However, roles requiring human relationships, emotional intelligence, and complex decision-making— such as physicians, teachers, and business leaders— will continue to rely on human intellect. AI will augment human capabilities, improving productivity and efficiency across various fields.

Balancing Potential with Responsibility

Sam Altman, CEO of OpenAI, emphasises viewing AI as a tool to propel human intelligence rather than supplant it entirely. While AI may outperform humans in certain tasks, it cannot replicate the breadth of human creativity, social understanding, and general intelligence. Striking a balance between AI's potential and human ingenuity ensures a symbiotic relationship, attempting to turn over new possibilities while preserving the essence of human intellect.

In conclusion, as AI continues its rapid evolution, it accentuates the enduring importance of human intelligence. While AI powers efficiency and problem-solving in many domains, it cannot replicate the nuanced dimensions of human cognition. By embracing AI as a complement to human intellect, we can harness its full potential while preserving the extensive qualities that define human intelligence.




AI Takes the Controller: Revolutionizing Computer Games

 


The computer games industry has been a part of Andrew Maximov's life for 12 years and despite all of this experience, he still marvels at how much money it costs to build some of the biggest games of all time. According to him, artificial intelligence (AI) will be crucial to reducing the soaring cost of video game production and saving video game designers precious time by automating repetitive tasks. 

In addition to providing developers with a set of tools to construct their virtual worlds, Promethean AI offers developers an array of tools. To disrupt the way games are produced today, Mr Maximov hopes to make a tremendous impact. Likely, humans will still play a crucial role in the production process. In the future, artificial intelligence will allow humans to be more creative. 

Californian software company Inworld is also using artificial intelligence to create computer games. This company has developed a game engine that is designed to enhance the realism and emotional depth of game worlds and characters by using the engine. Additionally, the firm is developing a narrative graph that it has partnered with Microsoft, which will make it easier for storytellers to build their characters, which will utilize artificial intelligence. 

In an interview with the BBC, chief executive Kylan Gibbs stated his belief that artificial intelligence would allow developers to dream bigger than they ever had in the past. "In this engine, developers can use artificial intelligence agents that are capable of seeing, sensing, and understanding the world around them, as well as interacting with players and taking actions within the game. It opens up a whole new paradigm for storytelling and gameplay when users can infuse virtual characters with advanced cognitive abilities," he explains. 

 The chief executive of Latitude.io is Nick Walton, who believes artificial intelligence has the potential to personalize the gaming experience in several ways. During his time as CEO of his firm, he said that he was surprised by the huge success of AI Dungeon, a game that allowed players to create their own stories in a variety of worlds. He was pleasantly surprised by how successful the first version of Dungeon was.

Privacy Breach Rocks Australian Nightlife as Facial Recognition System Compromised

 

A significant privacy breach has shaken up the club scene in Australia, as a facial recognition system deployed across multiple nightlife venues became the target of a cyberattack. Outabox, the Australian firm responsible for the technology, is facing intense scrutiny in the aftermath of the breach, sparking widespread concerns regarding personal data security in the era of advanced surveillance. 

Reports indicate that sensitive personal information, including facial images and biometric data, has been exposed, raising alarms among patrons and authorities. As regulators rush to assess the situation and ensure accountability, doubts arise about the effectiveness of existing safeguards against such breaches. 

Outabox has promised full cooperation with investigations but is under increasing pressure to address the breach's repercussions promptly and decisively. Initially introduced as a safety measure to monitor visitors' temperatures during the COVID-19 pandemic, Outabox's facial recognition kiosks evolved to include identifying individuals in self-exclusion programs for gambling, showcasing the company's innovative use of technology. 

However, recent developments have revealed a troubling scenario with the emergence of a website called "Have I Been Outaboxed." Claiming to be created by former Outabox employees based in the Philippines, the site alleges mishandling of over a million records, including facial biometrics, driver's licenses, and various personal identifiers. 

