Latest Entries »

Even though Deep Neural Networks (DNNs) have been
applied with great success in a variety of areas ranging
from speech processing [7] to medical diagnostics [4], recent
work has demonstrated that they are vulnerable to adversarial
perturbations [3], [6], [8], [10], [11], [17], [18], [21]. Such
maliciously crafted changes to the input of DNNs cause them
to misbehave in unexpected and potentially dangerous ways. View full article »

Talos has discovered an unknown Remote Administration Tool that we believe has been in use for over 3 years. During this time it has managed to avoid scrutiny by the security community. The current version of the malware allows the operator to steal files, keystrokes, perform screenshots, and execute arbitrary code on the infected host. Talos has named this malware KONNI.  View full article »

Nissan car logo

A team of three security researchers has found and disclosed two security flaws in the TCU (telematics control unit) components that ship with various luxury car models. View full article »

fireeye logo

An anonymous post on Pastebin says more leaks are possible, tagging the incident operation #LeakTheAnalyst

View full article »

Spring Dragon is a long running APT actor that operates on a massive scale. The group has been running campaigns, mostly in countries and territories around the South China Sea, since as early as 2012. The main targets of Spring Dragon attacks are high profile governmental organizations and political parties, education institutions such as universities, as well as companies from the telecommunications sector. View full article »

The Debian project is pleased to announce the first update of its stable distribution Debian 9 (codename stretch). This point release mainly adds corrections for security issues, along with a few adjustments for serious problems. Security advisories have already been published separately and are referenced where available. View full article »

The Esile targeted attack campaign targeting various countries in the Southeast Asian region has been discussed in the media recently. This campaign – which was referred to by other researchers as Lotus Blossom – is believed to be the work of a nation-state actor due to the nature of the stolen information, which is more valuable to countries than either private companies or cybercriminals. View full article »

A Wisconsin company is about to become the first in the U.S. to offer microchip implants to its employees. Yes, you read that right. Microchip implants. View full article »

Surveillance malware dubbed Fruitfly was easy to spot but flew under the radar anyway.

View full article »

Stock Photography.  Maria Ågren, former Director General of the Transport Agency.

Sensitive information from the Transport Agency has been made available to non-security personnel abroad. It is about the entire Swedish registry of driving licenses, including pictures, and also sensitive information about bridges, subways, roads and harbors in Sweden. Information that may endanger the security of the country. This has happened: View full article »