Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern

Microsoft engineers have introduced an AI (artificial intelligence) model for text-to-speech called VALL-E. It is able to imitate a human voice, relying only on a three-second sound sample. The developers claim that VALL-E can synthesize audio, where the “learned” voice says something, while retaining even the emotional coloring. You might also be interested in our… Continue reading Microsoft’s VALL-E AI Is Able to Imitate a Human Voice in a Three-Second Pattern

Hackers Bypass CAPTCHA on GitHub to Automate Account Creation

The South African hack group Automated Libra is looking for new approaches to use the resources of cloud platforms for cryptocurrency mining: hackers bypass CAPTCHA on GitHub. Let me remind you that we also wrote that Hackers force users to solve CAPTCHA, and also that New hCaptcha bypass method may not affect Cloudflare’s security. According… Continue reading Hackers Bypass CAPTCHA on GitHub to Automate Account Creation

Hackers compromised Slack private GitHub repositories

On December 31, while everyone was celebrating the New Year, Salesforce, the company behind the development of the corporate Slack messenger, published a message about the incident of compromising Slack repositories on GitHub. Let me remind you that recently MI also wrote that Slack Is Resetting User Passwords Due to a Bug, and also that… Continue reading Hackers compromised Slack private GitHub repositories

Android Devices Can Be Monitored Using Motion Sensors

A group of scientists from five American universities has developed a side-channel EarSpy attack that can be used to eavesdrop on Android devices: recognize the gender and identity of the caller, and also partially parse the contents of the conversation. Eavesdrop can be carried out using motion sensors that are able to capture the reverberation… Continue reading Android Devices Can Be Monitored Using Motion Sensors

Hackers Use Excel Add-Ins as Initial Penetration Vector

Cisco Talos analysts say that hackers are now using Excel add-ins to infiltrate victims’ systems and networks. After Microsoft began blocking VBA macros in Office documents downloaded from the Internet (marked as Mark Of The Web), attackers had to rethink their attack chains: for example, now hackers are increasingly using Excel add-in files (.XLL) as… Continue reading Hackers Use Excel Add-Ins as Initial Penetration Vector

Hackers Are Misusing Google Ads to Spread Malware

Malware operators and other hackers are increasingly abusing Google Ads to distribute malware to users who are looking for popular software. So, you can encounter malicious ads when searching for Grammarly, MSI Afterburner, Slack, Dashlane, Malwarebytes, Audacity, μTorrent, OBS, Ring, AnyDesk, Libre Office, Teamviewer, Thunderbird, and Brave. Let me remind you that we also wrote… Continue reading Hackers Are Misusing Google Ads to Spread Malware

Hackers Stole Data from the LastPass Use Password Vault

LastPass password manager developers have reported that hackers who recently broke into the company’s cloud storage have accessed it and stolen customer data, including password vaults that could now theoretically be hacked. Let me remind you that the compromise of the company’s cloud storage became known earlier this month. It is noteworthy that for this… Continue reading Hackers Stole Data from the LastPass Use Password Vault

Raspberry Robin Worm Uses Fake Malware to Trick Security Researchers

The Raspberry Robin worm uses new tactics to evade detection and seeks to confuse security experts if it runs in a sandbox or notices debugging tools. To do this, the malware uses fake payloads, Trend Micro experts say. Let me remind you that Raspberry Robin is a dropper that has the functionality of a worm,… Continue reading Raspberry Robin Worm Uses Fake Malware to Trick Security Researchers

Hackers Attack Ukrainian Organizations through Malicious Windows 10 Installers

Mandiant experts reported that Ukrainian government agencies are suffering from attacks using malicious Trojanized Windows 10 installers, as victims download malicious ISO files from Ukrainian and Russian-language torrent trackers (including Toloka and RuTracker). Let me remind you that we also wrote that TrickBot Hack Group Systematically Attacks Ukraine, and also that Microsoft Accuses Russia of… Continue reading Hackers Attack Ukrainian Organizations through Malicious Windows 10 Installers

GoTrim Malware Hacks WordPress Sites

Fortinet specialists have discovered a new GoTrim malware written in Go that scans the Internet for WordPress sites and brute-forces them by guessing the administrator password. Such attacks can lead to the deployment of malware, the introduction of scripts on websites to steal bank cards, the placement of phishing pages, and other attack scenarios that… Continue reading GoTrim Malware Hacks WordPress Sites