<p>Organizations and employees everywhere continue to rush to use AI to boost productivity and tackle rote job functions, but new research shows this might prove disastrous. Malicious actors could use AI exploits to access sensitive data, experts say, especially if…
Category: EN
Authorities seize BlackSuit ransomware gang’s servers
German authorities said they have seized the servers used by the long-running ransomware gang, BlackSuit, which is blamed for cyberattacks across Europe and the U.S., including the City of Dallas. This article has been indexed from Security News | TechCrunch…
Florida prison email blunder exposes visitor contact info to inmates
Victims fear leak at Everglades Correctional Institution could lead to violent extortion A data breach at a Florida prison has inmates’ families concerned for their welfare after their contact details were allegedly leaked to convicted criminals.… This article has been…
Microsoft Boosts .NET Bounty Program Rewards to $40,000
Valid, complete reports detailing remote code execution or elevation of privilege bugs in .NET qualify for the maximum rewards. The post Microsoft Boosts .NET Bounty Program Rewards to $40,000 appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
How UK SMBs Can Handle Sensitive Information Without Breaking the Law (or the Bank)
How UK SMBs Can Handle Sensitive Information Without Breaking the Law (or the Bank) Introduction Data is the lifeblood of modern businesses, but for small and medium-sized enterprises (SMBs), it can also be a legal, financial, and reputational minefield. Whether…
AI-Generated Malicious npm Package Drains Solana Funds from 1,500+ Before Takedown
Cybersecurity researchers have flagged a malicious npm package that was generated using artificial intelligence (AI) and concealed a cryptocurrency wallet drainer. The package, @kodane/patch-manager, claims to offer “advanced license validation and registry optimization utilities for high-performance Node.js applications.” It was…
Illumina Fined $9.8M for Cybersecurity Flaws in Genomic Tools Sold to U.S. Agencies
Illumina Inc., a leading genomic sequencing company, has agreed to pay $9.8 million to settle federal allegations that it knowingly sold cybersecurity-vulnerable genomic sequencing systems to government agencies while misrepresenting their security standards. The settlement resolves claims spanning over seven…
Microsoft Teams Adds Silent 60-Second Test Call Feature for IT Admins
Microsoft has announced a significant new feature for IT administrators that will enhance network monitoring capabilities within Microsoft Teams. Starting September 2025, administrators will gain access to silent, 60-second test call functionality designed to proactively monitor network performance and identify…
9 things you shouldn’t use AI for at work
AI can boost productivity, but it can also derail your entire operation. From fake legal advice to customer service nightmares, here are nine places AI doesn’t belong at work. This article has been indexed from Latest news Read the original…
You can use Google’s Math Olympiad-winning Deep Think AI model now – for a price
The $250-per-month Google Ultra subscription just got a lot more powerful. This article has been indexed from Latest news Read the original article: You can use Google’s Math Olympiad-winning Deep Think AI model now – for a price
Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft
Russian state-sponsored APT Secret Blizzard has used ISP-level AitM attacks to infect diplomatic devices with malware. The post Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Threat Actors Impersonate Microsoft OAuth Apps to Steal Login Credentials
Threat actors are leveraging sophisticated phishing campaigns by creating fake Microsoft OAuth applications to impersonate legitimate enterprises, enabling credential theft while bypassing multifactor authentication (MFA). Proofpoint researchers have tracked this activity since early 2025, identifying over 50 impersonated applications, including…
Search Engines Are Indexing ChatGPT Chats — Here’s What Our OSINT Found
A significant privacy breach has emerged in the artificial intelligence landscape, as ChatGPT shared conversations are being indexed by major search engines, effectively transforming private exchanges into publicly discoverable content accessible to millions of users worldwide. This discovery has exposed…
Emerging Koske Malware Leverages Visual Deception on Linux Platforms
The new Linux malware strain, Kosk, has emerged in a striking demonstration of how artificial intelligence is being used to fight cybercrime. In a remarkable development in how cybercrime intersects with artificial intelligence, the malware uses stealthy delivery mechanisms…
You Are What You Eat: Why Your AI Security Tools Are Only as Strong as the Data You Feed Them
Just as triathletes know that peak performance requires more than expensive gear, cybersecurity teams are discovering that AI success depends less on the tools they deploy and more on the data that powers them The junk food problem in cybersecurity…
LLMs Boost Offensive R&D by Identifying and Exploiting Trapped COM Objects
Outflank is pioneering the integration of large language models (LLMs) to expedite research and development workflows while maintaining rigorous quality standards. This approach allows teams to focus on refining and testing techniques for their Outflank Security Tooling (OST) suite, which…
ToolShell under siege: Check Point analyzes Chinese APT Storm-2603
Storm-2603 group exploits SharePoint flaws and uses a custom C2 framework, AK47 C2, with HTTP- and DNS-based variants named AK47HTTP and AK47DNS. Check Point Research is tracking a ToolShell campaign exploiting four Microsoft SharePoint flaws, linking it to China-nexus groups…
Spying on People Through Airportr Luggage Delivery Service
Airportr is a service that allows passengers to have their luggage picked up, checked, and delivered to their destinations. As you might expect, it’s used by wealthy or important people. So if the company’s website is insecure, you’d be able…
APT36 Hackers Target Indian Railways, Oil, and Government Systems Using Malicious PDF Files
The Pakistan-linked threat group APT36, also known as Transparent Tribe, has broadened its cyber operations beyond traditional military targets to encompass Indian railways, oil and gas infrastructure, and the Ministry of External Affairs. Security researchers have uncovered two sophisticated desktop-based…
Google releases its award-winning Math Olympiad model, but it’ll come at a price
The $250 per month Google Ultra subscription just got more enticing. This article has been indexed from Latest news Read the original article: Google releases its award-winning Math Olympiad model, but it’ll come at a price