This revelation highlights serious concerns regarding Outabox's security and privacy practices, emphasizing the need for robust data protection measures and transparent communication with both employees and the public. Allegations on the "Have I Been Outaboxed" website suggest that the leaked data includes a trove of personal information such as facial recognition biometrics, driver's licenses, club memberships, addresses, and more. 

The severity of this breach is underscored by claims that extensive membership data from IGT, a major supplier of gaming machines, was also compromised, although IGT representatives have denied this assertion. This breach has triggered a robust reaction from privacy advocates and regulators, who are deeply concerned about the significant implications of exposing such extensive personal data. 

Beyond the immediate impact on affected individuals, the incident serves as a stark reminder of the ethical considerations surrounding the deployment of surveillance technologies. It underscores the delicate balance between security imperatives and the protection of individual privacy rights.

Industrial Cyberattackers Reverting to USB Tactics, Says Honeywell Report

 

In a surprising turn of events, the use of removable media, particularly USB devices, has resurged as a favoured tactic among industrial cyber attackers. Honeywell's recently released "2024 USB Threat Report" sheds light on this concerning trend, emphasizing its prevalence within Operational Technology (OT) networks. 

The report reveals a clear shift in the strategies employed by threat actors, who are now bypassing sophisticated exploitation techniques and zero-day vulnerabilities in favour of leveraging old tools and bugs. Rather than relying on novel malware, attackers are exploiting the inherent capabilities of OT control systems to gain a foothold in industrial networks. 

This resurgence of USB-based attacks underscores the critical importance of robust cybersecurity measures within industrial environments. With threat actors exploiting vulnerabilities that may have been overlooked or underestimated, organizations must remain vigilant and implement comprehensive defense strategies to safeguard their OT infrastructure. 

Let's Understand Why USBs?

USBs possess a unique advantage that sets them apart from even the most cutting-edge attack methods: the ability to breach air gaps. In high-risk industries like nuclear, military, and finance, air gaps act as physical barriers between Operational Technology (OT) and Information Technology (IT) networks, ensuring no malicious activity can cross over. 

Matt Wiseman, director of OT product marketing at OPSWAT, elaborates, "Many operational facilities maintain strict air gaps. Traditional network-based attacks, such as those via email, are ineffective when OT systems are isolated from the internet. To breach such defenses, you need unconventional tactics. USBs and removable media are particularly intriguing because they're the only threat that can be carried across the air gap in your pocket." 

Additionally, in a recent report released by Mandiant, alarming details have emerged regarding two separate USB-delivered malware campaigns observed in the current year. The first campaign, dubbed 'Sogu,' has been attributed to the Chinese espionage threat group 'TEMP.HEX.' 

Meanwhile, the second campaign, named 'Snowydrive,' has been linked to UNC4698 and specifically targets oil and gas firms in Asia. Notably, Mandiant's report also references a prior incident in November 2022, where a China-nexus campaign utilized USB devices to infect entities in the Philippines with four distinct malware families. This earlier discovery serves as a precedent, highlighting the recurrence of similar tactics by cyber threat groups with geopolitical motivations.

Cyber Criminal Sentenced for Targeting Therapy Patients


In a recent legal case that has shaken Finland, cyber offender Julius Kivimäki, known online as Zeekill, has been sentenced to six years and three months behind bars for his involvement in a sophisticated cybercrime operation. The case revolves around the breach of Vastaamo, Finland's largest psychotherapy provider, where Kivimäki gained unauthorised access to sensitive patient records.

The Extent of the Breach

Kivimäki's method involved infiltrating Vastaamo's databases, compromising the privacy of thousands of therapy patients. Despite his unsuccessful attempt to extort a large sum of money from the company, he resorted to directly threatening patients with exposure to their therapy sessions unless they paid up. The repercussions of his actions were severe, with at least one suicide linked to the breach, leaving the nation in shock.

