Showing posts with label trojan. Show all posts
Showing posts with label trojan. Show all posts

Daily Tech Digest - May 10, 2026


Quote for the day:

"Disengagement is a failure of biology — not motivation. Our brains are hardwired to avoid anything we think will fail. Change the environment. The biology follows." -- Gordon Tredgold

🎧 Listen to this digest on YouTube Music

▶ Play Audio Digest

Duration: 14 mins • Perfect for listening on the go.


Intent-based chaos testing is designed for when AI behaves confidently — and wrongly

The VentureBeat article by Sayali Patil addresses a critical reliability gap in autonomous AI systems, where agents often perform with high confidence but produce fundamentally incorrect outcomes. Traditional observability metrics like uptime and latency fail to capture these silent failures because the systems appear operationally healthy while being behaviorally compromised. To combat this, Patil introduces intent-based chaos testing, a framework focused on measuring deviation from intended behavioral boundaries rather than simple success or failure. Central to this approach is the intent deviation score, which quantifies how far an agent's actions drift from its baseline purpose. The testing methodology follows a rigorous four-phase structure: starting with single tool degradation to test adaptation, followed by context poisoning to challenge data integrity and escalation logic. The third phase examines multi-agent interference to surface emergent conflicts from overlapping autonomous entities, while the final phase utilizes composite failures to simulate the complex entropy of actual production environments. By intentionally injecting chaos into behavioral logic rather than just infrastructure, enterprise architects can identify dangerous blast radii before deployment. This paradigm shift ensures that AI agents remain aligned with human intent even when facing real-world unpredictability, ultimately transforming how organizations validate the trustworthiness and safety of their sophisticated, agentic AI infrastructure.


Unlocking Cloud Modernization: Strategies Every CIO Needs for Agility, Security, and Scale

The article "Unlocking Cloud Modernization: Strategies Every CIO Needs for Agility, Security, and Scale" emphasizes that in 2026, cloud modernization has transitioned from a secondary long-term goal to a critical business priority. As enterprises accelerate their adoption of artificial intelligence and data automation, traditional IT infrastructures often struggle to provide the necessary speed, scalability, and operational resilience. To address these mounting limitations, CIOs are urged to implement strategic transformation roadmaps that reshape legacy environments into agile, secure, and AI-ready ecosystems. Key strategies highlighted include adopting hybrid and multi-cloud architectures to avoid vendor lock-in, incrementally modernizing legacy applications through containerization, and strengthening security via Zero Trust models. Furthermore, the article stresses the importance of automating complex operations using Infrastructure as Code and optimizing expenditures through FinOps practices. Effective modernization not only reduces technical debt and infrastructure complexity but also significantly enhances innovation cycles. By prioritizing business-aligned strategies and building AI-supporting architectures, organizations can better respond to market shifts and deliver superior digital experiences to customers. Ultimately, a phased approach allows leaders to balance innovation with stability, ensuring that modernization supports long-term digital growth while maintaining robust governance across increasingly distributed and multi-faceted cloud environments.


The CIO succession gap nobody admits

In the insightful article "The CIO succession gap nobody admits," Scott Smeester explores a critical leadership crisis where many seasoned CIOs find themselves unable to leave their roles because they lack a viable internal successor. This "succession gap" primarily stems from the "architect trap," where CIOs promote deputies based on technical brilliance and operational reliability rather than the requisite executive leadership skills. Consequently, these trusted deputies often excel at managing complex platforms but struggle with broader P&L ownership, boardroom politics, and high-stakes financial negotiations. To bridge this divide, Smeester proposes three proactive design choices for modern IT leadership. First, CIOs should grant deputies authority over specific decision domains, such as vendor escalations, to build genuine professional judgment. Second, they must stop shielding high-potential talent from conflict, allowing them to defend budgets and strategies against peer executives. Finally, the board must be introduced to these deputies early through substantive presentations to build credibility long before a vacancy occurs. Failing to address this gap results in stalled digital transformations, expensive external hires, and the loss of talented staff who feel overlooked. Ultimately, a true succession plan is not just a list of names but a deliberate developmental pipeline that prepares future leaders to step into the boardroom with confidence and authority.


Cyber Regulation Made Us More Auditable. Did It Make Us More Defensible?

