Category: EN

Hackers Using Generative AI ‘ChatGPT’ to Evade Anti-virus Defenses

In mid-July 2025, a novel campaign emerged in which cybercriminals weaponized generative AI to fabricate deepfake images of government IDs, embedding them within spear-phishing messages that bypassed traditional antivirus safeguards. These emails impersonated military and security institutions, complete with convincing…

DEF CON 33: DEFCON AIxCC Lacrosse Team

Creators, Authors and Presenters: Silk Our sincere appreciation to DEF CON, and the Creators/Presenters/Authors for publishing their timely DEF CON 33 outstanding content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube…

SEO Poisoning Targets Chinese Users with Fake Software Sites

SEO poisoning attack has been observed targeting Chinese Windows users via lookalike domains, installing Hiddengh0st and Winos This article has been indexed from www.infosecurity-magazine.com Read the original article: SEO Poisoning Targets Chinese Users with Fake Software Sites

HybridPetya Mimics NotPetya, Adds UEFI Compromise

HybridPetya ransomware mimics Petya/NotPetya, with an added UEFI bootkit and Secure Boot bypass This article has been indexed from www.infosecurity-magazine.com Read the original article: HybridPetya Mimics NotPetya, Adds UEFI Compromise

CISA audit sparks debate about cybersecurity pay incentives

Some Cybersecurity and Infrastructure Security Agency employees believe a recent inspector general’s report partially missed the mark. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: CISA audit sparks debate about cybersecurity pay incentives

Cisco Patched Multiple IOS XR Vulnerabilities

Cisco recently addressed multiple vulnerabilities in IOS XR, one of which could allow image signature… Cisco Patched Multiple IOS XR Vulnerabilities on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses. This article has been indexed…

Phishing Campaigns Exploit RMM Tools to Sustain Remote Access

A sophisticated phishing operation in which attackers deploy remote monitoring and management (RMM) tools—ITarian (formerly Comodo), PDQ Connect, SimpleHelp, and Atera—to gain persistent remote access to compromised systems. By disguising malicious installers as legitimate browser updates, meeting or party invitations,…

Notorious Cyber Gang Vanishes, Leaves Behind Chilling Trail

Scattered Lapsus$ Hunters’ goodbye warns their tools will persist, heralding stealthier cybercrime. The post Notorious Cyber Gang Vanishes, Leaves Behind Chilling Trail appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original article: Notorious…