Legal Proceedings and Conviction

Throughout the trial, Kivimäki insisted on his innocence, even going as far as evading authorities and fleeing. However, the court found him guilty on all counts, emphasizing his ruthless exploitation of vulnerable individuals. The judges emphasized the significant suffering inflicted upon the victims, given Vastaamo's role as a mental health service provider.

A History of Cybercrime

Kivimäki's criminal journey began at a young age, participating in various cyber gangs notorious for causing chaos between 2009-2015. Despite being apprehended at the age of 15 and receiving a juvenile sentence, he persisted in his illicit activities, culminating in the Vastaamo breach.

How Law Enforcement Cracked the Case?

Law enforcement's efforts, combined with advanced digital forensics and cryptocurrency tracking, played a pivotal role in securing Kivimäki's conviction. His misstep led authorities to a server containing a wealth of incriminating evidence, aiding in his arrest and subsequent sentencing.

The Human Toll of Cyber Intrusion

Tiina Parikka, one of the affected patients, described the profound impact of receiving Kivimäki's threatening email, leading to a deterioration in her mental health. The breach not only compromised patients' privacy but also eroded their trust in the healthcare system.

Corporate Accountability

While Kivimäki faced legal consequences, Vastaamo's CEO, Ville Tapio, also received a suspended prison sentence for failing to protect customer data adequately. The once esteemed company suffered irreparable damage, ultimately collapsing in the aftermath of the breach.

Moving Forward 

As legal proceedings conclude, civil court cases are expected as victims seek compensation for the breach. The incident has stressed upon the vulnerability of healthcare data and the pressing need for robust cybersecurity implementation to safeguard the information of such sensitivity. After all, maintaining confidentiality is the first step towards establishing a healthy environment for patients.  

The Vastaamo case serves as a telling marker of the devastating consequences of cybercrime on individuals and businesses. In an age of advancing technology, it is essential for authorities and organisations to remain armed in combating such threats to ensure the protection of privacy and security for all.


Hackers Claim Biggest Attack On UAE in History

Hackers Claim Biggest Attack On UAE in History

The United Arab Emirates government was the target of a significant data breach attack that has the cybersecurity industry on edge. The attacker, who goes by the username "UAE," has not been recognized. Unless a ransom of 150 bitcoins (about USD 9 million) is paid, the threat actor threatened to disclose the data from the purported UAE hack in a post on BreachForums.

Major UAE government organizations including the Executive Council of Dubai, the Federal Authority for Nuclear Regulation, the Telecommunications and Digital Government Regulatory Authority, and important government programs like Sharik.ae and WorkinUAE.ae are among the victims of the purported attack. The UAE Space Agency, Ministry of Finance, and Ministry of Health and Prevention are among the other ministries impacted.

The threat actor released a few samples, claiming to have access to personally identifiable information (PII) belonging to different government personnel. These samples included the roles, genders, and email addresses of high-ranking individuals.

Hackers exposed samples from the UAE attack

The threat actor purportedly posted screenshots of internal data from multiple prominent government agencies in the United Arab Emirates. The threat actor displayed samples of personally identifiable information (PII) including names, roles, and contact data, claiming to have obtained access to PII of high-ranking government personnel.

The threat actor's purported possession of samples raises questions about the safety of government employees and the integrity of national activities. The hacker's sudden appearance complicates the situation and raises questions about the accuracy of the statements made, but it may also point to a high-risk situation.

Such a compromise might have serious repercussions for public safety, national security, and the UAE's economic stability. The world's cybersecurity community is keeping a careful eye on the events and highlighting the necessity of a prompt and forceful government probe to determine the full scope of the hack and minimize any possible harm.

Experts advise to be cautious with UAE attacks

The hacker's sudden rise to prominence and lack of past experience or evidence of similar actions raises questions about the veracity of the claims.

