Tag: intelligence
-
OpenAI Shuts Down ChatGPT Accounts Linked to Russian, Iranian Chinese Cyber
In an era where artificial intelligence (AI) is reshaping every facet of society, our mission remains steadfast: to ensure that artificial general intelligence (AGI) benefits all of humanity. By advancing AI tools that empower people to solve complex problems, we are laying the groundwork for a future where technology serves as a force for good12.…
-
Contrast Security Combines Graph and AI Technologies to Secure Applications
Contrast Security today made available an update to its application detection and response platform that leverages graph and artificial intelligence (AI) technologies to provide security operations teams with a digital twin of the applications and associated application programming interfaces (APIs) that need to be secured. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/contrast-security-combines-graph-and-ai-technologies-to-secure-applications/
-
What’s New in CodeSentry 7.2
Explore the latest features and enhancements in CodeSentry 7.2! CodeSentry 7.2 SaaS introduces AI Component Detection, which highlights the use of Artificial Intelligence (AI) or Machine Learning (ML) software packages in the Software Bill Of Materials using component tags. This includes the most popular open source tools such as TensorFlow and SciKit among many others. “¦…
-
Over 20 Malicious Crypto Wallet Apps Found on Google Play, CRIL Warns
Cyble Research and Intelligence Labs (CRIL) has recently uncovered a malicious crypto phishing campaign where more than 20 malicious applications on the Google Play Store were designed to target crypto wallet users with phishing schemes. These deceptive apps impersonate well-known wallet platforms and lure users into revealing their sensitive mnemonic phrases, effectively handing over control…
-
APT 41: Threat Intelligence Report and Malware Analysis
First seen on resecurity.com Jump to article: www.resecurity.com/blog/article/apt-41-threat-intelligence-report-and-malware-analysis
-
The Mystery of iPhone Crashes That Apple Denies Are Linked to Chinese Hacking
Plus: A 22-year-old former intern gets put in charge of a key anti-terrorism program, threat intelligence firms finally wrangle their confusing names for hacker groups, and more. First seen on wired.com Jump to article: www.wired.com/story/mystery-of-iphone-crashes-that-apple-denies-are-linked-to-chinese-hacking/
-
KI boomt die Sicherheitsrisiken auch
Generative künstliche Intelligenz (Generative Artificial Intelligence, GenAI) ist im Jahr 2025 keine experimentelle Technologie mehr, sondern eine unternehmenskritische Lösung, die Unternehmen unterstützt, innovativ zu arbeiten und Daten zu schützen. Zwar ermöglicht GenAI theoretisch beispiellose Produktivitätssteigerungen, gleichzeitig führt sie zu neuen, komplexen Risiken: Während der GenAI-Traffic 2024 um über 890″¯Prozent gestiegen ist, haben sich sicherheitsrelevante Vorfälle……
-
AI and Wearable Health Tech: Real-Time Insights for Preventive Care
What if your smartwatch could spot a heart condition before your doctor did? That’s not science fiction, it’s today’s reality. Powered by artificial intelligence, wearable…Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/06/ai-and-wearable-health-tech-real-time-insights-for-preventive-care/
-
Attackers exploit Fortinet flaws to deploy Qilin ransomware
Tags: cve, exploit, flaw, fortinet, group, intelligence, ransomware, remote-code-execution, threat, vulnerabilityQilin ransomware now exploits Fortinet vulnerabilities to achieve remote code execution on impacted devices. Threat intelligence firm PRODAFT warned that Qilin ransomware (aka Phantom Mantis) group targeted multiple organizations between May and June 2025 by exploiting multiple FortiGate vulnerabilities, including CVE-2024-21762, and CVE-2024-55591. >>Phantom Mantis recently launched a coordinated intrusion campaign targeting multiple organizations between…
-
UK ICO publishes AI and biometrics strategy
The UK data regulator has outlined how it will approach the regulation of artificial intelligence and biometric technologies, which will focus in particular on automated decision-making systems and police facial recognition First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366625476/UK-ICO-publishes-AI-and-biometrics-strategy
-
Hackergruppe UNC6040 greift Salesforce-Instanzen per Vishing an
Ich stelle noch einige Information hier ein, die mir von der Google Threat Intelligence Group (GTIG) zugegangen ist. Die Sicherheitsexperten sind auf eine Kampagne der Hackergruppe UNC6040 gestoßen, die Voice-Phishing (Vishing) verwendet, um Salesforce-Instanzen zu kompromittieren und Daten zu stehlen. … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/06/06/hackergruppe-unc6040-greift-salesforce-instanzen-per-vishing-an/
-
Beware: Fake AI Business Tools Spreading Hidden Ransomware
As small businesses increasingly adopt artificial intelligence (AI) tools to streamline operations, cybercriminals are seizing the opportunity to deploy ransomware through deceptive campaigns. According to a recent report by Cisco Talos, attackers are masquerading as legitimate AI software providers, embedding malware within counterfeit applications that mimic popular services. With 98% of small businesses using at…
-
ViperSoftX Malware Used by Threat Actors to Steal Sensitive Information
The AhnLab Security Intelligence Center (ASEC) has recently issued a detailed report confirming the persistent distribution of ViperSoftX malware by threat actors, with notable impact on users in South Korea and beyond. First identified by Fortinet in 2020, ViperSoftX is a sophisticated PowerShell-based malware designed to infiltrate infected systems, execute remote commands, and steal sensitive…
-
