Artificial intelligence (AI) has made remarkable strides over the past few decades, transforming various industries and applications. Among the most notable advancements is the development of AI-generated chatbots, which have revolutionized customer service, personal assistance, and content generation. These chatbots, powered by sophisticated algorithms and machine learning techniques, offer seamless and intuitive interactions with users, redefining the boundaries of human-machine communication
All Articles (2482)
The rapid adoption of Generative AI (GenAI) and the emergence of Agentic AI has unlocked new opportunities for security teams to stay ahead of attacks better. In security operations centers worldwide, organizations rapidly adopt AI tools to augment human analysts, improve efficiency, and lay the foundation for a more autonomous SOC. Across the industry, the focus has shifted from whether to adopt AI, from behavioral AI and machine learning to generative AI and now agentic AI, to how best to impl
Several government security agencies worldwide are warning people about spyware that has been snooping on mobile phone users' private data. An advisory from the various agencies recently revealed that the spyware variants have been targeting users connected to Taiwanese independence and similar movements. Known as Badbazaar and Moonshine, the two spyware strains have been spoofing legitimate apps to trick unsuspecting victims. [1]
The advisory comes from a host of agencies, including the Austral
Threat actors are using a technique known as "spam bombing" to overload victims' email inboxes and provide cover for more harmful activity. Security vendor Darktrace, analysts Maria Geronikolou and Cameron Boyd detailed an example of the technique where the threat actor used a legitimate email campaign product to swarm a victim with spam emails and then attempted to phish them under the guise of a "helpful" IT staffer. The attack is an example of how threat actors use legitimate products for mal
The social media platform, owned by leading Chinese technology firm Bytedance, was the target of legislation following an order by the US Congress that it be sold or face a permanent ban in the US market, where it has 170 million users. The original deadline was set for the end of February, although this was extended by 90 days following Donald Trump's inauguration. The US President has signed an executive order and given TikTok a 75-day extension in a move intended to provide his administration
Recent reports indicate that the US Cybersecurity and Infrastructure Security Agency (CISA) is preparing for significant workforce reductions. These changes are the result of budgetary pressures, duplication of departments, advances in AI and evolving threat landscapes, have far-reaching implications across multiple levels of the cybersecurity ecosystem.
CISA, known as "America's Cyber Defense Agency," is facing massive layoffs that could impact its ability to safeguard the nation's critical in
Chinese counterparts reveal that hacks had been targeting networks for years as a warning against aiding Taiwan. China openly admitted it was behind a series of cyber-attacks on US infrastructure in a secret meeting with American officials, according to reports. Members of the Chinese delegation indicated to their US counterparts in December 2024 that they had spent years targeting computer networks in electrical grids, water supplies and ports, in what appeared to be a warning against the US
As more organizations adopt containerization, Kubernetes adoption is at an all-time high. A key component of any Kubernetes cluster is allowing and managing external traffic to the services organizations are building. Enter Ingress. As a powerful component and set of resources that expose services to the outside world, Ingress’s power and complexity lend themselves to a considerable risk profile when compromised.
In this report, Sentinel Labs discusses a grouping of critical vulnerabilities dubb
Web-based credit card skimming remains a widespread and persistent threat, known for its ability to adapt and evolve over time. FortiGuard Labs recently observed a sophisticated campaign called “RolandSkimmer,” named after the unique string “Rol@and4You” found embedded in its payload. This threat actor targets users in Bulgaria and represents a new wave of credit card skimming attacks leveraging malicious browser extensions across Chrome, Edge, and Firefox.
Link to full report: IR-25-097-002_
Another vulnerability impacting firewall products from Ivanti is being exploited by alleged China-based hackers. An Ivanti advisory released last week confirmed that a “limited number of customers” have been attacked through a bug impacting its Connect Secure, Policy Secure & ZTA Gateways tools, which are used by large organizations and government clients to keep malicious traffic out while allowing employees to have remote access to systems.
