Fake Microsoft Ad Campaign Causes Ransomware Attacks

The SC Magazine has a story about this phenomenon: ‘Big Head’ malware threat looms, warn researchers: “In a report posted Friday, Trend Micro said while there was no evidence as yet Big Head had been used successfully, its developers appeared to be experienced, although possibly not sophisticated, threat actors.” The way it is being spread … Read more

WAGO Controllers Vulnerable to Remote Command Execution

Several types of WAGO Controllers (I/O) have RCE vulnerabilities according to OneKey    got the info from CERT (Computer Emergency Response Team) Here is the list from CERT: Article No° Product Name Affected Version(s) 751-9301 Compact Controller CC100 FW20 <= FW22 751-9301 Compact Controller CC100 = FW23 752-8303/8000-002 Edge Controller = FW22 750-81xx/xxx-xxx PFC100 FW20 … Read more

AI Can Be Dangerous For Cyberdefense or Privacy

AI or Artificial Intelligence is the latest buzzword which means many things in the spectrum of computerized or automated instructions.  There is machine learning neural logic and more, but let’s ask a GPT (Generative Pre-Trained Transformer) or https://martech.zone/acronym/gpt/ I asked you.com (a GPT AI site about types of Artifical Intelligence) Answer: There are several ways … Read more

More Pig Butchering or “Sha Zhu Pan”

Cybernews.com has a story on another incidence of Pig Butchering… As some youtube personalities with Chinese knowledge mentioned pig butchering refers to raising a pig to be ultimately butchered.  So one plays the long game, where one befriends an opposite sex person with carefully cultivated stories. As the person slowly trusts the scam which initially … Read more