In his article, Thian Chin explores the critical disconnect between cybersecurity auditability and actual defensibility, arguing that while decades of regulation and frameworks like ISO 27001 have successfully "raised the floor" for organizational governance, they have failed to guarantee operational resilience. Chin highlights a systemic issue where the industry prioritizes documenting the existence of controls over verifying their effectiveness against real-world adversaries. Evidence from threat-led testing programs like the Bank of England’s CBEST reveals that even heavily supervised financial institutions often succumb to foundational hygiene failures, such as unpatched systems and weak identity management, despite being certified as compliant. This gap persists because traditional assurance models reward countable artifacts rather than actual security outcomes, leading to "audit fatigue" and a false sense of safety. To address this, Chin advocates for a transition toward outcome-based and threat-informed regulatory architectures, such as the UK’s Cyber Assessment Framework (CAF) and the EU’s DORA. These modern approaches treat certification merely as a baseline rather than the ultimate proof of security. Ultimately, the article challenges practitioners and regulators to stop confusing the documentation of a control with the successful defense of a system, insisting that future cyber regulation must demand rigorous evidence that security measures can withstand genuine adversarial pressure.


TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms

TCLBANKER is a sophisticated Brazilian banking trojan recently identified by Elastic Security Labs, representing a significant evolution of the Maverick and SORVEPOTEL malware families. Targeting approximately 59 financial, fintech, and cryptocurrency platforms, the malware is primarily distributed via trojanized MSI installers disguised as legitimate Logitech software through DLL side-loading techniques. At its core, the threat employs a multi-modular architecture featuring a full-featured banking trojan and a self-propagating worm component. The banking module monitors browser activities using UI Automation to detect financial sessions, while the worm leverages hijacked WhatsApp Web sessions and Microsoft Outlook accounts to spread malicious payloads to thousands of contacts. This distribution model is particularly effective as it originates from trusted accounts, bypassing traditional email gateways and reputation-based security defenses. Furthermore, TCLBANKER exhibits advanced anti-analysis techniques, including environment-gated decryption that ensures the payload only executes on systems matching specific Brazilian locale fingerprints. If analysis tools or debuggers are detected, the malware fails to decrypt, effectively shielding its operations from security researchers. By utilizing real-time social engineering through WPF-based full-screen overlays and WebSocket-driven command loops, the operators can manipulate victims and facilitate fraudulent transactions while remaining hidden. This maturation of Brazilian crimeware highlights a growing trend of adopting sophisticated techniques once reserved for advanced persistent threats.


The Best Risk Mitigation Strategy in Data? A Single Source of Truth

Jeremy Arendt’s article on O’Reilly Radar posits that establishing a "Single Source of Truth" (SSOT) serves as the preeminent strategy for mitigating modern organizational data risks. In today’s increasingly complex digital landscape, information is frequently scattered across disparate systems, creating isolated data silos that foster inconsistency, internal friction, and "multiple versions of reality." Arendt argues that these silos introduce significant operational and strategic hazards, as different departments often rely on conflicting metrics to drive their decision-making processes. By implementing an SSOT, organizations can ensure that every stakeholder accesses a unified, high-fidelity dataset, effectively eliminating discrepancies that undermine executive trust. This centralization is not merely a storage solution; it is a fundamental governance framework that simplifies regulatory compliance, enhances cybersecurity, and guarantees long-term data integrity. Furthermore, a single source of truth serves as a critical prerequisite for successful artificial intelligence and machine learning initiatives, providing the reliable, high-quality data foundation necessary for accurate model training and deployment. Ultimately, this architectural approach reduces technical debt and operational overhead while fostering a corporate culture of transparency. By prioritizing a consolidated data platform, companies can shield themselves from the financial and reputational dangers of misinformation, ensuring their strategic maneuvers are grounded in verified facts rather than fragmented interpretations.


Boards Are Falling Short on Cybersecurity

The article "Boards Are Falling Short on Cybersecurity" examines why corporate boards, despite increased investment and focus, are struggling to effectively govern and mitigate cyber risks. According to the research, which includes interviews with over 75 directors, three primary factors drive this deficiency. First, there is a pervasive lack of cybersecurity expertise among board members; a study revealed that only a tiny fraction of directors on cybersecurity committees possess formal training or relevant practical experience. Second, while boards are enthusiastic about artificial intelligence, their conversations typically prioritize strategic gains like operational efficiency while neglecting the significant security vulnerabilities AI introduces, such as automated malware generation. Third, boards often conflate regulatory compliance with actual security, spending excessive time on box checking and dashboards that offer marginal value in protecting against sophisticated threats. To address these gaps, the authors suggest that boards must shift from a reactive to a proactive stance, integrating cybersecurity into the very foundation of product development and brand strategy. By treating security as a core business driver rather than a back-office bureaucratic hurdle, organizations can better protect their reputations and operational integrity in an era where cybercrime losses continue to escalate sharply year over year. Finally, the authors emphasize that FBI data reveals a surge in losses, underscoring the need for improved oversight.


