Swalwell for Congress Campaign Partners with Wolfsbane.ai to Protect Against AI-Generated Cloning

0
[ad_1]

Today, Congressman Eric Swalwell, CA-14, announced that he has partnered with Wolfsbane.ai to help prevent his 2024 election campaign content from being used to create AI clones and deepfakes.

Wolfsbane.ai will use its patent-pending technology to encode Rep. Swalwell’s campaign videos and audio with a countermeasure that makes it difficult to create AI clones with that content.

Rep. Swalwell is the first political figure to use Wolfsbane.ai and take an active step to ensure that his campaign content is not used to create clones and fakes that can be used for misinformation. “Ensuring the integrity of our democratic process is of paramount importance,” said Swalwell.

“Embracing cutting-edge tools such as Wolfsbane.ai to prevent deepfakes is not just an option; it’s a necessity in safeguarding elections against fraud and misinformation.”

Rep. Swalwell is ranking member of the Cybersecurity and Infrastructure Protection Congressional Subcommittee where he has stressed the dangers of AI-generated deepfakes in spreading election misinformation. Rep.

Swalwell is not merely talking about preventing deepfakes, he is taking active steps to ensure that his own voice and likeness are protected using the latest technology advancements. “AI is a potent technology,” said Swalwell.

“If used irresponsibly, it can hijack the likeness and voice of public figures to undermine their credibility and spread disinformation. Wolfsbane.ai will mitigate the risks of this happening to me.”

One of the advancements in the fight against AI deepfakes is Wolfsbane.ai. Wolfsbane.ai is a recently launched service offered by Play Cubed: A company founded by content protection pioneers Randy Saaf and Octavio Herrera as well as Fazri Zubair and Noah Edelman.

Wolfsbane.ai allows customers to protect their content, voice, IP and identity from unauthorized AI cloning and deepfakes. Before publishing any content, Wolfsbane.ai customers can use a simple interface to upload and quickly process it; once done that content is protected by the Wolfsbane countermeasure and the user can publish their content with peace-of-mind.

Wolfsbane.ai’s patent-pending encoding technology offers a robust defense, designed to effectively combat a wide spectrum of AI cloning tools.

Wolfsbane.ai is being used by music artists, entertainment companies, content creators, and individuals but the company is very focused on working with campaigns as well as government officials.

“We are proud to be working with Rep. Swalwell’s campaign” said Play Cubed CEO Randy Saaf. “We think our technology can be an effective tool in the fight against AI fakes during this important election year.”

About Swalwell for Congress:

Elected in 2012 to Congress, representing the East Bay in Northern California, Eric Swalwell served eight years on the House Intelligence Committee where he was the chairman and ranking member overseeing the CIA.

On the Intelligence Committee, Eric helped lead the House Investigation into Russia’s interference in the 2016 election, and later, the first and second impeachments of Donald Trump.

As a member of the House Democrats’ leadership team, Eric was on the House Floor on January 6. A week after the attack, Eric was appointed as a House Impeachment Manager for the former president’s Senate trial.

Eric currently serves on the House Judiciary and Homeland Security Committees. He is also Chairman Emeritus and founder of Future Forum, a group of young Democratic members focused on issues and opportunities for millennial Americans.

Eric is also founder and co-chair of the bipartisan Critical Materials Caucus, and Personalized Medicine Caucus. Every day Eric strives to make sure if you work hard it adds up to doing better for yourself and dreaming bigger for your family.  

About Play Cubed/Wolfsbane.ai

Play Cubed provides AI Content Protection services via its patent-pending technology Wolfsbane.ai.

Play Cubed is founded by Randy Saaf, Octavio Herrera, Fazri Zubair, and Noah Edelman. Our team has been together for over 8 years, with Randy and Octavio having worked together for over 20 years. Randy and Octavio are proven entrepreneurs with two successful exits valuing nearly $400M.

Randy and Octavio are content protection pioneers, having co-founded P2P anti-piracy provider MediaDefender in 2000. MediaDefender was used by every major music label and movie studio and was acquired by ARTISTDirect in 2005.

The Play Cubed team also has a successful history of developing enabling technologies used by top companies such as Major League Baseball, NBA, CBS, ESPN, Mattel, Universal Music, Sony Music, Lionsgate, and many more.

