Google’s Gemma Model Helps Uncover Promising Cancer Therapy Pathway

source: eweek.com  |  image: pexels.com

In a world where we ask artificial intelligence to summarize articles and create images, scientists have now tasked an AI with a much bigger challenge: finding a new way to fight cancer. And it just delivered a promising lead.

Google, on October 15, announced a major scientific milestone: an AI model from its Gemma family has helped uncover a potential new way to treat cancer.

In collaboration with Yale University, researchers at Google DeepMind and Google Research developed Cell2Sentence-Scale 27B (C2S-Scale), a massive 27 billion parameter AI model designed to understand the “language” of individual cells. Continue reading “Google’s Gemma Model Helps Uncover Promising Cancer Therapy Pathway”

A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones

source: wired.com  |  image: pexels.com

The malicious app required to make a “Pixnapping” attack work requires no permissions.

ANDROID DEVICES ARE vulnerable to a new attack that can covertly steal two-factor authentication codes, location timelines, and other private data in less than 30 seconds.

The new attack, named Pixnapping by the team of academic researchers who devised it, requires a victim to first install a malicious app on an Android phone or tablet. The app, which requires no system permissions, can then effectively read data that any other installed app displays on the screen. Pixnapping has been demonstrated on Google Pixel phones and the Samsung Galaxy S25 phone and likely could be modified to work on other models with additional work. Google released mitigations last month, but the researchers said a modified version of the attack works even when the update is installed.

Continue reading “A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones”

Groundbreaking Gene Therapy Slows Huntington’s Disease for the First Time

 

source: nicenews.com  |  image:  pexels.com

 

It doesn’t get more “nice news” than this: In a historic medical first, a pioneering gene therapy successfully slowed the progression of Huntington’s disease by 75% in a clinical trial. The breakthrough offers new hope for the tens of thousands living with the devastating hereditary condition, which progressively destroys brain cells and impairs movement, cognition, and behavior — and until now, there was no treatment capable of slowing or halting its advance.
Continue reading “Groundbreaking Gene Therapy…”

Self-Replicating Worm Hits 180+ Software Packages

source: krebsonsecurity.com  |  image: pexels.com

 

At least 187 code packages made available through the JavaScript repository NPM have been infected with a self-replicating worm that steals credentials from developers and publishes those secrets on GitHub, experts warn. The malware, which briefly infected multiple code packages from the security vendor CrowdStrike, steals and publishes even more credentials every time an infected package is installed.

The novel malware strain is being dubbed Shai-Hulud — after the name for the giant sandworms in Frank Herbert’s Dune novel series — because it publishes any stolen credentials in a new public GitHub repository that includes the name “Shai-Hulud.”

“When a developer installs a compromised package, the malware will look for a npm token in the environment,” said Charlie Eriksen, a researcher for the Belgian security firm Aikido. “If it finds it, it will modify the 20 most popular packages that the npm token has access to, copying itself into the package, and publishing a new version.”

At the center of this developing maelstrom are code libraries available on NPM (short for “Node Package Manager”), which acts as a central hub for JavaScript development and provides the latest updates to widely-used JavaScript components.

The Shai-Hulud worm emerged just days after unknown attackers launched a broad phishing campaignthat spoofed NPM and asked developers to “update” their multi-factor authentication login options. That attack led to malware being inserted into at least two-dozen NPM code packages, but the outbreak was quickly contained and was narrowly focused on siphoning cryptocurrency payments.

Image: aikido.dev

In late August, another compromise of an NPM developer resulted in malware being added to “nx,” an open-source code development toolkit with as many as six million weekly downloads. In the nx compromise, the attackers introduced code that scoured the user’s device for authentication tokens from programmer destinations like GitHub and NPM, as well as SSH and API keys. But instead of sending those stolen credentials to a central server controlled by the attackers, the malicious nx code created a new public repository in the victim’s GitHub account, and published the stolen data there for all the world to see and download. Continue reading “Self-Replicating Worm Hits 180+ Software Packages”

Dark Web Threats Put Bullseye on US Businesses

source: technewsworld.com  |  image: pexels.com

 

When it comes to threats from the dark web, the U.S. is a prime target.

A new report by threat intelligence company SOCRadar found that more than four out of five (82%) threats from the dark web aimed at North America targeted the United States over the last 12 months. “The high percentage in the United States suggests a larger digital footprint and more attractive targets,” the report noted.

