Google researchers found that government-backed hackers now use AI throughout the whole attack lifecycle
Flux RSS
— Sources secondairesNew TrendAI report warns that most security tools can’t protect against attacks on AI skills artifacts
Flashpoint warns of a dramatic drop in the average time between vulnerability disclosure and exploitation
Campaign combines stolen Telegram accounts, fake Zoom calls and ClickFix attacks to deploy infostealer malware
For the past week, the massive "Internet of Things" (IoT) botnet known as Kimwolf has been disrupting the The Invisible Internet Project (I2P), a decentralized, encrypted communications network designed to anonymize and secure online communications. I2P users started reporting disruptions in the network around the same time the Kimwolf botmasters began relying on it to evade takedown attempts against the botnet's control servers.
A federal court has sentenced crypto-scammer Daren Li to 20 years in absentia
This year should break all the records in terms of vulnerability disclosed, reaching or even surpassing 50,000 new CVEs disclosed
Six actively exploited zero-day bug have been patched by Microsoft
Microsoft today released updates to fix more than 50 security holes in its Windows operating systems and other software, including patches for a whopping six "zero-day" vulnerabilities that attackers are already exploiting in the wild.
High-volume phishing campaign delivers Phorpiex malware via malicious Windows Shortcut files
Picus Security warns of the increasingly sophisticated ways malicious activity is staying hidden
ZeroDayRAT is a new mobile spyware targeting Android and iOS, offering attackers persistent access
Operation Cyber Guardian was Singapore’s largest and longest running anti-cyber threat law enforcement operation
NCSC call firms to ‘act now’ following disruptive malware attacks targeting Polish energy providers
The European Commission and government agencies in Finland and the Netherlands have suffered potentially related breaches
Security researchers from LayerX identified a new flaw in 50 Claude Desktop Extensions that could lead to unauthorized remote code execution
Two Connecticut men face federal charges for a $3m scheme targeting online gambling platforms
VoidLink, a Linux-based C2 framework, facilitates credential theft, data exfiltration across clouds
The services of Florida-based payments platform BridgePay are offline due to a ransomware attack
Revolut claims social media sites make £3.8bn annually from scam ads targeting European users