Contact

Cofounder
Octavio Herrera
Play Cubed
[email protected]


[ad_2]
Source link

Authentic8 launches Silo Shield program to protect high-risk communities in partnership with CISA

0
[ad_1]

Washington, DC, United States, April 2nd, 2024, CyberNewsWire

Authentic8, provider of the leading OSINT research platform Silo for Research, today launched their Silo Shield Program to enhance online security for high-risk communities. Also today, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) launched a webpage listing free tools and services to strengthen defenses of high-risk communities, including Authentic8’s new Silo Shield Program.

These “high-risk” communities — non-governmental organizations, journalists, and academics — face digital risks that are existential threats to their missions, as they are targeted by some of the world’s most capable advanced persistent threats (APTs). The new Silo Shield Program enables eligible persons to apply for access to Authentic8’s Silo for Research platform, which provides a secure solution to collect publicly available information. Securely collecting web-based information is essential for these groups to carry out research, investigations, and advocacy.

“In an era where adversaries threaten those striving for social change and transparency, Authentic8 is proud to launch the Silo Shield Program. This pioneering initiative offers robust online protection for high-risk communities at the forefront of pushing boundaries and challenging the status quo. While we have supported similar organizations for years, recent work with CISA prompted us to formalize and expand access to those at risk,” says Ramesh Rajagopal, CEO and co-founder of Authentic8.

High-risk communities eligible to apply to the Silo Shield Program include:

  • Journalists focusing on topics like security, transparency and global affairs who perform online research and may be targeted by adversaries as a part of their work.
  • Activists and non-profit groups are eligible for Silo Shield as they work to safeguard human rights, prevent abuse and effect justice, as they rely on online research to uncover and document abuses, legal violations and advocacy opportunities.
  • Academics in fields like security, political science, sociology and environmental studies, whose research on global issues demands access to information across geographical boundaries — often in restrictive environments — are eligible.
  • Humanitarian aid organizations, including those focusing on direct support, anti-corruption efforts and digital freedom are eligible for Silo Shield, as their efforts to compile evidence, vet suppliers and aid recipients, and communicate safely online are critical to their missions.

“Our commitment to high-risk communities is more than just a promise; it’s a mission to arm them with the tools they need to conduct their vital work securely and confidently. We are proud to enable their access to global online resources without fear of adversary surveillance or compromise,” says Matt Ashburn, a former CIA cyber officer and White House NSC Director who now serves as Authentic8’s vice president of Customer Success.

Through the Joint Cyber Defense Collaborative (JCDC), Authentic8 collaborated with CISA on their High-Risk Communities Protection effort to elevate awareness of the cyber threats that high-risk communities experience and resources available to mitigate them. CISA’s High-Risk Communities webpage serves as a one-stop-shop for cybersecurity guidance and free or discounted tools and resources that are tailored to meet the needs of high-risk organizations that want to improve their cybersecurity baseline.

For more information on the Silo Shield program or the Silo for Research digital investigations platform, visit https://authentic8.com.

Contact

Head of Strategic Initiatives
Abel Vandegrift
Authentic8
[email protected]


[ad_2]
Source link

Verizon 5G Home Internet: Everything You Need To Know

0
[ad_1]

Verizon 5G Home Internet is what the future of 5G looks like. There’s been a lot of talk about what 5G is going to be able to deliver, but other than faster internet on our mobile devices, we haven’t really seen that future. But Verizon’s 5G Home Internet is part of that future.

The real question is what exactly is Verizon 5G Home Internet? Obviously from the name, it sounds a lot like it’s a home internet connection, that is powered by 5G. And well, on the surface, that is exactly what it is. In this article, we are going to answer all of your questions about Verizon 5G Home Internet, and help you decide whether it is right for you.

What is Verizon 5G Home Internet?

Verizon 5G Home Internet is exactly what it sounds like, internet delivered to your home’s router via 5G. That means that where you live in relation to Verizon’s towers will greatly influence how fast your internet is. But it also means that you don’t have any wires for the router, other than power. So you can set it up anywhere in your home.

Of course, the best spot to set up your new Verizon 5G Home Internet router is going to be near a window, so it has a direct line of sight to the towers outside.

This is a fixed wireless connection, like satellite internet. Which has typically been pretty slow, but that’s not the case with Verizon – mostly because of 5G. Now that Verizon has rolled out C-Band 5G, you’re bound to get several hundred Megabits from your Verizon 5G Home Internet connection.