The 26-page report also found that Uncle Sam is a popular target for ransomware extortionists, with 88% of those attacks aimed at U.S.-based organizations. “High-value businesses, extensive digital networks, and larger financial opportunities likely attract attackers to the U.S. market,” it reasoned.

While Canada (9.7%) and Mexico (1.8%) were targeted substantially less, the report warned, “All countries must stay vigilant and actively strengthen cybersecurity defenses against ransomware threats.” Continue reading “Dark Web Threats Put Bullseye on US Businesses”

A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users

source: wired.com  |  image: dhs.gov

A misconfigured platform used by the Department of Homeland Security left national security information—including some related to the surveillance of Americans—accessible to thousands of people.

THE DEPARTMENT OF Homeland Security’s mandate to carry out domestic surveillance has been a concern for privacy advocates since the organization was first created in the wake of the September 11 attacks. Now a data leak affecting the DHS’s intelligence arm has shed light not just on how the department gathers and stores that sensitive information—including about its surveillance of Americans—but on how it once left that data exposed to thousands of government and private sector workers and even foreign nationals who were never authorized to see it. Continue reading “A DHS Data Hub Exposed Sensitive Intel to Thousands of Unauthorized Users”

No Time for Cybersecurity Complacency in 2025

source: cyberdefensemagazine.com  |  image: pexels.com

post-coronavirus has only made it a more difficult task for your brain to keep track of all of your various passwords, so it’s time to consider a password manager, if you don’t already have one to handle your business. A password manager will allow you to oversee and handle the login credentials of all your devices, auto-fill forms in your web browsers, and sync your data across Macs and Windows PCs, iPhones ($699 at Apple), iPads ($419 at eBay), Android phones, and more.

FBI Shares Tips to Spot Fake Lawyer Schemes Targeting Crypto Scam Victims

source: infosecurity-magazine.com | image: fbi.gov

 

The FBI has updated its alert about fake lawyers defrauding victims of cryptocurrency scams, adding due diligence measures to help victims.

The FBI’s Internet Crime Complaint Center (IC3) has previously warned that fraudsters were posing as lawyers from fictitious law firms and using social media and messaging services to defraud victims of cryptocurrency scams.

In this sophisticated scheme, the malicious actors target vulnerable populations, particularly the elderly, and offer to recover funds from a previous scam but instead steal personal information and sometimes money from them. Continue reading “FBI Shares Tips to Spot Fake Lawyer Schemes Targeting Crypto Scam Victims”

Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds

source: wired.com (contributed by Artemus founder, Bob Wallace)  |  Image: pixabay.com

 

Security researchers found two techniques to crack at least eight brands of electronic safes—used to secure everything from guns to narcotics—that are sold with Securam Prologic locks.

 

About two years ago, security researchers James Rowley and Mark Omo got curious about a scandal in the world of electronic safes: Liberty Safe, which markets itself as “America’s #1 heavy-duty home and gun safe manufacturer,” had apparently given the FBI a code that allowed agents to open a criminal suspect’s safe in response to a warrant related to the January 6, 2021, invasion of the US Capitol building.

Politics aside, Rowley and Omo were taken aback to read that it was so easy for law enforcement to penetrate a locked metal box—not even an internet-connected device—that no one but the owner ought to have the code to open. “How is it possible that there’s this physical security product, and somebody else has the keys to the kingdom?” Omo asks. Continue reading “Hackers Went Looking for a Backdoor in High-Security Safes…”

AI Data Centers Are Massive, Energy-Hungry and Headed Your Way

source: cnet.com  | image: pixabay.com

 

Behind your ChatGPT and Gemini queries, there’s a land grab happening to keep up the fevered pace of gen AI’s growth. The consequences are significant.

 

From the outside, this nondescript building in Piscataway, New Jersey, looks like a standard corporate office surrounded by lookalike buildings. Even when I walk through the second set of double doors with a visitor badge slung around my neck, it still feels like I’ll soon find cubicles, water coolers and light office chatter.

Instead, it’s one brightly lit server hall after another, each with slightly different characteristics, but all with one thing in common — a constant humming of power. 

The first area I see has white tiled floors and rows of 7-foot-high server racks protected by black metal cages. Inside the cage structure, I feel cool air rushing from the floor toward the servers to prevent overheating. The wind muffles my tour guide’s voice, and I have to shout over the noise for him to hear me. 

Continue reading “AI Data Centers Are Massive, Energy-Hungry and Headed Your Way”