Happy Holidays to our readers. While today is a day of rest for many, the digital frontier remains a theater of constant activity. From evolving ransomware tactics that mimic major players like LockBit to groundbreaking MIT research that salvages "untrainable" AI, the message remains clear: resilience is built on continuous awareness. Stay safe, stay informed, and enjoy the break with peace of mind.
The latest iteration of HardBit ransomware has surfaced with enhanced obfuscation techniques. Utilizing the Neshta file infector as a dropper, version 4.0 is designed to evade traditional detection. Key features include a passphrase protection mechanism that prevents execution unless an authorization ID is provided at runtime. Most notably, the GUI version now includes a "Wiper" mode, allowing threat actors to permanently destroy data rather than just encrypting it.
CISA has added CVE-2023-52163 (CVSS 8.8) affecting Digiever DS-2105 Pro Network Video Recorders to its Known Exploited Vulnerabilities (KEV) catalog. This missing authorization flaw in the time_tzsetup.cgi script allows unauthenticated remote threat actors to inject and execute arbitrary OS commands. Because these devices are often End-of-Life (EoL), users are urged to disconnect them or implement strict network segmentation immediately.
Recent data indicates that nearly 16% of cyber incidents in 2025 have directly leveraged Generative AI. Beyond polished phishing emails, threat actors are now utilizing "Agentic AI" to profile victims automatically and deepfake audio to authorize multi-million dollar wire transfers. AI has effectively lowered the barrier for novice criminals to launch complex, multi-stage attacks.
Vulnerability:
Threat actors send calendar invites or emails with links to "Urgent Year-End Reviews" or "Holiday Socials." These links lead to spoofed login pages (e.g., zoon.us instead of zoom.us) designed to harvest your SSO credentials.
Mitigation:
Hover before you click. Verify that the meeting domain matches your organization's official provider. If a link prompts you to download a "new browser plugin" to join, close the window and join via your official desktop application or a known bookmarked URL.
Course Description: This 2-hour course introduces the NVIDIA FLARE (Federated Learning Application Runtime Environment) SDK. You will learn how to adapt Machine Learning workflows to a federated paradigm, crucial for industries like healthcare and finance where data privacy and security are paramount. The course covers system orchestration, secure multi-party collaboration, and real-world deployment strategies.
π Schedule: Self-Paced
π Duration: 2 Hours
π² Cost: Free
MIT CSAIL researchers have developed a method called "Guidance" that allows architectures previously deemed "untrainable" to perform at state-of-the-art levels. By briefly aligning a target network's internal representations with a guide network, the target "inherits" structural biases that prevent overfitting and instability. This suggests that the architecture of many failed AI models isn't the problem, but rather their initial training state.
University of Texas at San Antonio (UTSA) researchers made waves in 2025 by identifying "Package Hallucinations" in AI-generated code. Their study found that up to 21% of code samples from open-source LLMs recommended non-existent third-party libraries, a gap that hackers are now filling with malicious "typosquatting" packages. This research has forced a pivot in how developers verify AI-assisted code.