Sign Up For Verizon 5G Home Internet

How much does it cost?

Verizon has two plans for its 5G Home Internet service. There’s 5G Home and 5G Home Plus. They are mostly the same, with the only real difference being the fact that 5G Home plus offers a 3-year price guarantee versus 2-years, and you get Verizon Cloud Unlimited included. Verizon also offers some bigger promotions for the 5G Home Plus plan.

Screen Shot 2022 02 23 at 8 47 53 AM

Verizon 5G Home is priced at $60/month without autopay, $50/month with autopay, or $25/month with select 5G Mobile plans. Those select 5G plans include 5G Play More, 5G Do More and 5G Get More. Basically, not the cheapest 5G plan.

Then there is the 5G Home plus which will be $80/month without autopay, $70/month with autopay or $35/month with select 5G mobile plans – the same plans as mentioned above. That is quite a bit cheaper than a traditional ISP, which will charge you around $100 per month for the same service. So it’s not hard to see why so many people are interested in Verizon 5G Home Internet.

Do I get a discount for being a Verizon Wireless customer?

Yes, you do get a discount with a compatible Verizon 5G mobile plan. That is about half the price of the regular autopay price. Allowing you to get home internet for as low as $25/month. Which is not too shabby at all.

Keep in mind that you need to have a compatible 5G mobile plan: 5G Play More, 5G Do More or 5G Get More. And you need to have autopay turned on to get these prices.

Does Verizon offer any promotions for switching?

Yes, Verizon will help cover the cost of early termination fees from your existing ISP. That is up to $500 in credits for early termination fees. Basically, you’d still need to pay those fees to your current ISP. But after you have done so, submit your bill to Verizon, and they will issue you a bill credit for that amount – up to $500.

But be careful here, because if you or Verizon decides to cancel your Verizon 5G Home Internet plan within 90 days, the credit will be charged back to your final bill. This is not crazy, as most carriers and ISPs will do this, as they don’t want you to switch and get the credit then leave right away.

Screen Shot 2022 02 23 at 9 10 18 AM

Verizon is also offering a few other perks right now. On the 5G Home plan, you will get Disney+ on us for 6 months, One month of 5G Home on us, a Verizon Stream TV device on us, and Sling TV for two months on us. On the 5G Home Plus plan, those perks are a bit better. Giving you Disney+ for 12 months on us, $300 off Stream TV Soundbar (regular price is $399), One month of 5G Home Plus on Us, Verizon Stream TV device on us, and two months of Sling TV on us.

Sign Up For Verizon 5G Home Internet

Are there are any data caps?

Nope. No data caps at all on Verizon’s 5G Home Internet.

Now on older versions of this service, that ran on 4G LTE, there were some speed caps, so you didn’t usually see it past 50Mbps. But with 5G, Verizon has no caps on here whatsoever. You can get up to about 980Mbps speeds on these WiFi 6 routers from Verizon, and use as much as you want.

This is good news, as we’ve started to see ISPs remove their data caps in recent years – of course a big part of that was everyone being forced to work from home for the past couple of years. AT&T has removed its caps, at least on Fiber connections. And Comcast has also removed it in a lot of areas.

What kind of speeds can we expect from Verizon 5G Home Internet?

The biggest catch for Verizon 5G  Home Internet is going to be speed. Since it’s relying on its 5G network, you never know if you’re going to get 50Mbps, or 900Mbps. And it also depends on your area.

Verizon does say that you can get up to 980Mbps on this service, however when I put in my address, it states that download speeds are between 85 and 300Mbps. Which is still a pretty big gap, going from okay service to pretty good.

verizon5g

With the rollout of C-Band, as long as you’re in a C-Band area, you’ll likely see a few hundred Mbps on Verizon 5G Home Internet. We’ve seen some people pulling down around 200-400Mbps consistently with C-Band on Verizon 5G Home Internet. And if you live in a mmWave area, you’ll see even faster speeds.

There’s a lot more factors here with Verizon 5G Home Internet and its speeds, compared to fiber from AT&T or Comcast.

Sign Up For Verizon 5G Home Internet

Where is Verizon 5G Home Internet available?

Verizon does not offer a map for 5G Home Internet, but you can check availability here. It is available in most major metro areas at this point, and a lot of those areas do also offer 5G Ultra Wideband, so you’re able to get even faster speeds.

