Unpatched Pulse Secure VPN servers continue to be an attractive target for malicious actors. Affected organizations that have not applied the software patch to fix a remote code execution (RCE) vulnerability, known as CVE-2019-11510, can become compromised in an attack. Although Pulse Secure disclosed the vulnerability and provided software patches for the various affected products in April 2019, the Cybersecurity and Infrastructure Security Agency (CISA) continues to observe wide exploitation of CVE-2019-11510. CISA expects to see continued attacks exploiting unpatched Pulse Secure VPN environments and strongly urges users and administrators to upgrade to the corresponding fixes.
Tesla has been investing more in its cybersecurity over the last few years, and now it is returning to Pwn2Own to challenge hackers to crack its cars with ~$1 million on the line and a few Model 3 vehicles. Last year, Tesla went to Vancouver for Pwn2Own, which is a hacking competition run by Trend Micro’s Zero Day Initiative (ZDI). It offered a Model 3 to whoever manages to find and exploit certain vulnerabilities in the vehicle’s system. A hacking duo targeted the infotainment system on the Tesla Model 3 and used “a JIT bug in the renderer” to manage to take control of the system. They left with a brand new Model 3.
Starting with yesterday, there is now public proof-of-concept exploit code for CVE-2019-19781, a vulnerability in Citrix enterprise equipment that can allow hackers to take over devices and access a companies’ internal networks. The vulnerability is as bad as it gets and has been deemed one of the most dangerous bugs disclosed in recent years. Codenamed Shitrix by the larger infosec community, this vulnerability impacts Citrix Application Delivery Controller (ADC), formerly known as NetScaler ADC, and Citrix Gateway, formerly known as NetScaler Gateway.
The Maze Ransomware operators have released an additional 14GB of files that they claim were stolen from one of their victims for not paying a ransomware demand. In December the Maze Ransomware operators attacked Southwire, a wire and cable manufacturer out of Georgia, and allegedly stole 120GB worth of files before encrypting 878 devices on the network. Maze then demanded $6 million in bitcoins or they would publicly release Southwire’s stolen files. When Southwire did not make a payment, the Maze operators uploaded some of the company’s files to a “News” site that they had created to shame non-paying victims.
In March of last year, Mark Zuckerberg made a dramatic pledge: Facebook would apply end-to-end encryption to user communications across all of its platforms by default. The move would grant strong new protections to well over a billion users. It’s also not happening anytime soon. What Zuckerberg didn’t spell out at the time is just how difficult that transition would be to pull off, and not just in terms of political hurdles from encryption-averse law enforcement or a shift in Facebook’s business model. Encrypting Facebook Messenger alone represents a Herculean technical challenge. According to one of the Facebook engineers leading the effort, a version of Messenger that’s fully end-to-end encrypted by default remains years away.
Computers can now drive cars, beat world champions at board games like chess and Go, and even write prose. The revolution in artificial intelligence stems in large part from the power of one particular kind of artificial neural network, whose design is inspired by the connected layers of neurons in the mammalian visual cortex. These “convolutional neural networks” (CNNs) have proved surprisingly adept at learning patterns in two-dimensional data—especially in computer vision tasks like recognizing handwritten words and objects in digital images.
One of the most unique tech projects unveiled at CES 2020 this year is Neon, an “artificial human” designed by the Samsung Technology and Advanced Research Labs (STAR Labs). Neon is basically a humanoid artificial intelligence (AI) avatar that looks like a human and can respond to questions in almost real time while giving expressions such as a smile or a raised eyebrow while doing so. It’s a chat bot, but it isn’t a true AI assistant—it’s not intended to be all-knowing. You can’t ask it what year Elvis Presley died (1977), or which breed of dog is best (golden retriever) and expect an answer. Instead, the bot is there to keep someone company and serve as a friend.
The United States government approved the T-Mobile/Sprint merger without fully investigating whether the deal’s anti-competitive harms can be offset by merger conditions, state attorneys general argued in a court filing. The US approved the merger on the conditions that the merging companies deploy 5G nationwide and sell spectrum licenses and other assets to Dish Network to help Dish create a new mobile service. With states having sued the companies to block the merger, the DOJ and FCC last month urged the court to reject the lawsuit and trust the federal government’s conclusions.
In a statement issued to Input late today, Apple rebutted Barr’s characterization of the situation, saying it has responded to all law enforcement requests for help in the extraction data from two iPhones belonging to Mohammed Saeed Alshamrani. Alshamrani is suspected of gunning down three sailors and injuring eight others in an attack at the Naval Air Station in December. “We reject the characterization that Apple has not provided substantive assistance in the Pensacola investigation. Our responses to their many requests since the attack have been timely, thorough and are ongoing,” Apple says. The company promised to continue to provide assistance to the Federal Bureau of Investigation operation as the case evolves.