IoT Devices in Password-Spraying Botnet

Microsoft is warning Azure cloud users that a Chinese controlled botnet is engaging in “highly evasive” password spraying. Not sure about the “highly evasive” part; the techniques seem basically what you get in a distributed password-guessing attack:

“Any threat actor using the CovertNetwork-1658 infrastructure could conduct password spraying campaigns at a larger scale and greatly increase the likelihood of successful credential compromise and initial access to multiple organizations in a short amount of time,” Microsoft officials wrote. “This scale, combined with quick operational turnover of compromised credentials between CovertNetwork-1658 and Chinese threat actors, allows for the potential of account compromises across multiple sectors and geographic regions.”…

Continue reading IoT Devices in Password-Spraying Botnet

Extraordinary observation tower functions like a massive sundial

Reaching a height of 50 m (164 ft) in Yantai, eastern China, the Sun Tower, by OPEN Architecture, cuts a remarkable figure on the shoreline. The curving observation tower functions similarly to a massive sundial and marks the changing of the seasons.Co… Continue reading Extraordinary observation tower functions like a massive sundial

How America’s Export Controls Failed to Keep Cutting-Edge AI Chips from China’s Huawei

An anonymous reader shared this report from the Washington Post:

A few weeks ago, analysts at a specialized technological lab put a microchip from China under a powerful microscope. Something didn’t look right… The microscopic proof was there that … Continue reading How America’s Export Controls Failed to Keep Cutting-Edge AI Chips from China’s Huawei

Biden administration nears completion of second cybersecurity executive order with plethora of agenda items

Federal agencies would have to address everything from AI to cloud security to access management, sources told CyberScoop.

The post Biden administration nears completion of second cybersecurity executive order with plethora of agenda items appeared first on CyberScoop.

Continue reading Biden administration nears completion of second cybersecurity executive order with plethora of agenda items

Self-driving powerbank is an EV “gas can” – with brains

Meet the EV equivalent of a full jerry can – a 141 kilowatt-hour battery charger on wheels, that can autonomously drive itself to wherever it’s needed, flexibly extending charging networks and getting much-needed juice to stranded drivers.Continue Read… Continue reading Self-driving powerbank is an EV “gas can” – with brains

Report: Chinese hackers used telecom access to go after phones of Trump, Vance

U.S. authorities said they are investigating “unauthorized access to telecommunications infrastructure” by hackers linked to China.

The post Report: Chinese hackers used telecom access to go after phones of Trump, Vance appeared first on CyberScoop.

Continue reading Report: Chinese hackers used telecom access to go after phones of Trump, Vance