[1] A
Ukraine border control station has been struck with a data wiper cyberattack that has slowed the process of allowing refugees to cross into Romania, a cybersecurity expert who spoke with Ukrainian agents at the border crossing told VentureBeat.
Refugees fleeing Ukraine
after Russia's invasion of the country have faced long waits at the border, sometimes for as long as days. At least part of the reason appears to be the impact of another major wiper attack, according to the cybersecurity expert, Chris Kubecka, who spoke with VentureBeat yesterday.
"People are stuck because Ukraine cannot process anything except on pencil and paper," said Kubecka, who was able to cross into Romania on Saturday on a bus with about two dozen people fleeing Ukraine. The wiper attack at a Ukraine border control station was first reported by the Washington Post.
Kubecka said she believes the wiper attack occurred early on Saturday morning, shortly after 6 a.m. Ukraine time. She says she inquired into the reason for the long delays and found out that a
cyberattack had occurred.
Given her background in cybersecurity, she was able to speak with
Ukrainian agents at the border station about what had happened. They told her that it "seems to be the same exact wiper virus that had hit some of the ministries," Kubecka said.
>> Read more. [2] The FBI and CISA have issued a warning about the possibility that data-wiping malware observed in
Ukraine might end up impacting organizations outside the country.
Ukraine, which has been under attack by Russia since Thursday, has been struck with a series of wiper cyberattacks since January.
Data-wiping malware can "present a direct threat to an organization's daily operations, impacting the availability of critical assets and data," the agencies said in the joint advisory, posted on the CISA website.
"Further disruptive cyberattacks against organizations in Ukraine are likely to occur and may unintentionally spill over to organizations in other countries," CISA and the FBI said in the advisory. "Organizations should increase vigilance and evaluate their capabilities encompassing planning, preparation, detection, and response for such an event."
The advisory includes details on the wiper malware that has been researched to date, along with indicators of compromise (IOCs) aimed at helping detection and prevention of wiper malware.
>> Read more. [3] As ubiquitous as machine learning is in the enterprise, Levi's might not be the first brand that comes to mind when you think of AI smarts. As a company that has been producing jeans and other denim apparel since 1853, Levi Strauss & Co. seemed to be doing just fine without the intervention of
neural networks and machine learning algorithms. But like so many large companies, Levi's has found plenty of uses for AI technology, from automating mundane tasks and analyzing denim-related data sets to helping its designers create
new denim jacket designs.
In 2019, Levi's formalized its years-long flirtation with
AI by hiring Katia Walsh as the company's chief AI and strategy officer to lead its new global AI team. As part of her effort to integrate this bleeding edge tech into an established legacy brand, Walsh launched the company's first-ever Machine Learning Bootcamp in early 2021. The intensive, eight-week program invited 40 Levi's employees from across the organization to learn about machine learning, agile development methods and of course, how to write code.
>> Read more.
No comments:
Post a Comment