Google unveils payments protocol for AI agents with major financial firms
Google has introduced the Agent Payments Protocol (AP2), an open framework developed with more than 60 payments and technology companies to support secure, agent-led transactions across platforms and payment methods. Built to be used as an extension to Google’s earlier Agent2Agent (A2A) and Model Context Protocol (MCP) frameworks, AP2 is designed to be payment-agnostic, supporting […] more…To counter AI cheating, companies bring back in-person job interviews
AI-enabled cheating has surged, particularly in virtual technical job interviews. Would-be job candidates increasingly use AI tools off-camera to feed them answers, such as responses to coding challenges, and in some cases turning to deepfake technology to impersonate applicants. To battle that trend, more and more companies are ditching screens for handshakes — bringing back […] more…Questionable AI work habits rampant among US firms
A new study from AI security provider CalypsoAI reveals a “growing use and misuse of AI” within US organizations by employees at all levels, including C-suite executives. Of note, it said, “half (50%) of executives say they’d prefer AI managers over a human, although 34% aren’t entirely sure they can tell the difference between an […] more…Chinese Researchers Suggest Lasers and Sabotage to Counter Musk’s Starlink Satellites
Chinese military and cyber researchers are intensifying efforts to counter Elon Musk’s Starlink satellite network, viewing it as a potential tool for U.S. military power across nuclear, space, and cyber domains. The post Chinese Researchers Suggest Lasers and Sabotage to Counter Musk’s Starlink Satellites appeared first on SecurityWeek. more…Google DeepMind Unveils Defense Against Indirect Prompt Injection Attacks
Google DeepMind has developed an ongoing process to counter the continuously evolving threatIndirect prompt injection (IPI) attacks. The post Google DeepMind Unveils Defense Against Indirect Prompt Injection Attacks appeared first on SecurityWeek. more…Serial Entrepreneurs Raise $43M to Counter AI Deepfakes, Social Engineering
Adaptive is pitching a security platform designed to replicate real-world attack scenarios through AI-generated deepfake simulations. The post Serial Entrepreneurs Raise $43M to Counter AI Deepfakes, Social Engineering appeared first on SecurityWeek. more…Taming Shadow AI: Valence Security, Endor Labs Unveil New Protections to Counter Hidden AI Threats
Valence Security and Endor Labs have introduced extensions to their existing platforms specifically to tackle the invisibility and wrongful use of Shadow AI. The post Taming Shadow AI: Valence Security, Endor Labs Unveil New Protections to Counter Hidden AI Threats appeared first on SecurityWeek. more…Unveiling Hidden Connections: JA4 Client Fingerprinting on VirusTotal
VirusTotal has incorporated a powerful new tool to fight against malware: JA4 client fingerprinting. This feature allows security researchers to track and identify malicious files based on the unique characteristics of their TLS client communications. JA4: A More Robust Successor to JA3 JA4, developed by FoxIO, represents a significant advancement over the older JA3 fingerprinting […] more…Preventing counterfeiting by adding dye to liquid crystals to create uncrackable coded tags
A research group has developed an innovative approach to creating anti-counterfeiting labels for high-value goods. Their findings enhance the security of the currently used cholesteric liquid crystals (CLCs) by adding fluorescent dyes to produce florescent CLCs (FCLCs). Using this unique technology, the group created unique labels with almost impossible-to-counterfeit security features. These advanced labels are […] more…VirusTotal += Crowdsourced AI
We are pleased to announce the launch of Crowdsourced AI, a new initiative from VirusTotal, dedicated to leveraging the power of AI in tandem with community contributions. Spearheading this endeavor, Hispasec brings to the table an AI solution designed to analyze Microsoft document formats, particularly those containing macros, such as Word, Excel, and PowerPoint files. […] more…Malicious Injection Redirects Traffic via Parked Domain
During a recent investigation, our malware remediation team encountered a variant of a common malware injection that has been active since at least 2017. The malware was found hijacking the website’s traffic, redirecting visitors via a parked third-party domain to generate ad revenue. Investigating obfuscated JavaScript Our investigation revealed the following piece of obfuscated JavaScript […] more…US working on new laws to ban investments in Chinese tech firms
The US is working on drafting new regulations that would prohibit investments and transfer of technology to Chinese firms working on developing advanced semiconductors, artificial intelligence, and quantum computing, a US Treasury official said Wednesday. The new regulations will not only focus on Chinese firms but also its military organizations, Paul Rosen, US Treasury’s investment […] more…Elon Musk Says He’ll Create ‘TruthGPT’ to Counter AI ‘Bias’
Elon Musk plans to create an alternative to the popular AI chatbot ChatGPT that he is calling “TruthGPT,” which will be a “maximum truth-seeking AI that tries to understand the nature of the universe.” The post Elon Musk Says He’ll Create ‘TruthGPT’ to Counter AI ‘Bias’ appeared first on SecurityWeek. more…98% of Firms Have a Supply Chain Relationship That Has Been Breached: Analysis
The digital supply chain is probably more extensive and more complicated than you realize. Upward of 98% of organizations have a relationship with at least one third party that has experienced a breach in the last two years – and these figures are almost certainly no exaggeration. The figures come from a report by SecurityScorecard. […] more…Backdoors Found on Counterfeit Android Phones
Russian cybersecurity firm Doctor Web has identified multiple backdoors on the system partitions of several Android devices that are counterfeit versions of popular phones. read more more…Getting Your Kids Ready for School—And Their Smartphones Too
If you’re the parent of a tween or teen, chances are they’re not the only ones going back to school. Their smartphones are going back too. Our recent global research showed just how many tweens and teens use a smartphone. Plenty. Depending on the age band, that figure ranges anywhere from 76% to 93%, with […] more…More information
- Lost Door RAT Promoted via Facebook and Google’s Blogspot
- Dark Hash Collisions: New Service Confidentially Finds Leaked Passwords
- Android Apps Target Bitcoin, By-Passing 2FA
- Kaseya Obtains Universal Decryptor for Ransomware Attack Victims
- Hackers Abuse Twitter App to Hijack High-Profile Accounts
- Microsoft Windows Data Sharing Service CVE-2019-0572 Local Privilege Escalation Vulnerability
- Trump stresses cybersecurity but postpones executive order
- No patch yet for Adobe PDF exploits – Adobe suggests a workaround, but Mac users need not apply
- Veeam Patches Critical Vulnerability in Backup & Replication
- Start-up tackles advanced persistent threats on Microsoft, Apple computers