The next day, the US Cybersecurity and Infrastructu
The Google Threat Intelligence team (GTIG) has published new research outlining how IT workers from the Democratic People's Republic of Korea (DPRK) are expanding the scope and scale of their operations, targeting companies across the globe with more advanced deception and cyber extortion tactics. The report offers a stark reminder that nation-state threats do not always originate with malware; they can also come disguised as job applicants. [1]
"DPRK IT workers present a unique threat by posing
A technique that hostile nation-states and financially motivated ransomware groups are using to hide their operations poses a threat to critical infrastructure and national security, the National Security Agency has warned.
The technique is known as fast flux. It allows decentralized networks operated by threat actors to hide their infrastructure and survive takedown attempts that would otherwise succeed.
Fast flux works by cycling through a range of IP addresses and domain names that these b
Water and electricity utilities across the US and UK face an intensifying wave of cyberattacks, many of them linked to nation-state actors, according to a new report by cybersecurity firm Semperis. The findings, drawn from a survey of 350 utility sector IT and security professionals, reveal an urgent need for greater operational resilience and leadership support as threats multiply. “The technology and systems that deliver critical services like power grids and drinking water underpin every fa
OpenSNP, a large open-source repository for user-uploaded genetic data, will shut down and delete all of its data at the end of April, co-founder Bastian Greshake Tzovaras has confirmed. In a blog post, openSNP’s Greshake Tzovaras attributed the decision to shut down the site due to concerns of data privacy following the financial collapse of 23andMe and the rise in authoritarian governments around the world.
Founded in 2011 by Tzovaras, along with Philipp Bayer and Helge Rausch, openSNP became
A new report out today from Cisco Talos, a cybersecurity company part of Cisco Systems Inc., found that in 2024, cybercriminals didn’t need zero-days or custom malware to wreak havoc: They just logged in. Identity-based attacks, misused legitimate tools, and years-old vulnerabilities drove the majority of security incidents last year.
The findings come from the Talos 2024 Year in Review report, based on telemetry from more than 46 million devices across 193 countries and regions, analyzing more
In the ever-evolving landscape of cybersecurity threats, a new and menacing player has emerged: ransomware-as-a-service (RaaS). Among the many RaaS platforms causing havoc, Kryptina stands out for its advanced capabilities and widespread impact. The article below describes the intricate details of Kryptina RaaS, examining its mechanisms, effects, and the measures needed to combat this digital menace. Hello, Lady Kryptina, a devious female vampire.
Understanding Ransomware-as-a-Service. Ransomwa
In the law enforcement world, many times arrested criminals will be used (or ‘flipped’) to continue finding other criminal activity. This is similar in the cyber security world. Black Hats, Gray Hats and White Hats.
A key member of Elon Musk's US DOGE Service team once assisted a cybercrime gang involved in data theft and cyberstalking an FBI agent, according to digital records reviewed by Reuters. Edward Coristine, a 19-year-old hacker, is one of the most visible figures in the DOGE init
Russian authorities have arrested three individuals suspected of developing the Mamont malware, a recently identified banking trojan targeting Android devices. The suspects, whose identities remain undisclosed, were apprehended in the Saratov region. A video released by the Russian Ministry of Internal Affairs (MVD) shows the arrested individuals in handcuffs, being escorted by police officers.
According to the MVD, the trio is linked to over 300 cybercrime incidents. Authorities also seized co
A new report from VicOne, a leading automotive cybersecurity firm, warns of escalating threats in the global auto industry. Despite recent progress in law enforcement efforts, the Shifting Gears: VicOne 2025 Automotive Cybersecurity Report highlights growing vulnerabilities in vehicles, electric charging networks, and artificial intelligence systems.
Cyberattacks between 2022 and 2024 caused tens of billions of dollars in damages. Automotive vulnerabilities reached record highs in 2024, with ove
Recently, over 100 websites belonging to car dealerships were found to serve malicious "ClickFix" code due to a supply chain attack that affected a third-party domain. According to security researcher Randy McEoin, the threat actor infected LES Automotive, a privately held streaming service provider based in Tolland, CT, that primarily focuses on the automotive industry. All websites using LES Automotive's services shared a ClickFix webpage with their visitors. [1]