Category: EN

AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor

The rise of zero-knowledge threat actors powered by AI marks a turning point in the business of cybercrime where sophisticated attacks are no longer confined to skilled attackers. The post AI Giving Rise of the ‘Zero-Knowledge’ Threat Actor appeared first…

Lucid Faces Increasing Risks from Phishing-as-a-Service

  Phishing-as-a-service (PaaS) platforms like Lucid have emerged as significant cyber threats because they are highly sophisticated, have been used in large-scale phishing campaigns in 88 countries, and have been compromised by 169 entities. As part of this platform, sophisticated…

Malicious Actors Employ Atlantis AIO to Target 140+ Platforms

  A new cybercrime platform dubbed ‘Atlantis AIO’ provides automatic credential stuffing against 140 internet platforms, including email, e-commerce, banking, and VPNs. Atlantis AIO includes pre-configured modules for performing brute force assaults, bypassing CAPTCHAs, automating account recovery operations, and monetising…

“Nudify” deepfakes stored unprotected online

A generative AI nudify service has been found storing explicit deepfakes in an unprotected cloud database. This article has been indexed from Malwarebytes Read the original article: “Nudify” deepfakes stored unprotected online

Firefox 137 Launches with Patches for High-Severity Security Flaws

Mozilla has officially launched Firefox 137 with crucial security fixes aimed at addressing several high-severity vulnerabilities reported by security researchers. As part of its April 1, 2025, Mozilla Foundation Security Advisory (MFSA 2025-20), the foundation detailed three significant Common Vulnerabilities…

Top Ten Passwords Used by Hackers to Attack the RDP Servers

The most common passwords hackers are using in attacks against Remote Desktop Protocol (RDP) services, highlighting critical vulnerabilities in many organizations’ security postures.  The Specops research team analyzed 15 million passwords used in live attacks against RDP ports, revealing that…

Google Brings End-to-End Encryption for Gmail Business Users

Google has launched a new end-to-end encryption (E2EE) model for Gmail enterprise users, marking a significant advancement in email security that allows business customers to send fully encrypted emails to any recipient with minimal technical complexity.  Announced on April 1,…

North Korea’s IT Operatives Are Exploiting Remote Work Globally

The global rise of North Korean IT worker infiltration poses a serious cybersecurity risk—using fake identities, remote access, and extortion to compromise organizations. The post North Korea’s IT Operatives Are Exploiting Remote Work Globally appeared first on SecurityWeek. This article…