Category: EN

Cybercriminals Weaponize AI for Large-Scale Extortion and Ransomware Attacks

  AI company Anthropic has uncovered alarming evidence that cybercriminals are weaponizing artificial intelligence tools for sophisticated criminal operations. The company’s recent investigation revealed three particularly concerning applications of its Claude AI: large-scale extortion campaigns, fraudulent recruitment schemes linked to…

Box Shield Pro monitors AI workflows and sensitive data

Box announced Box Shield Pro, a new suite of security capabilities powered by AI, that builds on the company’s flagship content protection solution, Box Shield. With Box Shield Pro, customers can automatically apply AI-driven classification, accelerate threat response with agentic…

N-able’s Cat-MIP standardizes terminology for AI automation

N-able has introduced Cat-MIP, a solution designed to standardize and document terminology for AI automation and MCP Server behaviors across MSP and IT ecosystems. This breakthrough enables IT service providers to harness AI more effectively for enhanced business and cybersecurity…

Anthropic’s Claude AI Weaponized in $500K Cybercrime Spree

An unprecedented breach turned Claude into a cybercriminal, highlighting the risks of autonomous AI. The post Anthropic’s Claude AI Weaponized in $500K Cybercrime Spree appeared first on eSecurity Planet. This article has been indexed from eSecurity Planet Read the original…

Critical Chrome Vulnerability Earns Researcher $43,000

Google patched a critical use-after-free vulnerability in Chrome that could potentially lead to code execution. The post Critical Chrome Vulnerability Earns Researcher $43,000 appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Critical Chrome…

How the retail sector teams up to defend against cybercrime

The cyber-threat intel-sharing and collaboration group RH-ISAC is helping companies confront cyberattacks. But the challenge is delivering timely intelligence in a dynamic threat environment. This article has been indexed from Cybersecurity Dive – Latest News Read the original article: How…