There hasn't been any independent confirmation of the breach, nor have the UAE government or the impacted agencies addressed these allegations as of yet. For further details on the attacks, the Cyber Express team has gotten in touch with the Telecommunications and Digital Government Regulatory Authority (TDRA) in Dubai.

The vast number of impacted organizations and the type of purportedly stolen data point to a very sophisticated and well-planned operation, which is inconsistent with the image of a lone, inexperienced hacker.

Apple Working to Patch Alarming iPhone Issue

 

Apple claims to be working rapidly to resolve an issue that resulted in some iPhone alarms not setting off, allowing its sleeping users to have an unexpected lie-in. 

Many people rely on their phones as alarm clocks, and some oversleepers took to social media to gripe. A Tiktokker expressed dissatisfaction at setting "like five alarms" that failed to go off. 

Apple has stated that it is aware of the issue at hand, but has yet to explain what it believes is causing it or how users may avoid a late start. 

It's also unknown how many people are affected or if the issue is limited to specific iPhone models. The news was first made public by the early risers on NBC's Today Show, which sparked concerns. 

In the absence of an official solution, those who are losing sleep over the issue can try a few simple fixes. One is to prevent human error; therefore, double-check the phone's alarm settings and make sure the volume is turned up. 

Others pointed the finger at Apple designers, claiming that a flaw in the iPhones' "attention aware features" could be to blame.

When enabled, they allow an iPhone to detect whether a user is paying attention to their device and, if so, to automatically take action, such as lowering the volume of alerts, including alarms. 

According to Apple, they are compatible with the iPhone X and later, as well as the iPad Pro 11-inch and iPad Pro 12.9-inch. Some TikTok users speculated that if a slumbering user's face was oriented towards the screen of a bedside iPhone, depending on the phone's settings, the functionalities may be activated. 

Apple said it intends to resolve the issue quickly. But, until then, its time zone-spanning consumer base may need to dust off some old gear and replace TikTok with the more traditional - but trustworthy - tick-tock of an alarm clock.

No MFA, No Defense: Change Healthcare Falls Victim to Citrix Account Hijacking

 


A UnitedHealth spokesperson confirmed that the black cat ransomware gang had breached Change Healthcare's network, using stolen credentials to get into the company's Citrix remote access service, which was not set up to support multi-factor authentication. It was revealed in a written statement issued by UnitedHealth's CEO Andrew Witty ahead of the hearing scheduled for tomorrow by a House Energy and Commerce subcommittee. 

This incident illustrates the significance of the healthcare giant failing to protect a critical system by failing to turn on multi-factor authentication, a consequential mistake the healthcare giant made in failing to identify the source of the intrusion into Change Healthcare's system that UnitedHealth Group previously confirmed on March 13. It is clear, according to Tom Kellerman, SVP of Cyber Strategy at Contrast Security, that UnitedHealth has shown pure negligence in this incident. 

According to the report, cybersecurity negligence resulted in systemic breaches throughout the U.S. healthcare industry. In his opinion, MFA would have likely prevented the attack chain that led to the breach, which will have long-term consequences. According to Casey Ellis, founder and chief strategy officer at Bugcrowd, the long-term effects of this massive breach will last for years. According to Ellis, at first glance, it appears that the software itself wasn't the issue that was causing the original access problem.

There was a threat of unauthorized access through remote access software without multi-factor authentication, and the credentials could have been leaked or guessed, leading to the most disruptive cyberattack on critical infrastructure in U.S. history. As a result of UnitedHealth Group's discovery and disclosure of the attack on Feb. 21, the medical claims and payment processing platform of Change Healthcare was paralyzed for more than one month, causing it to cease working completely. 

It was in late February 2024 that Optum's Change Healthcare platform was severely disrupted by a ransomware attack, resulting in a severe disruption of Optum's Change Healthcare platform. In addition to affecting a wide range of critical services used by healthcare providers all over the country, this also caused financial damages of approximately $872 million as a result of the disruption. These services included payment processing, prescription writing, and insurance claims processing. 