On top of that, Verizon is continuing to expand its 5G Home Internet footprint across the US. So if you don’t have coverage now, you likely will in the coming months.

Update: On February 15, 2023, Verizon announced that 5G Home Internet was expanding two new areas. This includes:

  • Colorado Springs, Colorado
  • Monroe County, New York
  • Bradenton, Florida
  • West Palm Beach-area, Florida

How easy is it to setup Verizon 5G Home Internet?

It’s pretty easy to set up actually. Verizon touts that it is plug and play self-setup. Once you get your router, unbox it and open the My Verizon app. It’ll walk you through setup, which takes less than 5 minutes. That’s the kind of setup that we can all get behind.

Should I switch to Verizon?

If you don’t need a solid gigabit connection, then Verizon’s 5G Home Internet service is a really good, and cheap option. If you work from home, you may want to try it out first, instead of just up and switching. Depending on the work you do from home, it may not be fast enough for you – yet.

Luckily, Verizon does give you the first month free. So you can try it out for no money out of your pocket.


[ad_2]
Source link

The US and UK team up to boost AI safety

0
[ad_1]

Right now, several governments are trying to find a way of mitigating the risks associated with AI technology. So far, their efforts have all pretty much been separate. However, the US and the UK are teaming up to test the safety of AI models.

So far, there’s been very little collaboration between different geographic locations when it comes to AI. The US has its own way of doing things, the UK has its own way, China has its own way, Etc. At this point, we have no idea if this sort of fragmentation will have a detrimental effect on our efforts to keep AI safe. This is just one of the things we’re going to have to figure out the hard way.

The US and UK are working together to test AI safety

This seems to be the first major collaboration between governments across seas to help assess the dangers of AI. Over in the UK, there is an AI Safety Institute, and there is also one for me in the US. Well, these two institutes will work together to test “the most advanced AI models.” This is an official partnership, as both governments signed a Memorandum of Understanding (MOU).

So, both institutes will work together and share information regarding their studies. Along with that, it appears that the two institutes will also want to perform tests on a publicly available AI model. We’re not sure what model this will be, but we’re sure that it will be a model that will affect many users. We don’t know what sort of tests these institutes will perform. However, we’re pretty sure that they will be standard red teaming tests.

This is the first collaboration such as this regarding AI, and hopefully, it’s not the last. The US and the UK are planning on collaborating with other countries to help test AI.

This is probably the best method

We’re all used to different countries and continents doing things differently. However, when it comes to AI technology, that may not be the best approach. Regardless of geographic location, AI poses the same threat. The best thing would be for countries to band together and standardize AI technology across the board. Coming up with a global standard for AI technology that is properly regulated could ensure that AI does not get out of control.


[ad_2]
Source link

YouTube app on your TV will now auto generate key moments from any video

0
[ad_1]

If you spend as much time as I do watching YouTube videos, and your television is one of the devices you happen to watch them on, you’ll be glad to know that your experience is about to get better. No more fumbling with that TV remote trying to find the exact moment in the video where that iconic line, or that cinematic shot, was shown. YouTube is now incorporating key moments on its TV app that will work similar to chapter marks on a DVD, only better.
YouTube’s CEO, Neal Mohan, recently announced a cool new feature: auto-generated key moments. What that means is that there will no longer be a need to scrub through videos hoping to land on the good stuff. Now you can instantly jump to the most exciting, important, or hilarious parts.

When watching YouTube on your TV, you will be able to open the video progress bar and little white markers will appear. Those are the “key moments” that YouTube is pointing out for you. You can then use your remote’s arrow keys to quickly skip between them, and YouTube will even show a little thumbnail and description. Hopefully this means that you’ll no longer have to sit through rambling intros or less interesting sections.

This is reminiscent of the “chapters” that many YouTube creators already use and manually add to their videos, except that this feature automates the process and fills the gap when creators don’t have time to do it themselves. It also follows another YouTube feature currently being tested where double tapping to skip ahead in a video takes you to the most exciting parts of the video instead, according to user data. This latter, however, is a YouTube Premium-exclusive experiment.

This update shows YouTube is paying attention to how people actually use its service. Watching hours-long videos on your TV takes dedication. This feature shows that YouTube wants to make that experience smoother, helping viewers find the content they’re most excited about without the hassle.


