Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment Re:Couple of possibilities (Score 5, Informative) 70

Lithium may be an essential micronutrient, needed in minute dose for vitamin b12 and folate transport and uptake https://www.jpands.org/vol20no....

I just skipped to the exciting bit at the end:

Timothy M. Marshall, Ph.D., is a holistic neurospecialist/pharmacologist
and professor of chemistry and pharmacology in Tucson, Ariz. Contact:
tmarshall73@gmail.com.
Disclosure: Dr. Marshall willl be marketing products containing lithium as a
nutritional supplement.

Submission + - CrowdStrike Investigated 320 North Korean IT Worker Cases In the Past Year (cyberscoop.com)

An anonymous reader writes: North Korean operatives seeking and gaining technical jobs with foreign companies kept CrowdStrike busy, accounting for almost one incident response case or investigation per day in the past year, the company said in its annual threat hunting report released Monday. “We saw a 220% year-over-year increase in the last 12 months of Famous Chollima activity,” Adam Meyers, senior vice president of counter adversary operations, said during a media briefing about the report. “We see them almost every day now,” he said, referring to the North Korean state-sponsored group of North Korean technical specialists that has crept into the workforce of Fortune 500 companies and small-to-midsized organizations across the globe.

CrowdStrike’s threat-hunting team investigated more than 320 incidents involving North Korean operatives gaining remote employment as IT workers during the one-year period ending June 30. CrowdStrike researchers found that Famous Chollima fueled that pace of activity with an assist from generative artificial intelligence tools that helped North Korean operatives maneuver workflows and evade detection during the hiring process. “They use generative AI across all stages of their operation,” Meyers said. The insider threat group used generative AI to draft resumes, create false identities, build tools for job research, mask their identity during video interviews and answer questions or complete technical coding assignments, the report found. CrowdStrike said North Korean tech workers also used generative AI on the job to help with daily tasks and manage various communications across multiple jobs — sometimes three to four — they worked simultaneously.

Threat hunters observed other significant shifts in malicious activity during the past year, including a 27% year-over-year increase in hands-on-keyboard intrusions — 81% of which involved no malware. Cybercrime accounted for 73% of all interactive intrusions during the one-year period. CrowdStrike continues to find and add more threat groups and clusters of activity to its matrix of cybercriminals, nation-state attackers and hacktivists. The company identified 14 new threat groups or individuals in the past six months, Meyers said. “We’re up to over 265 named adversary groups that we track, and then 150 what we call malicious activity clusters,” otherwise unnamed threat groups or individuals under development, Meyers said.

Submission + - Terrifying new Plague backdoor quietly infects Linux systems with undetectable s (nerds.xyz) 2

BrianFagioli writes: Thereâ(TM)s a sneaky new threat targeting Linux systems and itâ(TM)s called Plague. Itâ(TM)s not just another piece of malware. This thing is designed to live inside your authentication system and give hackers the keys to your server, all while staying hidden from antivirus tools.

Plague operates as a malicious PAM module. If you donâ(TM)t already know, PAM is what Linux uses to handle authentication. By tapping directly into that layer, Plague can let attackers log in via SSH without ever entering a valid password. Itâ(TM)s silent. Itâ(TM)s persistent. And itâ(TM)s extremely hard to detect.

The scariest part? Security researchers say not a single antivirus flagged it. Dozens of samples have been uploaded to VirusTotal over the past year, and none of them triggered a warning. Thatâ(TM)s not just rare. Thatâ(TM)s almost unheard of.

To stay under the radar, Plague wipes environment variables like SSH_CONNECTION and disables shell history logging. It literally scrubs any evidence of the attackerâ(TM)s activity. Your logs will look clean even when your system is compromised.

It doesnâ(TM)t stop there. The malware hides behind string obfuscation, antidebug tactics, and multiple encryption layers. The latest samples use a triple-decker encryption approach that includes XOR, a stream cipher, and a DRBG layer. Static analysis wonâ(TM)t help much. This thing is built to mess with analysts.

Comment Re:How does this involve Paypal? (Score 1) 34

I'm pretty sure the IA "Open Library" is a free service. There are no payments involved.

Also; both Paypal and the Internet Archive are US companies not Belgium companies. So no Belgium court would have jurisdiction to control what type of business those companies can conduct between each other.

Same for all services from those DNS Resolvers, CDNS, and Hosting companies which are on servers outside of Belgium. Google, Microsoft, Cloudflare, and Starlink are not Belgium-based companies either.

Just because you found a corrupt court in a 3rd world country (Belgium) to write such an order.. Well; good luck trying to enforce that.

The summary links to an article that answers some of your questions...

Comment Re:Assumption (Score 1) 65

I'd like to see more examples of realistic use-cases.

I've found it quite useful searching for the half-remembered book, film, tv-series, song. In particular song lyrics or titles where the snippet recalled features in several more popular songs you can add a bit of context and iterate down the list of likely candidates. With regular search engines sorting out the more popular artists can be quite the chore as often -"artist" isn't sufficient.

Other than that not so much.

Comment Re:Why would the EU care? (Score 2) 32

I struggle to think why regulators would give a shit. They regulate. For them to do that there's rules that need to be followed, not just feel good vibes of wishing a company didn't do something.

The EU part is the editors making and not in the article but I'd believe such regulatory scrutiny would stem from "Circular economy action plan" https://environment.ec.europa.... In particular "on common rules promoting the repair of goods" https://eur-lex.europa.eu/lega... You'd be correct in noting it doesn't mention bootloaders or indeed any type of diy tinkering, but perhaps it will give you an understanding that they are doing what I reckon you believe they a not doing and I assume similarly shouldn't be doing.

Comment Re:Standard practice (Score 1) 16

The factories in China frequently change brand names to avoid bad reviews and sell the same product with an illusion of choice

The "bad review" https://public-inspection.fede...

The ERC determined to add the entities AGCU Scientech; China National Scientific
Instruments and Materials (CNSIM); DJI; and Kuang-Chi Group for activities contrary to U.S.
foreign policy interests. Specifically, these four entities have enabled wide-scale human rights
abuses within China through abusive genetic collection and analysis or high-technology
surveillance, and/or facilitated the export of items by China that aid repressive regimes around
the world, contrary to U.S. foreign policy interests.

Slashdot Top Deals

/* Halley */ (Halley's comment.)

Working...