Microsoft identifies four cybercriminals behind Storm-2139, an AI abuse scheme exploiting Azure OpenAI services for illicit ...
Nearly 12,000 live secrets found in LLM training data, exposing AWS, Slack, and Mailchimp credentials—raising AI security ...
Winos 4.0 malware, deployed via phishing emails impersonating Taiwan’s tax authority, steals data through keylogging, ...
Sticky Werewolf deploys Lumma Stealer via phishing attacks in Russia and Belarus, stealing credentials, banking data, and ...
Space Pirates deploys LuckyStrike Agent malware to infiltrate Russian IT networks, using OneDrive for C2 and evading ...
TgToxic malware evolves with advanced anti-analysis, DGA-based C2, and global expansion, targeting banking and crypto users ...
Organizations are either already adopting GenAI solutions, evaluating strategies for integrating these tools into their ...
FBI confirms North Korea’s Lazarus Group stole $1.5B from Bybit, surpassing 2024’s total crypto heists. Investigations reveal ...
AI-driven SOC 3.0 automates 100% of alerts, cuts response time from days to minutes, and enables proactive threat ...
Leaked Black Basta chat logs expose internal conflicts, $107M in ransom earnings, and new attack tactics. Key members defect, ...
Malicious Python package "automslc" (104K+ downloads) enables Deezer piracy, bypassing API restrictions and linking to a C2 ...
Ghostwriter deploys malware-laced Excel files, steganography, and obfuscated macros to target Ukraine and Belarus.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results