Cyber-Security: WOROK – Powerful Malware Hidden in .PNG Images

WOROK: Powerful Malware Hidden in .PNG Images

 

“Unless it’s your first day on the internet, you’re probably aware that downloading certain files can be a serious mistake. It doesn’t take a cybersecurity expert to know that double-clicking the TotallyNotAVirus.exe file that mysteriously appeared in your downloads folder is a bad idea. If you’re a bit more security conscious, you probably also know that PDF files, Excel spreadsheets, and Word documents can also contain malicious code. But how many times have you considered the possibility of malware hidden inside an image file? A sophisticated hacking group known as Worok has developed a new type of malware that can be concealed in innocuous-looking PNG images, and they’ve been using it to target governments and large corporations around the world.”

 

The Surveillance State: Intelligence Community Developing AI Tool To Unmask Anonymous Writers

Intelligence Community Developing AI Tool To Unmask Anonymous Writers

 

A press release on Tuesday from the ODNI revealed that the Intelligence Advanced Research Projects Activity (IARPA), their research and development arm, is starting work on the Human Interpretable Attribution of Text Using Underlying Structure program – HIATUS for short.

 

Crime Awareness: Beware of Card Skimmers

Before you EVER Insert your Card Check the Machine Out First.

Especially at Pay at the Pump Gas Station Kiosk.

Many Times the Raghead Paki Store Owners are In on the Scam and get a percentage.

VISUALIZED: Map of Ransomware Attacks Since 2018

VISUALIZED: Map of Ransomware Attacks Since 2018

 

Each dot represents the location of a ransomware attack, with the size of the dot depicting the number of records impacted. 

This map updates weekly and pinpoints the locations of each ransomware attack in the US, from 2018 to present day. Where available, it includes the ransom amount, whether or not the ransom was paid, the entity and industry that was targeted, and the strain of ransomware used. Our researchers search through state reports, industry news, and cybersecurity databases to find the latest ransomware attacks on US businesses, healthcare organizations, educational institutions, and government agencies.

In our industry-specific reports, we found:

The Surveillance State: Metaverse Is the Ultimate Surveillance Tool

The Metaverse Is the Ultimate Surveillance Tool

 

Really well done podcast about Metaverse and it’s application for global surveillance the likes of which you have never imagined!