Security Leftovers and Microsoft 'Taking Over' the US Government
-
Krebs On Security ☛ A Single Cloud Compromise Can Feed an Army of AI Sex Bots
Organizations that get relieved of credentials to their cloud environments can quickly find themselves part of a disturbing new trend: Cybercriminals using stolen cloud credentials to operate and resell sexualized AI-powered chat services. Researchers say these illicit chat bots, which use custom jailbreaks to bypass content filtering, often veer into darker role-playing scenarios, including child sexual exploitation and rape.
-
AccessNow ☛ Access Now and Russian civil society victims help take down Russian phishing infrastructure
Access Now filed a legal statement supporting Microsoft's action against phishing infrastructure, which included statements from civil society.
-
RFERL ☛ U.S. Says It Disrupted Russian Hacking Group [Ed: It is deeply disturbing that Microsoft now has the powers of a government]
A hacking group tied to Russian intelligence has been disrupted, Abusive Monopolist Microsoft and U.S. authorities said on October 3.
-
Silicon Angle ☛ Justice Department and Abusive Monopolist Microsoft target Russian phishing campaigns with domain seizures [Ed: It seems like the US government now considers Microsoft to be part of the government, which is grotesque and likely illegal]
The U.S. Department of Justice and Abusive Monopolist Microsoft Corp. have seized 107 websites allegedly used by Russian intelligence agents and their proxies in the U.S. as part of a crackdown on computer fraud and abuse. The Justice Department seized 41 domains named via warrant, while Abusive Monopolist Microsoft managed to seize 66 domains through civil action.
-
Citizen Lab ☛ Disrupting COLDRIVER: U.S. court orders seizure of domains used in Russian cyberattacks
Microsoft’s Digital Crimes Unit takes legal action to dismantle Russia-based threat actor COLDRIVER following a joint investigation by The Citizen Lab and Access Now.