lotl (2)

31045220469?profile=RESIZE_400xCybercriminals are exploiting the implicit trust users place in central Artificial Intelligence (AI) platforms to distribute the Atomic macOS Stealer (AMOS).  A new campaign, identified by security researchers at Huntress, reveals that attackers have evolved beyond simply mimicking trusted brands; they are now actively exploiting legitimate services from OpenAI and xAI to host malicious payloads.  The campaign highlights a significant shift in social engineering tactics.  Rather than directing v

11485401674?profile=RESIZE_400xThe Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), Multi-State Information Sharing & Analysis Center (MS-ISAC), and Israel National Cyber Directorate (INCD) published a “Guide to Securing Remote Access Software,” which provides an overview of common exploitations and associated tactics, techniques, and procedures (TTPs) used by cyber threat actors to exploit the legitimate, beneficial use of this software for easy b