[ad_2]
Source link

5 Major Phishing Campaigns in March 2024

0
[ad_1]

March saw many notable phishing attacks, with criminals using new tactics and approaches to target unsuspecting victims.

It is time to explore some of the five most noteworthy campaigns to understand the current threat landscape better.

Pay close attention to the details of these attacks to determine whether your organization may be vulnerable.

Attack Using SmbServer to Steal Victims’ Credentials

SmbServer to Steal Victims’ Credentials

The month kicked off with an attack likely carried out by the infamous TA577 threat actor.

The campaign targeted victims’ credentials and began with a social engineering email, written in English or German, with the subject line “I sent a material your side last day, have you able to get it?” 

Attached to the email was a ZIP archive containing a weaponized HTML file. From there, the attack unfolded the following way:

  1. The victim opened the HTML page, built on a 450-byte template.
  2. The page redirected the user to a file on an external server, leveraging impacket-smbserver via the SMB protocol.
  3. The attackers received the victim’s data: IP address, NTLM challenge data, Username, and computer name.

To view a real-world sample of this phishing campaign, use this analysis session report in the ANY.RUN sandbox.

Document

Integrate ANY.RUN in Your Company for Effective Malware Analysis

Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

  • Real-time Detection
  • Interactive Malware Analysis
  • Easy to Learn by New Security Team members
  • Get detailed reports with maximum data
  • Set Up Virtual Machine in Linux & all Windows OS Versions
  • Interact with Malware Safely

If you want to test all these features now with completely free access to the sandbox:

Attack Utilizing Fake MS Outlook Login Pages
A fake Nokia login page shown in the ANY.RUN sandbox
A fake Nokia login page shown in the ANY.RUN sandbox

Early in March, another phishing campaign combined a Telegram bot with phishing pages hosted on Cloudflare Workers.

The motivation here was to steal user login credentials by automatically mimicking the look and feel of their organizations’ MS Outlook login pages.

These pages incorporated several elements:

  • Base64 encoded background images and design elements sourced directly from Microsoft.
  • Common JavaScript libraries like popper.js, jQuery, and Bootstrap provided a familiar user experience.
  • The victim’s company logo was fetched from the Clearbit Logo service.

The attackers transmitted the victim’s login information to a Telegram bot. The user was then redirected to a legitimate Microsoft Outlook page.

An actual example of the attack detonated and thoroughly followed through with a test set of credentials can be accessed in the ANY.RUN sandbox.

Attack Targeting Users in Latin America

Attack Targeting Users
Attack Targeting Users

In March, one of the geo-specific campaigns was targeted against victims in the LATAM region. In one instance, the attackers impersonated Colombian government agencies as part of their spam emails. 

The messages were accompanied by PDFs accusing recipients of traffic violations or other legal issues. From there, the attack went as follows: 

  1. The user opened a PDF and downloaded an archive. 
  2. The archive contained a VBS script.
  3. Upon execution, the script ran a PowerShell script. 
  4. This PowerShell script fetched the final payload from a legitimate storage service.

The final payload was one of several remote access trojans (RATs): AsyncRAT, NjRAT, and Remcos. 

See the entire execution chain of the attack, resulting in NjRAT infection, in a sandbox.

Attack Abusing AWS to Drop STRRAT

ANY.RUN showing the Github connection used for downloading STRRAT
ANY.RUN showing the Github connection used for downloading STRRAT

Using legitimate services, such as AWS and Github to store payloads, this phishing campaign once again relied on social engineering. 

Victims received emails that encouraged them to verify payment information by clicking a button, leading to the following:

  1. By clicking the button, victims downloaded a malicious JAR file disguised as a payment invoice.
  2. After launching, the file employed a PowerShell command to run two more JAR files.
  3. The final stage involved VCURMS or STRRAT malware being pulled from Github or AWs and infecting the victim’s system.

To see an example of STRRAT being downloaded from Github and collect this malware’s configuration, use this analysis session in ANY.RUN. 

Attack Exploiting TikTok and Google AMP

Phishing Page
Phishing Page

The latest phishing campaign on this list employed several legitimate services simultaneously to get users to enter their credentials. It used a chain of redirects, starting from TikTok and ending with Cloudflare.