An exit scam was used by the BlackCat ransomware gang to steal money from UnitedHealth, which was allegedly a $22 million ransom payment made by UnitedHealth's affiliate. The affiliate claimed to still have the data shortly thereafter and partnered with RansomHub to begin an additional extortion demand by leaking stolen information in an attempt to extort the company of the affiliate. Despite recently acknowledging that it paid a ransom for people's data protection following a data breach, the healthcare organization has not released any details of the attack or who carried it. 

The company has confirmed that it paid a ransom to the hackers who claimed responsibility for a cyberattack and the subsequent theft of terabytes of data due to this cyberattack, which occurred last week. As part of their ransom demand, the hackers, known as RansomHub, threatened to post part of the stolen data to the dark web, if they did not sell the information. This is the second gang to claim theft and threaten to make money from it. 

A company that makes close to $100 billion in revenue every year, UnitedHealth said earlier this month that the company has suffered a $800 million loss due to the ransomware attack, which took place in the first quarter of 2017

Safeguarding Your Employee Data From Identity Theft

 

In today's digital age, where data breaches and cyberattacks are increasingly common, safeguarding against identity-based attacks has become paramount for organizations worldwide. Identity-based attacks, which involve the unauthorized access to sensitive information through compromised user credentials, pose significant risks to businesses of all sizes and industries. 

As CrowdStrike reported, 80% of attacks involve identity and compromised credentials, highlighting the widespread nature of this threat. Additionally, an IBM report found that identity-related attacks are now the top vector impacting global cybercrime, with a staggering 71% yearly increase. 

Cybercriminals employ various tactics to carry out identity-based attacks, targeting organizations through phishing campaigns, credential stuffing, password spraying, pass-the-hash techniques, man-in-the-middle (MitM) attacks, and more. Phishing campaigns, for example, involve the mass distribution of deceptive emails designed to trick recipients into divulging their login credentials or other sensitive information. Spear-phishing campaigns, on the other hand, are highly targeted attacks that leverage personal information to tailor phishing messages to specific individuals, increasing their likelihood of success.  

Credential stuffing attacks exploit the widespread practice of password reuse, where individuals use the same passwords across multiple accounts. Cybercriminals obtain credentials from previous data breaches or password dump sites and use automated tools to test these credentials across various websites, exploiting the vulnerabilities of users who reuse passwords. Password spraying attacks capitalize on human behavior by targeting commonly used passwords that match the complexity policies of targeted domains. 

Instead of trying multiple passwords for one user, attackers use the same common password across many different accounts, making it more difficult for organizations to detect and mitigate these attacks. Pass-the-hash techniques involve obtaining hashed versions of user passwords from compromised systems and using them to authenticate into other systems without needing to crack the actual password. This method allows attackers to move laterally within a network, accessing sensitive data and executing further attacks. MitM attacks occur when attackers intercept network connections, often by setting up malicious Wi-Fi access points. 

By doing so, attackers can monitor users' inputs, including login credentials, and steal sensitive information to gain unauthorized access to accounts and networks. To mitigate the risk of identity-based attacks, organizations must adopt a multi-layered approach to security. This includes implementing strong password policies to prevent the use of weak or easily guessable passwords and regularly auditing user accounts for vulnerabilities. 

Multi-factor authentication (MFA) should be implemented across all applications to add an extra layer of security by requiring users to provide a second form of authentication, such as a one-time password or biometric data, in addition to their passwords. Furthermore, organizations should protect against social engineering attacks, which often target service desk staff to gain unauthorized access to sensitive information. Automated solutions can help verify user identification and reduce the risk of social engineering vulnerabilities. 

 Identity-based attacks pose significant risks to organizations, but by implementing robust security measures and remaining vigilant against evolving threats, businesses can effectively mitigate these risks and safeguard their sensitive information from cybercriminals.