What CISOs Can Do About Brand Impersonation Scam Sites
Dark Reading 03.02.2023 23:04
Apply these nine tips to proactively fight fraudulent websites that use your brand to rip people off.
Das sollten Sie unbedingt lesen:
How the Cloud Is Shifting CISO Priorities
Dark Reading 03.02.2023 16:00
The greatly expanding attack surface created by the cloud needs to be protected.
Iranian OilRig Hackers Using New Backdoor to Exfiltrate Data from Govt. Organizations
The Hacker News 03.02.2023 13:12
The Iranian nation-state hacking group known as OilRig has continued to target government organizations in the Middle East as part of a cyber espionage campaign that leverages a new backdoor to exfiltrate data.
"The campaign abuses legitimate but compromised email accounts to send stolen data to external mail accounts controlled by the attackers," Trend Micro researchers Mohamed Fahmy, Sherif
Manipulating Weights in Face-Recognition AI Systems
Schneier on Security 03.02.2023 13:07
Interesting research: “Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons“:
Abstract: In this paper we describe how to plant novel types of backdoors in any facial recognition model based on the popular architecture of deep Siamese neural networks, by mathematically changing a small fraction of its weights (i.e., without using any additional training or optimization). These backdoors force the system to err only on specific persons which are preselected by the attacker. For example, we show how such a backdoored system can take any two images of a particular person and decide that they represent different persons (an anonymity attack), or take any two images of a particular pair of persons and decide that they represent the same person (a confusion attack), with almost no effect on the correctness of its decisions for other persons. Uniquely, we show that multiple backdoors can be independently installed by multiple attackers who may not be aware of each other’s existence with almost no interference…