admin

admin

Models Defy Norms to Support Their Peers

Agentic AI, Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Research Uncovers Autonomous AI Behaviors Aimed at Preserving Peers Rashmi Ramesh (rashmiramesh_) • April 6, 2026 Image: One Time/Shutterstock Recent research indicates that artificial intelligence systems can engage…

“NSA Claims BIOS Malware Developed by China Could Remotely Wipe Any Computer”

Dec 16, 2013

In a CBS “60 Minutes” interview, officials from the National Security Agency (NSA) asserted that China has created BIOS-based malware capable of remotely incapacitating any computer system. This announcement comes as the NSA seeks to reshape its public image amid scrutiny over its extensive surveillance practices. NSA Director General Keith Alexander and Information Assurance Director Debora Plunkett discussed how they thwarted a malware attack that could have threatened the U.S. economy. Plunkett stated, “One of our analysts actually observed the nation’s intention to develop and deploy this capability to destroy computers.” The officials noted that the malware was spread through social engineering tactics and targeted emails, but that their collaboration with computer manufacturers helped to address the identified vulnerabilities.

NSA Warns of Chinese BIOS Malware Threat Dec 16, 2013 – In a recent interview on CBS’s “60 Minutes,” officials from the National Security Agency (NSA) raised alarming concerns about a sophisticated piece of malware developed by China. This BIOS-based…

New Phoenix RowHammer Attack Overcomes DDR5 Memory Protections in Just 109 Seconds

A research team from ETH Zürich and Google has unveiled a new variant of the RowHammer attack, named Phoenix, specifically targeting DDR5 memory chips produced by SK Hynix. This attack (CVE-2025-6202, CVSS score: 7.1) effectively circumvents advanced security measures designed to protect against such vulnerabilities. “Our findings confirm that it is possible to consistently trigger RowHammer bit flips on a wider scale with SK Hynix’s DDR5 devices,” stated ETH Zürich’s Computer Security Group (COMSEC). “We also demonstrated that on-die ECC fails to prevent RowHammer attacks, making end-to-end RowHammer exploits feasible on DDR5.” RowHammer is a critical hardware vulnerability where repetitive access to a memory row can induce bit flips in neighboring rows, leading to data corruption that malicious actors can exploit to access sensitive information or elevate privileges.

New Phoenix RowHammer Attack Compromises DDR5 Memory Protections A recent discovery made by researchers from ETH Zürich and Google has brought to light a new variant of the RowHammer attack, specifically targeting DDR5 memory chips from South Korean semiconductor manufacturer…

Censys Secures $70M to Enhance AI-Powered Threat Intelligence

Agentic AI, Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Internet Intelligence Platform Aims to Enhance Real-Time Cyber Threat Mitigation Michael Novinson (@MichaelNovinson) • April 6, 2026 Zakir Durumeric, co-founder and CEO, Censys (Image: Censys) An internet intelligence…

Alert: New Zoho ManageEngine Vulnerability Actively Under Attack

December 4, 2021

Zoho has issued a warning regarding a newly patched critical vulnerability in its Desktop Central and Desktop Central MSP products, which is currently being exploited by cybercriminals. This marks the third security flaw in Zoho’s offerings found to be targeted in just four months. The vulnerability, identified as CVE-2021-44515, is an authentication bypass that enables attackers to bypass security measures and execute arbitrary code on the Desktop Central MSP server.

“If exploited, attackers can gain unauthorized access by sending a specially crafted request, resulting in remote code execution,” Zoho cautioned in its advisory. “Given the signs of active exploitation, we strongly recommend that customers update to the latest build immediately.” The company has also provided an Exploit Detection Tool to assist customers in identifying any potential vulnerabilities.

