logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Evolving Threat Landscape of Hacktivism in Colombia
  • Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months
  • The Transformative Power of Artificial Intelligence in Healthcare
  • Bug Bounty Reconnaissance Framework: help you coordinate your reconnaissance workflows across multiple devices
  • Phishing remained the top identity abuser in 2022: IDSA report

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-2879 (wireshark) 26 May 2023
  • CVE-2023-2857 (wireshark) 26 May 2023
  • CVE-2023-2858 (wireshark) 26 May 2023
  • CVE-2023-2854 (wireshark) 26 May 2023
  • CVE-2023-2855 (wireshark) 26 May 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Reverse-engineering deception-based attacks

Posted on 16 July 2020

From gcn.com

deepfake (VectorMine/Shutterstock.com)

With deception playing an increasingly large role in information-based attacks, the Defense Advanced Research Projects Agency is looking for ways to reverse engineer the toolchains behind the deliberately falsified images, video, audio and text that produce adversarial machine learning attacks.

Read more…

Posted in News

Post navigation

Previous post: Chinese state hackers target Hong Kong Catholic Church
Next post: PoC exploits released for SAP Recon vulnerabilities, patch now!
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.