Tag: ai
-
Perplexity Comet Browser Bug Leaks Local Files via AI Prompt Injection
A prompt injection attack in Perplexity’s Comet browser can trick its AI agent into leaking sensitive local files. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/artificial-intelligence/perplexity-comet-browser-bug-leaks-local-files-via-ai-prompt-injection/
-
LLMs are getting better at unmasking people online
The author of a new study told CyberScoop he’s “very worried,” describing deanonymization capabilities of AI as a “large scale invasion of privacy.” First seen on cyberscoop.com Jump to article: cyberscoop.com/ai-deanonymization-risks-online-anonymity-study/
-
Malware-laced OpenClaw installers get Bing AI search boost
Think before you download First seen on theregister.com Jump to article: www.theregister.com/2026/03/04/fake_openclaw_installers_malware/
-
AI Should Be the First Defense for Stablecoin Payment Fraud
Millisecond Detection and Layered Controls Will Shape Future Payment Security. Stablecoins can remove chargebacks and make transactions irreversible in fraud cases. This trend is forcing banks to analyze risks before a payment executes. AI models must work within milliseconds while maintaining accuracy and minimizing friction for legitimate users. First seen on govinfosecurity.com Jump to article:…
-
Perplexity AI Browser Flaw Could Let Calendar Invites Access Local Files
Researchers say a vulnerability in Perplexity’s Comet AI browser could expose local files and credentials through malicious calendar invites. The post Perplexity AI Browser Flaw Could Let Calendar Invites Access Local Files appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-perplexity-comet-browser-vulnerability-local-files/
-
Why AI, Zero Trust, and modern security require deep visibility
Tags: ai, cyber, cybersecurity, data, detection, incident response, intelligence, soc, strategy, threat, tool, zero-trust72% of organizations say NAV is essential for proactive threat hunting and reactive incident response69% say a NAV solution is vital to their threat detection and incident response processThis isn’t about adding more gadgets to the SOC. It’s about strengthening the foundation that the SOC stands on.When visibility is weak, every advanced capability becomes unstable:AI…
-
MS-Agent Flaw Enables Remote Code Execution via AI Agents
A critical MS-Agent flaw could allow attackers to use prompt injection to execute system commands through AI agents. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/ms-agent-flaw-enables-remote-code-execution-via-ai-agents/
-
How Threat Actors Turned OpenClaw Into a Scraping Botnet
How did OpenClaw become botnet infrastructure so quickly? DataDome analyzes the hijacked AI agents scraping sites at scale and how we detect them. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/how-threat-actors-turned-openclaw-into-a-scraping-botnet/
-
MY TAKE: ChatGPT is turning into Microsoft Office, and power users are paying the price
Something has been shifting inside the tools millions of us use every day, and it’s worth naming out loud. Related: AI is becoming a daily routine Over the past several months I’ve watched ChatGPT change. Not in some abstract, version-number… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/my-take-chatgpt-is-turning-into-microsoft-office-and-power-users-are-paying-the-price/
-
MY TAKE: ChatGPT is turning into Microsoft Office, and power users are paying the price
Something has been shifting inside the tools millions of us use every day, and it’s worth naming out loud. Related: AI is becoming a daily routine Over the past several months I’ve watched ChatGPT change. Not in some abstract, version-number… (more”¦) First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/my-take-chatgpt-is-turning-into-microsoft-office-and-power-users-are-paying-the-price/
-
CrowdStrike reports record quarter amid investor concerns about AI impact
CEO George Kurtz told investors the cybersecurity firm is well positioned to compete against legacy providers. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/crowdstrike-record-quarter-investor-concerns-ai/813791/
-
Iranian cyberattacks fail to materialize but threat remains acute
Tags: ai, application-security, attack, ceo, control, country, cyber, cyberattack, cybercrime, cybersecurity, defense, endpoint, finance, government, group, healthcare, infrastructure, intelligence, Internet, iran, malware, mfa, monitoring, phishing, risk, service, supply-chain, technology, threat, tool, update, vpnTargeting and response: According to Adrian Cheek, a senior cybercrime researcher at Canadian threat intelligence company Flare, the most at-risk sectors are critical infrastructure, including the defense and government supply chain, financial services, energy, and healthcare.”Water, energy, and healthcare sectors are currently the most exposed. These sectors combine high targeting priority with weak baseline security,…
-
Hybride Kriegsführung im digitalen Zeitalter Warum Systeme der künstlichen Intelligenz und Lieferketten zur strategischen Angriffsfläche werden
Was wir derzeit beobachten, ist hybride Kriegsführung in großem Maßstab: koordinierte kinetische Operationen gegen den Iran, vorbereitende Cyberaktivitäten sowie eine zu erwartende Welle iranischer und durch Stellvertreter geführter Einflusskampagnen, die die Grenzen zwischen militärischem Konflikt und zivilem Umfeld zunehmend verschwimmen lassen. Organisationen weltweit müssen davon ausgehen, dass ihre Operational-Technology (OT), Rechenzentren, KI-Integrationsschichten und Informationsökosysteme Teil…
-
Webinar: The True State of Security 2026
AI has become the most popular scapegoat in security. While the risk is real, the obsession is costly. Most security failures don’t start with AI. They start with people, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/04/webinar-the-true-state-of-security-2026/
-
Webinar: The True State of Security 2026
AI has become the most popular scapegoat in security. While the risk is real, the obsession is costly. Most security failures don’t start with AI. They start with people, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/04/webinar-the-true-state-of-security-2026/
