
Episode 402 – AI Security – Backdoors and Poisoned Data
In this interview at Black Hat Asia 2024, we spoke with Adrian Wood and Mary Walker, security engineers from Dropbox, about the critical issues surrounding AI security, backdoors, and malware.
In this interview at Black Hat Asia 2024, we spoke with Adrian Wood and Mary Walker, security engineers from Dropbox, about the critical issues surrounding AI security, backdoors, and malware.
In this interview at Black Hat Asia 2024, we spoke with Adrian Wood and Mary Walker, security engineers from Dropbox, about the critical issues surrounding AI security, backdoors, and malware.
Cyberstanc- a Technology-Driven Company, consists of a group of malware researchers and reverse engineers who leverage the power of automation and simulation to identify a diverse range of threats with 60+ threat alliance partnerships with an advanced R&D center.
We have a highly scrutinized eye to evaluate and test software in fully controlled situations and find vulnerabilities or defects that expose software to real-world risk thanks to our expertise in detecting exploit development and malware reverse engineering.
Our team quickly evaluates the underlying nature of a sample to understand the risk to data, systems, and networks, whether it’s a standalone examination or a part of a larger bulk inquiry.
Alexis Dorais-Joncas started his career in cybersecurity in 2010, when he was hired by ESET as a malware researcher. In 2015, Alexis was appointed head of ESET’s R&D branch office located in Montreal, where he and his team focus on cutting edge malware research, network security and targeted attack tracking. Their goal is to shed light on the latest trends and developments in the malware ecosystem and implement efficient and innovative countermeasures to allow ESET customers to be safe online.
The report is a culmination of data based on the Company’s unique threat analysis capabilities. Globally, Q1 showed a significant uptick in business ransomware detections (195 percent), along with continued momentum for Trojan variations by over 200 percent and a sharp decline in crypto mining. In APAC, the region has seen business malware detections on the rise, similar to global trends.
The 2019 Mobile Threat Landscape Report: A Comprehensive Review of 2019 Mobile Malware Trends report has launched by CrowdStrike, shows that nation-states are targeting individual mobile users for intelligence gathering and disruption of national rivals.
Sophos has published a detailed threat research from SophosLabs on Baldr, an information-stealer that first appeared January 2019. The report provides a deep dive on the popularity of the malware and its unique killchain characteristics. The in-depth research also reveals Baldr’s inner workings, including cybercriminal behaviors and missteps on both the selling and buying side that potentially led to its sudden disappearance from the deep web in June.
The report highlights the ways in which cybercriminals target people, rather than systems and infrastructure, to install malware, initiate fraudulent transactions, steal data, and more.
The report reveals and ranks the most common domains attackers use to host malware and launch phishing attacks – including several subdomains of legitimate sites and Content Delivery Networks (CDNs).
New research from WatchGuard Technologies shows that amid significant increases in both malware and network attacks, multiple Apache Struts vulnerabilities – including one used in the devastating Equifax data breach – appeared for the first time on WatchGuard’s list of most popular network attacks in Q3 2019.
CONNECT WITH US
© My Security Media. All Right Reserved 2019.