Colossal breach exposes 4B Chinese user records in surveillance-grade database
Tags: breach, china, cybercrime, cybersecurity, data, data-breach, disinformation, exploit, finance, fraud, group, identity, infrastructure, insurance, intelligence, iphone, leak, mobile, organized, phishing, phone, threataccording to cybersecurity firm Cybernews, which reported its findings based on its own research.What makes this breach particularly alarming isn’t just its size, though at four billion records, it’s believed to be the largest single-source leak of Chinese personal data ever found, it’s the breadth and depth of information that was exposed.According to the report, the researchers stumbled…
-
Top AI-Driven Pentest Tools 2025
Artificial Intelligence, known to simplify complexities, is trending among organizations. Hence, AI being a buzzword is no more relevant in the context when looking at the near and far future of cybersecurity. The intricacy of cyber threats across industries increased the demand for AI-driven pentest tools in 2025. These smartest tools don’t just scan and……
-
BADBOX 2.0 Malware Hits Over a Million Android Devices in Global Cyber Threat
HUMAN’s Satori Threat Intelligence and Research team, in collaboration with Google, Trend Micro, and Shadowserver, has uncovered and partially disrupted a massive cyber fraud operation named BADBOX 2.0. This operation, an evolved iteration of the original BADBOX malware disclosed in 2023, has infected over 1 million Android Open Source Project (AOSP) devices worldwide, marking it…
-
Hackers Exploit Roundcube Vulnerability to Steal User Credentials via XSS Attack
Tags: attack, credentials, cve, cyber, exploit, group, hacker, intelligence, russia, threat, vulnerability, xssA recent spearphishing campaign targeting Polish entities has been attributed with high confidence to the UNC1151 threat actor, a group linked to Belarusian state interests and, according to some sources, Russian intelligence services. CERT Polska reports that the attackers leveraged a critical vulnerability in the Roundcube webmail platform”, CVE-2024-42009″, to steal user credentials with minimal…
-
Zscaler Tightens AI Security With New Tools
LAS VEGAS, Zscaler Inc. on Tuesday announced advanced artificial intelligence (AI) security capabilities to tackle the complexities in deploying advanced AI tools in large, distributed environments at its developers conference here. The new features are built to harness the power of AI for laser-focused precision, automated threat neutralization and turbocharged collaboration to unify users,.. First…
-
Barracuda Networks Leverages AI to Integrate Cybersecurity Workflows
Barracuda Networks this week added a dashboard that leverages multiple artificial intelligence (AI) technologies to unify the management of its cybersecurity tools and services at no additional cost. Brian Downey, vice president of product management for Barracuda Networks, said BarracudaONE will make it possible to streamline workflows in a way that ultimately makes it simpler..…
-
AI Cyberbullying Risks for Schools
Many educators are talking about artificial intelligence (AI). Some note its advanced and evolving educational capabilities. Others express hesitancy as AI poses notable risks to online safety. One key risk for K-12 schools is AI-driven cyberbullying. Over the coming years, we expect conversations on this to increase. In this article, we’ll detail the current AI…
-
Hackers Are Stealing Salesforce Data, Google Warns
By Christy Lynch This post summarizes the June 4, 2025 threat intelligence update from Google and offers additional recommendations from Reveal Security based on similar and recently observed attack patterns targeting SaaS applications and cloud infrastructure. Reveal Security monitors the overall cyber landscape for unique threats that can evade legacy detection methodologies. This UNC6040 campaign…
-
Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands
The threat actor known as Bitter has been assessed to be a state-backed hacking group that’s tasked with gathering intelligence that aligns with the interests of the Indian government.That’s according to new findings jointly published by Proofpoint and Threatray in an exhaustive two-part analysis.”Their diverse toolset shows consistent coding patterns across malware families, particularly in…
-
New Vishing Threat ‘Particularly Effective’ at Tricking Employees to Steal Salesforce Data
Google’s Threat Intelligence Group says a vishing threat called UNC6040 has been targeting Salesforce applications with a fake data loader. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-unc6040-vishing-salesforce-data/
-
Microsoft launches European Security Program to counter nation-state threats
Tags: access, ai, attack, blizzard, cloud, control, country, crime, crimes, cyber, cybercrime, cybersecurity, framework, google, government, group, infrastructure, intelligence, malicious, malware, microsoft, network, open-source, resilience, russia, service, strategy, threat, vulnerabilityThree-component strategy: The European Security Program will operate through three main components designed to strengthen continental cyber defenses.The first element centers on enhanced threat intelligence sharing, where Microsoft will provide European governments with AI-enhanced, real-time insights into nation-state tactics.The company’s Digital Crimes Unit will expand intelligence sharing through the Cybercrime Threat Intelligence Program, giving European…
-
ClickFix Email Scam Alert: Fake Booking.com Emails Deliver Malware
Cofense Intelligence uncovers a surge in ClickFix email scams impersonating Booking.com, delivering RATs and info-stealers. Learn how these… First seen on hackread.com Jump to article: hackread.com/clickfix-email-scam-fake-booking-com-emails-malware/

