Welcome to the latest copy of Pardon The Intrusion, TNW’s bi-weekly newsletter in which we analyze the wild world of security.

AI is now being used in a huge number of novel applications, from audition cancer to advising what to binge watch over the weekend.

Sadly, as with other confusing technologies, it’s also being abolished — and right now, AI is allowance to target malware at YOU. It’s also more being co-opted by abyss to power their dangerous campaigns and added their evil agendas.

It turns out what’s useful for one side can be exploited by the other. These abhorrent cybersecurity tools have bound become powerful weapons for both the good and bad guys.


And as recent analysis in AI malware has shown, contagion apparatus acquirements models with awful inputs — an active analysis area called adversarial apparatus learning — has some austere after-effects for cybersecurity and privacy.

Imagine a spam-filtering-machine-learning system that flags exceptionable messages. If an antagonist keeps agriculture awful data into the system, it can lead to false positives and false negatives over time, apprehension it unusable.

It’s accordingly capital that ML models are accomplished with accessible adversarial inputs during training and advantage techniques like generative adversarial networksdifferential privacy, and homomorphic encryption to ensure acquaintance and integrity.

Ultimately, if we’re going to trust AI to do their jobs, we also need to be accurate and ensure they’re doing it the right way.

Now, onto more aegis news.

What’s trending in security?

  • Google teamed up with tech industry ally to launch OpenTitan, an open source root of trust (RoT) activity to strengthen chip security. [Google Aegis Blog]
  • User passwords of recently breached NordVPN were apparent in mass credential-stuffing attacks. [Ars Technica]
  • Chris Hylen ancient as the chief controlling of cybersecurity firm Imperva, two months after disclosing a data breach. [CyberScoop]
  • Maze ransomware was found targeting Italian users by assuming to be the country’s Tax and Revenue Agency and ambitious as much as $1,200 to break the files. [Bleeping Computer]


  • The FBI issued a admonishing about e-skimming — aka Magecart attacks — that involves hackers compromising a company’s online store to silently steal acquittal card advice from users while making purchases on the adulterated site. [FBI]
  • This new alternative of the “Remcos” trojan sends phishing emails that tricks victims into aperture a awful ZIP file which installs data-stealing malware. [Fortinet]
  • UniCredit appear a data breach involving the claimed annal of 3 actor calm clients, making it the third aegis adventure at Italy’s top bank in 4 years. [Reuters]
  • Michael Gillespie is the ransomware hero we deserve. [ProPublica]
  • A contour of cybersecurity firm Tiversa, whose CEO Robert Boback is facing federal accuse for falsifying affirmation about data breaches to extort clients. [The New Yorker]
  • Several accepted “camgirl” sites apparent millions of sex workers and users after their owner, VTS Media, left the back-end database unprotected. [TechCrunch]
  • This new Chinese bad actor — dubbed “Calypso” — is targeting governmental institutions in Brazil, India, Kazakhstan, Russia, Thailand, and Turkey to steal arcane data. [Positive Technologies]


  • Google patched an Android bug that can let hackers spread malware to a nearby phone via NFC beaming. [ZDNet]
  • A new alternative of Gafgyt malware has been found base known vulnerabilities in Wi-Fi routers to recruit the accessories into botnets to attack gaming servers. [Palo Alto Networks]
  • WIRED’s Andy Greenberg takes a deep dive into the rise of “Sandworm,” a alarming Kremlin hacking group behind the Ukraine NotPetya attacks and the cyberwar on the Pyeongchang Olympics. [WIRED]
  • Kaspersky advisers found a new threat group called “DarkUniverse” that has gone silent after the 2017 Shadow Brokers leak. This dump independent a accumulating of exploits and hacking tools — including a malware scanner that NSA hackers used to scan adulterated computers for other threat groups. [Kaspersky]

Data Point

New statistics published by antivirus maker Emsisoft have revealed Indonesia, India, the US, Brazil, and Korea to be the most accepted targets common for ransomware attacks. Indonesia, India, and Brazil alone account for 45.3% of all infections.


 You don’t need to be a genius to figure out that this is a alarming trend. Emerging markets like India, Indonesia, and Brazil have witnessed an atomic agenda growth. These countries also lack able basement to accomplish acrimonious aegis controls to aegis businesses from ransomware threats. Auditing aegis strategies and implementing a sound accretion plan is the key.

Tweet of the week


Breach from the past

These days, it’s easy for a computer virus to spread bound because… internet. All you need to do is click on a awful link, or download some shady software.

But back in the 80s, it was a absolutely altered time. It also marked the actualization of the first ever PC virus, called Brain.

Guess how it spread? Floppy disks.

It was absolutely tame when compared to the modern trojans and other alarming malware out there today, but that doesn’t mean it didn’t pack a punch.

The virus was created by brothers Amjad and Basit Alvi of Lahore, Pakistan in 1986. The brothers ran a adjacency computer store that specialized in PC repair and software sales.

But after Amjad became aware that one of the programs he’d written was being pirated, he leaked copies absolute “a self-replicating affairs that would ‘infect’ an crooked user’s computer, agitate his operations and force him to acquaintance Amjad for repairs,” according to this TIME article.

The fact that the virus’s spread banked on people exchanging adulterated floppy discs shows they were pretty novel at the time.

The irony here is that the Alvi brothers were affairs pirated software themselves.

Although floppy disks have now gone out of fashion, this virus set in motion a chain of events that completely changed the computer virus landscape.

As for the Alvi brothers, they’re still in business active a wireless broadband account under the name… wait for it… Brain Telecommunication Limited.

That’s it. See you all in two weeks. Stay safe!

Read next: A new agreement may help us figure out what 'dark energy' absolutely is