Here is a detailed overview of the attack:

  1. A TikTok link that embeds a Google AMP external address within the URI “&target=” parameter triggers a redirect. 
  2. Google AMP then disguised a hidden address, which led to a URL Shortener Service. The destination domain address contained Unicode characters to mask the redirection target.
  3. The URL shortener service redirected the victim’s browser to Cloudflare, which is used to host the phishing page.

The page featured a form containing various encrypted code elements that were gradually decrypted and assembled during browser rendering. It also blocked right-click interactions, making element inspection difficult.

After form submission, the victim’s stolen data got transmitted via an HTTP POST request to the attackers.

To get an inside look into this campaign, refer to this analysis session.

Analyze Phishing Campaigns in ANY.RUN

ANY.RUN is a cloud sandbox for advanced analysis of malware and phishing attacks. 

The service provides a fully interactive virtual environment where you can study the threat and interact with it and the system.

For instance, in the case of phishing, it can help you complete steps requiring human interaction to understand the entire chain of attack. 

The sandbox also lets you easily monitor malicious network and registry activity, track and examine processes, extract indicators of compromise, and download threat reports.

See how ANY.RUN can benefit your organization. Schedule a personalized demo for your security team.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.


[ad_2]
Source link

Swalwell for Congress Campaign with Wolfsbane.ai Against AI-Generated Cloning

0
[ad_1]
Swalwell for Congress Campaign with Wolfsbane.ai Against AI-Generated Cloning

Today, Congressman Eric Swalwell, CA-14, announced that he has partnered with Wolfsbane.ai to help prevent his 2024 election campaign content from being used to create AI clones and deepfakes. Wolfsbane.ai will use its patent-pending technology to encode Rep. Swalwell’s campaign videos and audio with a countermeasure that makes it difficult to create AI clones with that content.

Rep. Swalwell is the first political figure to use Wolfsbane.ai and take an active step to ensure that his campaign content is not used to create clones and fakes that can be used for misinformation.

“Ensuring the integrity of our democratic process is of paramount importance,” said Swalwell. “Embracing cutting-edge tools such as Wolfsbane.ai to prevent deepfakes is not just an option; it’s a necessity in safeguarding elections against fraud and misinformation.”

Rep. Swalwell is a ranking member of the Cybersecurity and Infrastructure Protection Congressional Subcommittee where he has stressed the dangers of AI-generated deepfakes in spreading election misinformation.

Rep. Swalwell is not merely talking about preventing deepfakes, he is taking active steps to ensure that his voice and likeness are protected using the latest technology advancements.

“AI is a potent technology,” said Swalwell. “If used irresponsibly, it can hijack the likeness and voice of public figures to undermine their credibility and spread disinformation. Wolfsbane.ai will mitigate the risks of this happening to me.”

The latest development happened two months after the Check Point Research team highlighted the dangers posed by the widespread availability of artificial intelligence-based technologies, particularly deepfake, in encouraging electoral fraud.

One of the advancements in the fight against AI deepfakes is Wolfsbane.ai. Wolfsbane.ai is a recently launched service offered by Play Cubed: A company founded by content protection pioneers Randy Saaf and Octavio Herrera as well as Fazri Zubair and Noah Edelman. Wolfsbane.ai allows customers to protect their content, voice, IP and identity from unauthorized AI cloning and deepfakes.

Before publishing any content, Wolfsbane.ai customers can use a simple interface to upload and quickly process it; once done that content is protected by the Wolfsbane countermeasure and the user can publish their content with peace of mind. Wolfsbane.ai’s patent-pending encoding technology offers a strong defense, designed to effectively combat a wide spectrum of AI cloning tools.

Wolfsbane.ai is being used by music artists, entertainment companies, content creators, and individuals but the company is very focused on working with campaigns as well as government officials. “We are proud to be working with Rep. Swalwell’s campaign,” said Play Cubed CEO Randy Saaf. “We think our technology can be an effective tool in the fight against AI fakes during this important election year.”

About Swalwell for Congress:

Elected in 2012 to Congress, representing the East Bay in Northern California, Eric Swalwell served eight years on the House Intelligence Committee where he was the chairman and ranking member overseeing the CIA. On the Intelligence Committee, Eric helped lead the House Investigation into Russia’s interference in the 2016 election, and later, the first and second impeachments of Donald Trump.

