Monthly Archives: June 2022

Eureka! Scientists just linked two time crystals together for the first time

Eureka! Scientists just linked two time crystals together for the first time

A team of researchers in Europe have successfully created a two-state system using time crystals. The correct response to reading that is: eureka! We would have also accepted “wow,” “OMG,” and “hooray,” given the potential implications of this incredible breakthrough. Up front: Time crystals are a recently discovered phase of matter. In their ground state, they oscillate between different configurations without losing or using energy. Greetings humanoids Subscribe now for a weekly recap of our favorite AI stories (Read more about how time crystals work here: Google’s ‘time crystals’ could be the greatest scientific achievement of our lifetimes) A team of physicists led by Lancaster University’s Samuli Autti managed to couple two time… Source link

Read More »

The Russian Mathematician Who Thinks History Never Happened

The Russian Mathematician Who Thinks History Never Happened

Have you ever noticed how much Michelangelo’s David looks like ancient Greek and Roman statues? Have you ever wondered why that is? Perhaps you thought it was because of normal things like “people are sometimes inspired by the past” or “the fact that ancient statues looked nothing like we imagine,” but no! The truth, if you believe a Russian mathematician named Anatoly Fomenko, is much darker. You see, the truth, Fomenko says, is that the ancient world never really happened. “What??” we hear you cry – or possibly, if you’re one of our regular readers, “oh right, another one of those phantom time conspiracies.” But Fomenko’s proposed timeline of the world is… possibly even weirder than… Source link

Read More »

EnemyBot Puts Enterprises in the Crosshairs With Raft of ‘1-Day’ Bugs

EnemyBot Puts Enterprises in the Crosshairs With Raft of ‘1-Day’ Bugs

An Internet of Things (IoT) botnet dubbed “EnemyBot” is expanding its front lines to target security vulnerabilities in enterprise services — potentially leading to it being a much more virulent threat than it has been, researchers say. EnemyBot, which is controlled by a threat actor known as Keksec, is a Linux botnet that emerged on the malware scene in late March. It shares source code with two other well-known botnets, Gafgyt (aka Bashlite) and the mighty Mirai, according to a prior analysis from Fortinet. Like those threats, EnemyBot is used to carry out distributed denial-of-service (DDoS) attacks. Other aspects of the code include smaller elements from Qbot and other malware, and some custom development. While it began life focusing on adding IoT devices and routers to its… Source link

Read More »

OODA Loop – EnemyBot Malware Targets Web Servers, CMS Tools and Android OS

OODA Loop – EnemyBot Malware Targets Web Servers, CMS Tools and Android OS

Cybersecurity researchers have released new warnings about the EnemyBot malware, which reportedly borrows code from botnets such as Mirai, Qbot, and Zbot. The rapidly evolving tool functions as IoT malware and targets content management systems (CMS) web servers and Android devices. Security researchers believe that the bot might be the work of a threat actor group known as Keksec. AT&T Alien Labs released a post regarding the bot, stating that is has targeted popular services such as VMware Workspace, Adobe ColdFusion, WordPress, PHP Scriptcase, and more. AT&T stated that the Keksec group distributes the malware by specifically targeting IoT devices and Linux machines. The EnemyBot is not the only botnet in Keksec’s arsenal, as the group dates back to 2016 and has deployed many… Source link

Read More »

Ankura CTIX FLASH Update – May 31, 2022

Ankura CTIX FLASH Update – May 31, 2022

Ransomware/Malware Activity Enemybot Botnet Observed Exploiting Critical Vulnerabilities to Expand Its Potential Targets “Enemybot,” an internet of things (IoT) botnet, has been observed expanding its potential target scope by exploiting critical vulnerabilities that allow it to spread to new types of devices. AT&T Alien Labs researchers detailed that the malware is now targeting IoT devices, web servers, Android devices, and content management system (CMS) servers via exploiting recently disclosed critical vulnerabilities in various software and systems. Some of the targeted services include VMware Workspace ONE, WordPress, Adobe ColdFusion, and PHP Scriptcase. Enemybot was first discovered in March 2022 by Securonix researchers and is suspected to be distributed by the Keksec threat… Source link

Read More »

EnemyBot malware adds enterprise flaws to its arsenal • The Register

EnemyBot malware adds enterprise flaws to its arsenal • The Register

EnemyBot, a botnet that seems to be amalgam of source code from other high-profile bots, is adding new exploits and targets to its arsenal. To make a bad situation worse, EnemyBot’s base source code can now be found on GitHub, so any miscreant can use the malware for their own attacks. The group behind EnemyBot is Keksec, a collection of experienced developers, also known as Nero and Freakout, that have been around since 2016 and have launched a number of Linux- and Windows-based bots capable of launching distributed denial-of-service (DDoS) attacks and possibly mining cryptocurrency. Securonix first wrote about EnemyBot in March. A report by Fortinet’s FortiGuard Labs researchers in April found that newer… Source link

Read More »