The Ministry of Defense (MoD) of Japan has confirmed that it is going to invest over 25.6 billion Yen or $237.12 million in USD to develop Artificial Intelligence-based tools to counter cyber attacks.
Japan aims to develop an all-inclusive AI system that can detect malevolent emails, respond to cyberattacks in an automated way through machine learning skills and eventually neutralize the effect of attacks on public and private sector targets.
The MoD is also planning to procure a Cyber Information Gathering System for $31.5 million resourceful to gather tactics, techniques, and procedures (TTP) or to adhere to Self-Defense Forces (SDF).
Highly placed sources say that the government of Japan woke up to a digital alert when a massive scale Cyber Attack was launched on Mitsubishi Electric by a hacking group from China.
Some media resources from Japan reported on an international note that some critical info about MoD and Nuclear Regulation Authority was accessed and stolen by hackers in the attack. Furthermore, digital documents related to private firms, railway operators and a car manufacturer visionary approach for the year 2022 were also reportedly accessed by the threat actors.
To prevent such attacks any further on public and private entities, Japan’s MoD has now initiated measures to thwart such attacks shortly. And as a plan to strategize a framework to defend the critical infrastructure from cyber attacks the company.
Microsoft has made it official that it is going to withdraw from an investment agreement that is made with an Israeli startup which was into the development of facial recognition software. Although the company never made its intention for disinvestment clear, a source from the tech giant says that the decision was taken after it learned that the startup’s product was being used by the government to conduct surveillance on the populace of West Bank- a region located near the border of Jordan.
The company in the discussion is AnyVision which is a company based in Tel Aviv and offering facial recognition software.
Highly placed sources say that the AnyVision facial recognition software was being used to monitor border crossings between West Bank and Israel. But it is still not clear whether the videos are a part of mass surveillance programs- similar to the espionage program being conducted in China.
As many people across the world are working from home these days to keep their office operations going, hackers are seeing these devices as vulnerable points to infiltrate corporate networks. So, here are some strategies that can make your work from home experience spectacularly cyber secure.
France based Essilor Group which is into the manufacturing of optical solutions and eye gear has made it official that it became a victim of a cyber attack on March 21st,2020. And highly placed sources say that the attack could be a ransomware variant as it has locked down several servers from access.
However, no official from Essilor has confirmed the news that it was a file-encrypting malware attack. But a source based on the condition of anonymity confirmed that it was a malware attack that was identified in time and contained.
The French Ophthalmic company said that it has immediately replaced new software and hardware firewalls in its server environment to prevent such incidents shortly.
Finally, some evidence is out that the hacking group behind the WHO Cyber Attack could be ‘Elite Hackers’ aka Dark Hotel. According to an article published in Reuters, the said group was behind the domain name registration of a fake site that impersonated the internal email system used by WHO and tried to lure the WHO employees in submitting their online credentials on March 13th this year.
Taking a tip-off from a Blackstone Law Group Cybersecurity expert named Alexander Urbelis, a reporter from Reuter is said to have published the article after verifying some facts thoroughly.
A team of security experts from Kaspersky have confirmed the news and said that the effort was to block the digital access of ‘WHO’ in the wake of Covid 19 pandemic- only to deepen the crisis response by blocking help.
Microsoft has issued an official warning that the recently discovered font vulnerability has no fix as of now and users need to wait till April 14th, 2020 i.e. the next patch Tuesday.
Going by the details, a group of security researchers has found that hackers are exploiting a vulnerability in Windows handling and rendering fonts. They confirm that the flaw might help them deliver malicious documents- spreading malware such as ransomware.
Currently, it’s still unclear how many systems are impacted by this flaw. But the OS offering giant has clarified that the susceptibility will hit Windows 10, Windows 8.1, Windows RT 8.1, Windows Server 2019, Win Server 2016 and 2012 R2 and 2008 along with Windows 7.
A security advisory posted on the website of the technology giant says that the vulnerability is similar to that of an unpatched version of Adobe Type Manager Library which is used to handle a specially crafted multi-master font.
Microsoft says that hackers can target a PC by asking the user to open a specially crafted document or view it in a Windows preview pane.
For those using the Win 7 operating system, the flaw is reported to be extremely ‘critical’ as the support for the operating system has been withdrawn from Jan 2020.
Those spreading ransomware are seen targeting companies and individuals only at nights and weekends says a study taken up by FireEye. The Cybersecurity firm confirms that 76% of ransomware infections take place at night time in the enterprise sector and 49% of them take place during the weekends.
FireEye researchers claim that the hackers are targeting companies only in odd hours is because most firms do not employ IT, staff, at night time or even if they do they do it in a thin line.
A recent study conducted by Unit 42, a threat intelligence platform of Palo Alto Networks has confirmed that the risk of a cyberattack on the Internet of Things (IoT) is too high than ever. And the study confirmed that all the 1.2 million IoT devices installed at more than 10,000 locations across enterprise IT and healthcare are vulnerable to cyber threats.
Gartner in its recent study estimated that by the end of the year 2019, 4.8 billion IoT endpoints were expected to be in use, across the world- an increase by 21.5% from the year 2018.
Unit 42 IoT Threat Report states that the devices which are working are super susceptible to cyber attacks as most of the device security posture is not meeting the standards leaving companies using them vulnerable to IoT targeted malware such as spyware.
A recent study carried out by Avast Threat Labs has discovered that 72% of Android devices operating across the world are prone to adware and this witnessed a drastic increase over last year as the infection percentage was recorded to be 34% than 13% the previous year.
Researchers from Avast have confirmed that mobile adware uses the CPU performance in a device in order to spam it with unwanted ads which not only drains the battery but also attracts all sorts of troubles like Ransomware, crypto mining and such.
It was found in the study made by Avast that the most common method used by hackers to infect a device with Adware was through a malicious app. Typically, the threat actors are seen disguising the apps in the form of gaming or entertainment apps which eventually land upon the device disrupting all its operational resources and turning them into zombies.
Online shopping has become an increasingly popular trend in the past few years as people find it more convenient to buy from the comfort of their homes. You can get pretty much anything and everything from online stores: groceries, clothing, jewelry, electronics and other household items. Yet, we need to consider for a moment if all these online financial transactions taking place are safe – and how can we ensure our protection from online frauds such as identity theft and phishing attacks.