As a member of the House Democrats’ leadership team, Eric was on the House Floor on January 6. A week after the attack, Eric was appointed as a House Impeachment Manager for the former president’s Senate trial.

Eric currently serves on the House Judiciary and Homeland Security Committees. He is also Chairman Emeritus and founder of Future Forum, a group of young Democratic members focused on issues and opportunities for millennial Americans. Eric is also the founder and co-chair of the bipartisan Critical Materials Caucus and Personalized Medicine Caucus. Every day Eric strives to make sure if you work hard it adds up to doing better for yourself and dreaming bigger for your family.  

About Play Cubed/Wolfsbane.ai

Play Cubed provides AI Content Protection services via its patent-pending technology Wolfsbane.ai. Play Cubed was founded by Randy Saaf, Octavio Herrera, Fazri Zubair, and Noah Edelman. Our team has been together for over 8 years, with Randy and Octavio having worked together for over 20 years.

Randy and Octavio are proven entrepreneurs with two successful exits valuing nearly $400M. Randy and Octavio are content protection pioneers, having co-founded P2P anti-piracy provider MediaDefender in 2000.

MediaDefender was used by every major music label and movie studio and was acquired by ARTISTDirect in 2005. The Play Cubed team also has a successful history of developing enabling technologies used by top companies such as Major League Baseball, NBA, CBS, ESPN, Mattel, Universal Music, Sony Music, Lionsgate, and many more.

Contact

  1. AI Generated Fake Obituary Websites Target Grieving Users
  2. Employee Duped by AI-Generated CFO in $25.6M Deepfake Scam
  3. Deepfakes Are Being Used to Circumvent Facial Recognition Systems
  4. Deepfake Cyber Attack Hits Russia: Fake Putin Message Broadcasted
  5. McAfee’s Mockingbird AI Tool Detects Deepfake Audio with 90% accuracy

[ad_2]
Source link

Sony Xperia 1 VI could launch with unchanged camera hardware

0
[ad_1]

According to a new report, the Sony Xperia 1 VI could launch with unchanged camera hardware. Do note that this information comes from Weibo, but not from one of our usual sources. So… take it with a grain of salt.

The Sony Xperia 1 VI could launch with unchanged camera hardware

The device is tipped to include a 48-megapixel main camera (f/1.9 aperture, 1/1.35-inch sensor, 24mm lens). A 12-megapixel ultrawide camera (f/2.2 aperture, 16mm lens, 1/2.5-inch sensor) would also be included if that ends up being the case. The same goes for a 12-megapixel telephoto camera (f/2.3 aperture 85mm, f/2.8 aperture 125mm) with a 1/3.5-inch sensor with continuous zoom.

If they stay exactly the same, that is what we’ll get. If that ends up being the case, we’re expecting some software improvements to take place. Needless to say, those can make a huge difference. The Sony Xperia 1 V has outstanding camera hardware as is.

Now, you may recall that we’ve already seen some Xperia 1 VI reports. The phone is actually rumored to include a different aspect ratio for its display. The phone will be a bit shorter and a bit wider than its predecessor. That means we will no longer get access to a 21:9 display aspect ratio.

The phone could also ditch a 4K display

Furthermore, the Sony Xperia 1 VI could also ditch the 4K display that its predecessor is rocking. The company could switch to a QHD+ panel on its new smartphone.

Many people thought that a 4K panel on a smartphone is an overkill either way. That panel was only in use when appropriate content was played on the phone, as it would kill the battery otherwise.

The Sony Xperia 1 V arrived in May last year. Chances are that its successor will follow in May this year. That means it’ll likely arrive next month.


[ad_2]
Source link

Android malware ‘Vultur’ gets even nastier with remote access

0
[ad_1]

According to SecurityWeek’s latest post, Android’s banking malware, AKA Vultur, has emerged again with a major update that gives it extensive capability to interact with infected devices and manipulate files. Vultur initially surfaced in March 2021 when the malware infected genuine applications such as AlphaVNC and ngrok to remote access VNC servers located on victim devices thus enabling screen recorder and keylogger for credential theft.

Upgraded Android trojan Vultur can now take full control of infected devices and access its files

The recent edition of Vultur further advances its features and now allows full control over compromised machines. These include interference with applications, custom notification posting, bypassing lock-screen protections, and manipulating files by downloading, uploading, installing, searching, or deleting.