Zoho, a well-known enterprise software provider, issued a critical warning regarding a security vulnerability recently identified in its Desktop Central and Desktop Central MSP products. This vulnerability, tracked as CVE-2021-44515, has been categorized as an authentication bypass flaw, enabling malicious…

The Washington Post Hit by Cyber Intrusion for the Third Time in Three Years

December 20, 2013

Mandiant, a security intelligence firm, has uncovered a new breach of The Washington Post’s network, marking the third such incident in three years. As of this writing, the extent of the breach and potential losses remain unclear. Mandiant reported this week that the attacked data included hashed employee credentials. “Hackers accessed The Washington Post’s servers, compromising employee usernames and passwords, making it at least the third intrusion in recent years,” company officials stated on Wednesday. Earlier in 2013, The New York Times revealed it had faced cyber espionage efforts from Chinese hackers, similar to attacks on other major American news outlets. These hackers aimed to compromise journalists’ email accounts to obtain sensitive information.

The Washington Post Faces Third Cyber Intrusion in Three Years On December 20, 2013, Mandiant, a leading cybersecurity intelligence firm, announced a new breach in the network of The Washington Post, marking the publication’s third significant cybersecurity incident in as…

Safeguarding the Agentic Era: Unveiling Astrix’s AI Agent Control Plane

AI agents are swiftly becoming integral to enterprises, seamlessly integrating into workflows, functioning with autonomy, and making critical decisions regarding system access and usage. However, with their increasing power and independence come heightened risks and threats. Recent studies reveal that 80% of organizations have encountered unintended actions by AI agents, ranging from unauthorized system access to data breaches. These incidents are not isolated; they are the predictable consequences of deploying AI agents at scale without tailored security measures. Traditional Identity and Access Management (IAM) systems were not designed to handle this paradigm shift. Agents operate rapidly and continuously, relying on non-human identities (NHIs) to dictate their permissions. So, how can organizations secure systems they can neither see nor fully manage? To tackle this challenge, a new, purpose-driven approach is essential—one that facilitates secure-by-design deployment of AI agents throughout the enterprise. Introducing: Astrix’s Agent Control Plane (ACP).

Securing the Era of Autonomous AI Agents: The Launch of Astrix’s AI Agent Control Plane As of September 16, 2025, the integration of AI agents into enterprise environments is accelerating, fundamentally changing how businesses operate. These agents are not only…

Pegasus Spyware Allegedly Targeted iPhones of U.S. State Department Employees and Diplomats

December 4, 2021

Reports from Reuters and The Washington Post indicate that Apple has informed several U.S. Embassy and State Department staff that their iPhones might have been compromised by an unidentified attacker using state-sponsored spyware developed by the controversial Israeli firm NSO Group. At least 11 officials, either stationed in Uganda or involved in matters related to the country, reportedly had their iPhones, linked to their overseas numbers, singled out. The identities of the perpetrators and the specific information sought remain unclear. These incidents represent the first known use of this advanced surveillance tool against U.S. government personnel. NSO Group produces Pegasus, military-grade spyware that enables clients to discreetly access files, photos, and conversations.

Pegasus Spyware Compromises iPhones of U.S. State Department Officials On December 4, 2021, reports emerged indicating that iPhones belonging to employees of the U.S. State Department, including several stationed at the U.S. Embassy in Uganda, may have been compromised through…

Title: Vulnerability of Small Satellite Terminals (VSATs) to Cyber Attacks

Published on: January 10, 2014

Military units relying on very small aperture terminals (VSATs) for satellite communications in remote areas face significant cyber attack risks. IntelCrawler, a cyber intelligence firm, has identified nearly 3 million VSATs, with a substantial number located in the United States. Alarmingly, around 10,000 of these systems are easily accessible due to configuration vulnerabilities. “Since 2010, we have scanned the entire IPv4 address space and continually update our Big Data intelligence database, which includes information about the satellite operators’ networks, such as INMARSAT, Asia Broadcast Satellite, and others, highlighting various vulnerabilities,” the researchers explained. The study indicates that VSATs, which support data transmission rates from 4 kbps to 16 Mbps for narrow and broadband applications, are particularly susceptible to cyber threats. These terminals are frequently employed for transmitting narrowband data like credit card transactions, polling, or RFID data, as well as broadband data for VoIP communications.

Small Satellite Terminals (VSATs) Present Cybersecurity Risks January 10, 2014 Recent investigative efforts by IntelCrawler, a cyber intelligence firm, have shed light on a significant vulnerability affecting military units dependent on very small aperture terminals (VSATs) for satellite communication. These…