NSA publishes list of top vulnerabilities currently targeted by Chinese hackers | ZDNet

The US National Security Agency has published today an in-depth report detailing the top 25 vulnerabilities that are currently being consistently scanned, targeted, and exploited by Chinese state-sponsored hacking groups. All 25 security bugs are well known and have patches available from their vendors, ready to be installed.

ZDNet

Encrochat Hack That Brought Down Hundreds of Criminals Faces Legal Challenges

Do you know anything else about Encrochat? We'd love to hear from you. Using a non-work phone or computer, you can contact Joseph Cox securely on Signal on +44 20 8133 5190, Wickr on josephcox, OTR chat on jfcox@jabber.ccc.de , or email joseph.cox@vice.com .

Vice

Here's a five-step security plan for industrial environments | SC Media

On the afternoon of September 13, 2018, a series of natural gas explosions rocked homes in Merrimack Valley, Mass. For hours after this catastrophe, cybersecurity professionals and pundits spiraled through hushed, horrified speculation: was this the cyberattack they were fearing? The big one? In reality, like many industrial catastrophes, these tragic explosions were caused by human error.

SC Media

Twitter Investigation Report

Report on Investigation of Twitter's July 15, 2020 Cybersecurity Incident and the Implications for Election Security Twitter Investigation Report On July 15, 2020, a 17-year old hacker and his accomplices breached Twitter's network and seized control of dozens of Twitter accounts assigned to high-profile users.

Department of Financial Services

Dutch Ethical Hacker Logs into Trump's Twitter Account

The researcher, Victor Gevers, had access to Trump's personal messages, could post tweets in his name and change his profile. Gevers took screenshots when he had access to Trump's account. These screenshots were shared with de Volkskrant by the monthly opinion magazine Vrij Nederland. Dutch security experts find Gevers' claim credible.

de Volkskrant

New Chrome 0-day Under Active Attacks - Update Your Browser Now

Chrome version 86.0.4240.111 released to patch several security high-severity issues, including a zero-day vulnerability.

The Hacker News

Rumor Control | CISA

Mis- and Disinformation can undermine public confidence in the electoral process, as well as in our democracy. This video is also available directly on YouTube. This webpage is for people with questions about the security of their vote and preemptively debunks potential areas for disinformation.

Cisa

Blockchain, the amazing solution for almost nothing

Blockchain technology is going to change everything: the shipping industry, the financial system, government ... in fact, what won't it change? But enthusiasm for it mainly stems from a lack of knowledge and understanding. The blockchain is a solution in search of a problem.

The Correspondent

LockBit uses automated attack tools to identify tasty targets

Earlier this year, we analyzed the inner workings of LockBit, a ransomware family that emerged a year ago and quickly became another player in the targeted extortion business alongside Maze and REvil. LockBit has been quickly maturing, as we observed in April, using some novel ways to escalate privileges by bypassing Windows User Account Control (UAC).

Sophos News

Threatening Voter Emails Included Highly Suspicious 'Hacking' Video

"This is just bullshit fear mongering" Do you work on election security? Do you do vulnerability reserch on voting machines or ssystems? We'd love to hear from you. You can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382 , Wire/Wickr @lorenzofb, or email lorenzofb@vice.com .

Vice

Photoshop: Now the world's most advanced AI application for creatives

Today we release a new version of Photoshop on the desktop and iPad. With it we introduce five major new artificial intelligence features. These new features, added to the already robust Adobe Sensei AI and machine learning features you rely on every day, make Photoshop the world's most advanced AI application for creatives.

Adobe Blog

Principled Artificial Intelligence

The rapid spread of artificial intelligence (AI) systems has precipitated a rise in ethical and human rights-based frameworks intended to guide the development and use of these technologies. Despite the proliferation of these "AI principles," there has been little scholarly focus on understanding these efforts either individually or as contextualized within an expanding universe of principles with discernible trends.

Berkman Klein Center