Although NCC Group’s report indicates that this malware chiefly relies on AlphaVNC and ngrok for remote access, its latest version comes with enhanced anti-analysis and detection evasion mechanisms. These involve multiple payloads, changing innocent apps, native code for payload decryption, and AES encryption for command-and-control (C&C) communication.

Normally an SMS message pings the victim requiring them to immediately call a specific number to deal with an unauthorized transaction. Soon after that, another SMS reaches the device containing a malicious URL pointing to a tampered McAfee Security package which serves as the dropper of the malware itself.

Under the dropper framework called Brunhilda, Vultur consists of three components called payloads which aim to facilitate subsequent stages of execution. With these payloads in place, Vultur can get Accessibility Service privileges, set up AlphaVNC & ngrok, and perform core backdoor functionality.

With remote control, attackers can also perform gestures and lock you out of the device

To support remote interaction, Vultur now contains seven new C&C methods allowing attackers to perform different actions like clicks, scrolls, and swipe gestures. When talking about Firebase Cloud Messaging (FCM), there are also 41 new commands making use of those privileges, and SMS communication allows opportunities without permanent connections between sources.

Also, the latest edition of Vultur takes away user’s ability to interact with certain applications. In short, the updated Vultur poses a significant danger to Android users as it now contains remote control over infected devices and manipulates files. Hence, NCC advises Android owners to remain cautious.


[ad_2]
Source link

Indian Govt Rescues 250 Citizens Trapped In Cambodia

0
[ad_1]

A massive cyber fraud operation targeting Indians in Cambodia has emerged, with an estimated Rs 500 crore stolen in six months. 

Over 5,000 Indian nationals are reportedly being held against their will and forced to participate in the elaborate scheme. 

A high-level meeting was convened immediately, bringing together officials from the Ministry of External Affairs (MEA), the Ministry of Electronics and Information Technology (Meity), the Indian Cyber Crime Coordination Centre (I4C), and security experts to formulate a rescue strategy.

“The agenda of their meeting was to discuss the organized racket and bring back those who are trapped there. Data shows that Rs 500 crore has been lost (to cyber fraud originating in Cambodia) in India in the last six months,”.

250 Citizens Trapped In Cambodia

They also added that the agents target victims, mainly from southern India, with offers of data entry jobs.  

Once in Cambodia, passports are confiscated, and victims are compelled into cyber fraud, including impersonating law enforcement for extortion.

On December 30, The Rourkela Police in Odisha arrested eight people who facilitated travel to Cambodia.  

According to Dr. Arathi Krishna, Deputy Chairman of the Non-Resident Indian Forum of the Government of Karnataka (NRIFK), three Karnataka residents trapped in a Cambodian cyber fraud scheme have been rescued with the help of the Ministry of External Affairs (MEA).

Family members alerted NRIFK about the struggle. 

Lured by promises of data entry jobs, the men were forced to participate in cyber scams. 

Dr. Krishna commended the collaborative effort between NRIFK, the MEA, and the Indian embassy in securing their release. 

The rescued individuals estimate that around 200 others from the region are still trapped.

Stephen, one of the rescued men, explained the ordeal-

An agent in Mangalore offered him a seemingly legitimate IT job in Cambodia. 

Stephen and his companions were tricked with fake tourist visas and deceptive interviews.

“We had to create fake social media accounts with photographs of women sourced from different platforms. But we were told to be careful while picking these photos. So a South Indian girl’s profile would be used to trap someone in the North so that it did not raise any suspicion. We had targets and if we didn’t meet those, they would not give us food or allow us into our rooms. Finally, after a month and a half, I contacted my family and they took the help of some local politicians to speak to the embassy,” said, Stephen.

Rourkela Sub Divisional Police Officer Upasana Padhi explained the agents’ tactics. 

They lured men with job prospects and then forced them to work for fraudulent companies upon arrival.

Passports were confiscated, and victims were subjected to 12-hour workdays under the threat of violence.  

Authorities are actively identifying and working to repatriate more victims.

Padhi revealed details of the scams, which also involved cryptocurrency and fake stock investments facilitated by fraudulent online platforms.

The Ministry of External Affairs (MEA) addressed media inquiries concerning Indian nationals facing difficulties in Cambodia. Spokesperson Shri Randhir Jaiswal provided a statement

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.


[ad_2]
Source link