Giving Up Should Never Be An Option: Why Persistence Is The Ultimate Key To Success

The article "Giving Up Should Never Be An Option: Why Persistence Is The Ultimate Key To Success" centers on a transformative personal narrative that illustrates the critical role of endurance in achieving professional milestones. The author recounts a grueling experience as a door-to-door salesperson, facing six consecutive days of rejection and failure amidst harsh, snowy conditions. Rather than yielding to the urge to quit, the author approached the seventh day with renewed focus and a meticulously planned strategy. After knocking on nearly one hundred doors without success, the final attempt of the evening resulted in a breakthrough sale that fundamentally shifted their career trajectory. This pivotal moment proved that persistence, rather than raw talent alone, acts as the ultimate catalyst for progress. The experience served as a foundational training ground, eventually leading to rapid promotions, increased confidence, and significant corporate benefits. By reflecting on this "seventh day," the author argues that many individuals abandon their goals when they are mere inches away from a breakthrough. The core message serves as a powerful mantra for modern business leaders: success becomes an inevitability when one commits unwavering belief and effort to their objectives, especially when circumstances are at their absolute worst.


Anthropic's Claude Mythos: how can security leaders prepare?

Anthropic’s release of the Claude Mythos Preview System Card has signaled a transformative shift in the cybersecurity landscape, compelling security leaders to rethink their defensive strategies. This advanced AI model demonstrates a sophisticated ability to autonomously identify software vulnerabilities and develop exploit chains, significantly lowering the barrier for cyberattacks. According to the article, the cost of weaponizing exploits has plummeted to mere dollars, while the timeline from discovery to exploitation has collapsed from days to hours. To prepare for this accelerated threat environment, Melissa Bischoping argues that security professionals must prioritize wall-to-wall visibility across all cloud, on-premise, and remote endpoints. The piece emphasizes that manual remediation workflows are no longer sufficient; instead, organizations should adopt real-time threat exposure management and maintain continuous, SBOM-grade inventories to keep pace with AI-driven discovery cycles. Furthermore, the summary underscores that while Mythos enhances offensive capabilities, traditional hygiene—specifically the "Essential Eight" controls like multi-factor authentication and rigorous patching—remains effective against even the most powerful frontier models if implemented with precision. Ultimately, the article serves as a call to action for leaders to close the exposure-to-remediation loop before adversaries can leverage AI to exploit emerging zero-day vulnerabilities, shifting from predictive models to real-time verification and rapid response.


How the evolution of blockchain is changing our ideas about trust

The article "How the evolution of blockchain is changing our ideas about trust" by Viraj Nair explores the transformation of trust mechanisms from the 2008 financial crisis to the modern era. Initially, Satoshi Nakamoto’s Bitcoin white paper introduced a radical alternative to failing central institutions by engineering trust through a "proof of work" consensus model, which favored decentralized network validation over delegated institutional authority. However, this first generation was energy-intensive, leading to a second evolution: "proof of stake." Popularized by Ethereum’s 2022 transition, this model drastically reduced energy consumption but shifted influence toward asset ownership. A third phase, "proof of authority," has since emerged, utilizing pre-approved, reputable validators to prioritize speed and accountability for real-world applications like supply chains and government transactions in Brazil and the UAE. Far from eliminating the need for trust, blockchain technology has reconfigured it into a more nuanced framework. While it began as a way to bypass traditional intermediaries, its current trajectory suggests a hybrid future where trust is distributed across a collaborative ecosystem of banks, technology firms, and governments. Ultimately, the evolution of blockchain demonstrates that while the methods of verification change, the fundamental necessity of trust remains, now bolstered by unprecedented traceability and auditability.