-
Shadow AI: When Everyone Becomes a Data Leak Waiting to Happen
Shadow AI leaks data to uncontrolled external systems and spreads virally across organizations, requiring user training and compliant alternatives rather than prohibition. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/shadow-ai-when-everyone-becomes-a-data-leak-waiting-to-happen/
-
Cybersicherheit und KI-Governance direkt im Browser
Island, Entwickler des Enterprise-Browsers, wird integrierter Bestandteil des AWS-Security-Hub-Extended-Plan von Amazon Web Services (AWS). Unternehmen können damit sicheres Browsing und die Steuerung von KI-Anwendungen direkt im Browser umsetzen. Beschaffung, Abrechnung und Support erfolgen gebündelt über AWS. Der AWS-Security-Hub-Extended-Plan vereint Sicherheitslösungen von AWS und ausgewählten Partnern in einem einheitlichen Modell. Kunden erhalten einen Vertrag, eine Rechnung…
-
VoidLink Malware Framework Targets Kubernetes and AI Workloads in New Cyber Attack Wave
VoidLink marks a turning point in how adversaries target Kubernetes and AI workloads, signaling a shift toward cloud-native, AI-aware malware frameworks that live where modern value is created: inside containers, pods, and GPU clusters.research. It fingerprints its surroundings to detect major clouds such as AWS, GCP, Azure, Alibaba, and Tencent, and distinguishes whether it is…
-
VoidLink Malware Framework Targets Kubernetes and AI Workloads in New Cyber Attack Wave
VoidLink marks a turning point in how adversaries target Kubernetes and AI workloads, signaling a shift toward cloud-native, AI-aware malware frameworks that live where modern value is created: inside containers, pods, and GPU clusters.research. It fingerprints its surroundings to detect major clouds such as AWS, GCP, Azure, Alibaba, and Tencent, and distinguishes whether it is…
-
New RFP Template for AI Usage Control and AI Governance
As AI becomes the central engine for enterprise productivity, security leaders are finally getting the green light, and the budget, to secure it. But there’s a quiet crisis unfolding in the boardroom: many organizations know they need “AI Governance,” but they have no idea what they are actually looking for.The CISO’s Dilemma: You Have the…
-
3 pillars of hyperproductivity for MSPs
Attackers have accelerated their use of automation and AI, increasing pressure on technicians already managing growing workloads. Hyperproductivity offers a path forward. People, processes and platforms work together to drive hyperproductivity. Instead of adding more tools or more people, MSPs can redesign their operations around automation, standardized workflows and unified platforms. First seen on securityboulevard.com…
-
Ransomware auf Speed
Künstliche Intelligenz verändert die Cyberbedrohungslandschaft nicht durch völlig neue Angriffsarten, sondern durch Skalierung, Geschwindigkeit und Präzision. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/ransomware-auf-speed
-
New Threat Report: AI Accelerates High-Velocity Cyber Attacks
Cyberattacks are shifting from “breaking in” to simply “logging in,” with AI now automating high-speed operations that overwhelm human defenders. Cloudforce One describes MOE as a cold ratio of effort to operational outcome, and modern threat actors are optimizing every stage of their campaigns around it. Instead of burning expensive zero-days, attackers prefer cheap, scalable…
-
Shadow AI vs Managed AI: What’s the Difference? FireTail Blog
Tags: access, ai, api, attack, breach, chatgpt, ciso, cloud, computer, control, credentials, credit-card, data, data-breach, framework, google, injection, intelligence, Internet, law, LLM, malicious, mitre, monitoring, network, password, phishing, phone, risk, software, switch, threat, tool, training, vulnerabilityMar 04, 2026 – – Quick Facts: Shadow AI vs. Managed AIShadow AI is a visibility gap: It refers to any AI tool used by employees that the IT department doesn’t know about. Most companies have 10x more AI tools in use than they realize.Managed AI is a “Paved Path”: It uses approved, secure versions…
-
Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows
The OpenID Foundation warns that fragmented policies on posthumous digital accounts could open the door for fraudsters to exploit AI deepfakes First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/digital-estate-post-death-deepfake/
-
Anthropic AI ultimatums and IP theft: The unspoken risk
Tags: ai, ceo, china, ciso, data, data-breach, defense, google, government, intelligence, monitoring, network, openai, risk, service, theft, toolChina’s extraction campaign: A targeting operation, not a curiosity: Anthropic’s disclosure that three China”‘based AI companies (DeepSeek, Moonshot AI, and MiniMax) ran more than 16 million interactions through roughly 24,000 fraudulent accounts is not a story about model misuse. It is a story about targeting. These campaigns went straight at Claude’s most sensitive capabilities: agentic…
-
The vulnerability that turns your AI agent against you
Zenity Labs disclosed PleaseFix, a family of critical vulnerabilities affecting agentic browsers, including Perplexity Comet, that allow attackers to hijack AI agents, access … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/04/agentic-browser-vulnerability-perplexedbrowser/
-
Von Vibe Hacking bis hin zu Flat-Pack-Malware
HP hat seinen aktuellen Threat Insights Report veröffentlicht und zeigt, wie künstliche Intelligenz zunehmend von Angreifern genutzt wird, um Cyberangriffe schneller, kostengünstiger und effizienter durchzuführen. First seen on it-daily.net Jump to article: www.it-daily.net/it-sicherheit/cybercrime/vibe-hacking-flat-pack-malware
-
VivaTech Confidence Barometer 2026 – Vertrauen in die KI, aber wenig Kontrolle über die eigenen Daten
Tags: aiFirst seen on security-insider.de Jump to article: www.security-insider.de/vertrauen-in-die-ki-aber-wenig-kontrolle-ueber-die-eigenen-daten-a-ca1f145a8724f9cf71981d2fee6e02ba/

