Microsoft moves to disrupt hacking-as-a-service scheme that’s bypassing AI safety measures

The defendants used stolen API keys to gain access to devices and accounts with Microsoft’s Azure OpenAI service, which they then used to generate “thousands” of images that violated content restrictions.

The post Microsoft moves to disrupt hacking-as-a-service scheme that’s bypassing AI safety measures appeared first on CyberScoop.

Continue reading Microsoft moves to disrupt hacking-as-a-service scheme that’s bypassing AI safety measures

Industrial networking manufacturer Moxa reports ‘critical’ router bugs

Moxa says the flaws can be used to bypass user authentication, escalate privileges and gain root access to devices. 

The post Industrial networking manufacturer Moxa reports ‘critical’ router bugs appeared first on CyberScoop.

Continue reading Industrial networking manufacturer Moxa reports ‘critical’ router bugs

Exit interview: FCC’s Jessica Rosenworcel discusses her legacy on cybersecurity, AI and regulation

The outgoing chair weighs in on how the FCC has addressed newer technologies, efforts to respond to Chinese intrusions into U.S. telecom networks, and regulating AI in political ads.

The post Exit interview: FCC’s Jessica Rosenworcel discusses her legacy on cybersecurity, AI and regulation appeared first on CyberScoop.

Continue reading Exit interview: FCC’s Jessica Rosenworcel discusses her legacy on cybersecurity, AI and regulation

US sanctions Russian, Iranian groups for election interference

The two entities are accused of partnering with intelligence agencies using artificial intelligence to conduct information operations against U.S. audiences.

The post US sanctions Russian, Iranian groups for election interference appeared first on CyberScoop.

Continue reading US sanctions Russian, Iranian groups for election interference

Treasury workstations hacked by China-linked threat actors

According to a letter sent to Senate leaders and obtained by CyberScoop, the compromises occurred through third-party software provider BeyondTrust, which provides identity and access management security solutions.

The post Treasury workstations hacked by China-linked threat actors appeared first on CyberScoop.

Continue reading Treasury workstations hacked by China-linked threat actors

Thousands of industrial routers vulnerable to command injection flaw 

The vulnerability, found in versions of Four-Faith routers, appears to have been exploited in the wild and has been connected to attempted infections of Mirai.

The post Thousands of industrial routers vulnerable to command injection flaw  appeared first on CyberScoop.

Continue reading Thousands of industrial routers vulnerable to command injection flaw 

South Korea sanctions 15 North Koreans for IT worker scams, financial hacking schemes

The individuals are allegedly working for North Korea’s 313th General Bureau, under the DPRK’s Ministry of Munitions Industry.

The post South Korea sanctions 15 North Koreans for IT worker scams, financial hacking schemes appeared first on CyberScoop.

Continue reading South Korea sanctions 15 North Koreans for IT worker scams, financial hacking schemes

State Department’s disinformation office to close after funding nixed in NDAA

The Global Engagement Center, which tracks and exposes foreign disinformation narratives in foreign countries, will see its authority to operate expire Dec. 24.

The post State Department’s disinformation office to close after funding nixed in NDAA appeared first on CyberScoop.

Continue reading State Department’s disinformation office to close after funding nixed in NDAA

False bomb threats at polling sites only blemish on Election Day voting process

The FBI confirmed that bomb threats made to polling locations in several states “appear to originate from Russian email domains.” 

The post False bomb threats at polling sites only blemish on Election Day voting process appeared first on CyberScoop.

Continue reading False bomb threats at polling sites only blemish on Election Day voting process