Daily Tech Digest - September 13, 2024

AI can change belief in conspiracy theories, study finds

“Our findings fundamentally challenge the view that evidence and arguments are of little use once someone has ‘gone down the rabbit hole’ and come to believe a conspiracy theory,” the team wrote. Crucially, the researchers said, the approach relies on an AI system that can draw on a vast array of information to produce conversations that encourage critical thinking and provide bespoke, fact-based counterarguments. ... “About one in four people who began the experiment believing a conspiracy theory came out the other end without that belief,” said Costello. “In most cases, the AI can only chip away – making people a bit more sceptical and uncertain – but a select few were disabused of their conspiracy entirely.” The researchers added that reducing belief in one conspiracy theory appeared to reduce participants’ belief in other such ideas, at least to a small degree, while the approach could have applications in the real world – for example, AI could reply to posts relating to conspiracy theories on social media. Prof Sander van der Linden of the University of Cambridge, who was not involved in the work, questioned whether people would engage with such AI voluntarily in the real world.


Does Value Stream Management Really Work?

Value stream management is indeed working when it is approached holistically by integrating the framework with technology and people. By mapping and optimizing every step in the customer journey, companies can eliminate waste, create efficiency and ultimately deliver sought after value to customers. The key lies in continuous improvement and stakeholder engagement throughout the value stream, ensuring alignment and commitment to delivering responsiveness and quality to customer needs, according to Saraha Burnett, chief operations officer at full service digital experience and engineering firm TMG. “Value stream management is indeed working when it is approached holistically by integrating the framework with technology and people. By mapping and optimizing every step in the customer journey, companies can eliminate waste, create efficiency and ultimately deliver sought after value to customers,” says Burnett in an email interview. “The key lies in continuous improvement and stakeholder engagement throughout the value stream, ensuring alignment and commitment to delivering responsiveness and quality to customer needs.”


Digital ID hackathons to explore real-world use cases

The hackathons aim to address the cold start program by involving verifiers to facilitate the widespread adoption of mDLs. In this context, the cold start program refers to a marketplace that relies on identity holders and verifiers. The primary focus of the hackathon will be on building minimum viable products (MVPs) that showcase the functionality of the solution. These MVPs will enable participants to test real-world use cases for mDLs. The digital version of California driver’s licenses has a variety of potential uses, according to the OpenID Foundation, including facilitating TSA security checks at airport security checkpoints, verifying age for purchasing age-restricted items, accessing DMV websites online, and using for peer-to-peer identification purposes. For the hackathon, the California DMV will issue mDLs in two formats: the ISO 18013-5 standard and the W3C Verifiable Credentials v1.1 specification. The dual issuance provides verifiers with the flexibility to choose the verification method that best aligns with their system requirements, the foundation says. Christopher Goh, the national harmonization lead for digital identity at Austroads, has written a one-pager discussing the various standards within the ISO/IEC 180130-5 framework specifically related to mDL.


Microsoft VS Code Undermined in Asian Spy Attack

"While the abuse of VSCode is concerning, in our opinion, it is not a vulnerability," Assaf Dahan, director of threat research for Unit 42, clarifies. Instead, he says, "It's a legitimate feature that was abused by threat actors, as often happens with many legitimate software." And there are a number of ways organizations can protect against a bring-your-own-VSCode attack. Besides hunting for indicators of compromise (IoCs), he says, "It's also important to consider whether the organization would want to limit or block the use of VSCode on endpoints of employees that are not developers or do not require the use of this specific app. That can reduce the attack surface." "Lastly, consider limiting access to the VSCode tunnel domains '.tunnels.api.visualstudio[.]com' or '.devtunnels[.]ms' to users with a valid business requirement. Notice that these domains are legitimate and are not malicious, but limiting access to them will prevent the feature from working properly and consequently make it less attractive for threat actors," he adds.


Rather Than Managing Your Time, Consider Managing Your Energy

“Achievement is no longer enough to be successful,” Sunderland says. “People also want to feel happy at the same time. Before, people were concerned only with thinking (mental energy) and doing (physical energy). But that success formula no longer works. Today, it’s essential to add feelings (emotional energy) and inner self-experience (spiritual energy) into the mix for people to learn how to be able to connect to and manage their energy.” ... Sunderland says all forms of human energy exist in relation to one another. “When these energies are in sync with each other, people’s energy will be in flow. People who maintain good health will be able to track those feelings (emotional energy) that flow through their bodies (physical energy), which is an essential skill to help increase energy awareness. With greater levels of energy awareness, people can grow their self-acceptance (emotional energy), which enhances their self-confidence.” He says that as confidence builds, people experience greater clarity of thought (mental energy) and they are able to increase their ability to speak truth (spiritual energy), amplifying their creative energy. 


Mastercard Enhances Real-Time Threat Visibility With Recorded Future Purchase

The payments network has made billions of dollars worth of acquisitions through the years. Within the security solutions segment of Mastercard, key focal points center on examining and protecting digital identities, protecting transactions and using insights from 143 billion annual payments to fashion real-time intelligence that can be used by merchants and FIs to anticipate new threats. By way of example, the firm acquired Ekarta in 2021 to score transactions for the likelihood of fraud through robust identity verification. All told, Mastercard has invested more than $7 billion over the past five years in its efforts to protect the digital economy. Artificial intelligence (AI) is a key ingredient here, and Gerber detailed to PYMNTS that the company has been a pioneer in harnessing generative AI to extract trends from huge swaths of data to create “identity graphs” that provide immediate value to any merchant or FI that wants to understand more about the individuals that’s interacting with them in the digital realm. The use of other “intelligence graphs” connects the dots across data points to turn threat-related data into actionable insights.


2 Open Source AI Tools That Reduce DevOps Friction

DevOps has been built upon taking everything infrastructure and transitioning it to code, aka Infrastructure as Code (IaC). This includes deployment pipelines, monitoring, repositories — anything that is built upon configurations can be represented in code. This is where AI tools like ChatGPT and AIaC come into play. AIaC, an open source command-line interface (CLI) tool, enables developers to generate IaC templates, shell scripts and more, directly from the terminal using natural language prompts. This eliminates the need to manually write and review code, making the process faster and less error-prone. ... The use of AI in DevOps is still in its early stages, but it’s quickly gaining momentum with the introduction of new open source and commercial services. The rapid pace of innovation suggests that AI will soon be embedded in most DevOps tools. From automated code generation with AIaC to advanced diagnostics with K8sGPT, the possibilities seem endless. Firefly is not just observing this revolution — it’s actively contributing to it. By integrating AI into DevOps workflows, teams can work smarter, not harder. 


How to make Infrastructure as Code secure by default

Scanning IaC templates before deployment is undeniably important; it’s an effective way to identify potential security issues early in the development process. It can help prevent security breaches and ensure that your cloud infrastructure aligns with security best practices. If you have IaC scanning tools integrated into your CI/CD pipelines, you can also run automated scans with each code commit or pull request, catching errors early. Post-deployment scans are important because they assess the infrastructure in its operational environment, which may result in finding issues that weren’t identified in dev and test environments. These scans may also identify unexpected dependencies or conflicts between resources. Any manual fixes you make to address these problems will also require you to update your existing IaC templates, otherwise any apps using those templates will be deployed with the same issues baked in. And while identifying these issues in production environments is important to overall security, it can also increase your costs and require your team to apply manual fixes to both the application and the IaC.


New brain-on-a-chip platform to deliver 460x efficiency boost for AI tasks

Despite its novel approach, IISc’s platform is designed to work alongside existing AI hardware, rather than replace it. Neuromorphic accelerators like the one developed by IISc are particularly well-suited for offloading tasks that involve repetitive matrix multiplication — a common operation in AI. “GPUs and TPUs, which are digital, are great for certain tasks, but our platform can take over when it comes to matrix multiplication. This allows for a major speed boost,” explained Goswami. ... As the demand for more advanced AI models increases, existing digital systems are nearing their energy and performance limits. Silicon-based processors, which have driven AI advancements for years, are starting to show diminishing returns in terms of speed and efficiency. “With silicon electronics reaching saturation, designing brain-inspired accelerators that can work alongside silicon chips to deliver faster, more efficient AI is becoming crucial,” Goswami noted. By working with molecular films and analog computing, IISc is offering a new path forward for AI hardware, one that could dramatically cut energy consumption while boosting computational power.


Android Trojans Still Pose a Threat, Researchers Warn

Affected users appear to have been tricked into installing the malware, which doesn't appear to be getting distributed via official Google channels. "Based on our current detections, no apps containing this malware are found on Google Play," a Google spokesperson told Information Security Media Group.* "Android users are automatically protected against known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services," the spokesperson said. "Google Play Protect can warn users or block apps known to exhibit malicious behavior, even when those apps come from sources outside of Play."* Researchers said they first spotted the malware when it was uploaded to analysis site VirusTotal in May from Uzbekistan, in the form of a malicious app made to appear as if it was developed by a "local tax authority." By tracing the IP address to which the malware attempted to "phone home" the researchers found other .apk - Android package - files that showed similar behavior, which they traced to attacks that began by November 2023.



Quote for the day:

"Sometimes it takes a good fall to really know where you stand." -- Hayley Williams