A sophisticated malware campaign distributing the Grandoreiro banking trojan has been targeting users in Mexico, Argentina, and Spain through elaborate phishing emails impersonating tax agencies. The attack leverages a multi-stage infection chain that begins with fraudulent government notifications claiming recipients…
Malicious Microsoft VS Code Extensions Used in Cryptojacking Campaign
Security researchers from ExtensionTotal have found nine malicious extensions in Visual Studio Code, Microsoft’s lightweight source-code editor This article has been indexed from www.infosecurity-magazine.com Read the original article: Malicious Microsoft VS Code Extensions Used in Cryptojacking Campaign
UK’s demand for Apple backdoor should not be heard in secret, says court
A UK surveillance court said the backdoor order targeting Apple iCloud can be heard partly in public. This article has been indexed from Security News | TechCrunch Read the original article: UK’s demand for Apple backdoor should not be heard…
Is your phone listening to you? (Lock and Code S06E07)
This week on the Lock and Code podcast, we speak with Lena Cohen about whether our phones are really listening to us to deliver ads. This article has been indexed from Malwarebytes Read the original article: Is your phone listening…
Google Pushing ‘Sec-Gemini’ AI Model for Threat-Intel Workflows
Experimental Sec-Gemini v1 touts a combination of Google’s Gemini LLM capabilities with real-time security data and tooling from Mandiant. The post Google Pushing ‘Sec-Gemini’ AI Model for Threat-Intel Workflows appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
The AI Alibi Defense: How General-Purpose AI Agents Obscure Criminal Liability
As these AI agents become more capable of behaving like autonomous actors — clicking, typing, downloading, exfiltrating, or engaging in arguably criminal behavior — they may also become unintended scapegoats or even tools of plausible deniability. The post The AI…
Midjourney 7 ausprobiert: So schlägt sich die Bild-KI gegen die Konkurrenz von OpenAI und Co.
Mit Version 7 hat Midjourney das erste große Update seit fast einem Jahr erhalten. Wir haben uns angeschaut, was die Bild-KI jetzt besser macht – und wo das neue Modell noch Probleme hat. Dieser Artikel wurde indexiert von t3n.de –…
Desinformation bei ChatGPT und Co.: “Der Propagandagenerator ist immer einen Schritt voraus”
Eine aktuelle Studie zeigt, dass KI-Chatbots mit Online-Suchfunktion nicht selten Falschinformationen von Propagandaportalen als Fakten ausgeben. Wie stehen die Betreiber dazu und wie kann man sich davor schützen? Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie…
Wie groß sind Prominente wirklich? So wollen es Nutzer auf dieser Webseite herausfinden
Wie groß sind Prominente wirklich? Mit dieser fast schon philosophischen Frage beschäftigt sich seit mehr als 20 Jahren eine spezielle Webseite. Sie nutzt dazu die Schwarmintelligenz. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung Lesen Sie den originalen…
Google Gemini Live: So analysiert ihr mit der KI jetzt eure Umgebung
Google spendiert der Gemini-App neue Funktionen. Erste User:innen dürfen die KI einsetzen, um ihre Umgebung und ihr Smartphone selbst analysieren zu lassen. Welche Vorteile die Neuerung im Alltag haben soll. Dieser Artikel wurde indexiert von t3n.de – Software & Entwicklung…
Elon Musk eher rechts, Grok eher links – und das ist kein Zufall
Grok 3 soll „politisch neutral“ und immun gegen den „woken mind virus“ sein. Trotzdem lässt sich der KI-Chatbot kinderleicht von linken Standpunkten überzeugen. Denn mit Lagerbildung kann Elon Musk kein Geld verdienen, meint unser Autor. Dieser Artikel wurde indexiert von…
Signal-Gate: iPhone-Funktion steckt hinter Einladung von US-Journalist
Wie gelangte ein Journalist in einen hochgeheimen Signal-Chat der US-Regierung? Eine interne Untersuchung soll nun den Vorgang geklärt haben. (Signal, Instant Messenger) Dieser Artikel wurde indexiert von Golem.de – Security Lesen Sie den originalen Artikel: Signal-Gate: iPhone-Funktion steckt hinter Einladung…
Windows Remote Desktop Protocol: Remote to Rogue
Written by: Rohit Nambiar Executive Summary In October 2024, Google Threat Intelligence Group (GTIG) observed a novel phishing campaign targeting European government and military organizations that was attributed to a suspected Russia-nexus espionage actor we track as UNC5837. The campaign…
Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader
In a sophisticated attack targeting individuals searching for PDF documents online, cybercriminals are using deceptive CAPTCHA mechanisms combined with Cloudflare’s Turnstile to distribute the LegionLoader malware. According to Netskope Threat Labs, this campaign, which started in February 2025, has affected…
World Health Day 2025: When Cyber Security Fails, So Does Public Health
On World Health Day 2025, we are reminded that health is not only about biology and behavior—it’s about infrastructure, access, and now, cyber security. As this important critical sector grows increasingly digital, it also becomes increasingly vulnerable. Patient lives, sensitive…
A member of the Scattered Spider cybercrime group pleads guilty
A 20-year-old man linked to the Scattered Spider cybercrime group has pleaded guilty to charges filed in Florida and California. Noah Urban, a 20-year-old from Palm Coast, pleaded guilty to conspiracy, wire fraud, and identity theft in two federal cases,…
SpyCloud Research Shows that EDR & Antivirus Solutions Miss Two-Thirds (66%) of Malware Infections
Deep visibility into malware-siphoned data can help close gaps in traditional defenses before they evolve into major cyber threats like ransomware and account takeover SpyCloud, the leading identity threat protection company, today released new analysis of its recaptured darknet data…
ToddyCat Hackers Exploit ESET’s Command Line Scanner Vulnerability to Evade Detection
ToddyCat, the notorious APT group, used a sophisticated attack strategy to stealthily deploy malicious code in targeted systems by exploiting a weakness in ESET’s command line scanner. The vulnerability, now tracked as CVE-2024-11859, allowed attackers to bypass security monitoring tools…
Everest Ransomware Gang Leak Site Hacked and Defaced
The Everest ransomware gang, a Russia-linked cybercriminal organization, faced an unexpected setback this weekend when its dark web leak site was hacked and defaced. The site, typically used to publish stolen data as part of the gang’s extortion tactics, was…
New Black-Hat Automated Hacking Tool Xanthorox AI Advertised in Hacker Forums
A new malicious AI platform named Xanthorox AI has emerged, positioning itself as a friendly tool for hackers. First spotted in late Q1 2025, Xanthorox AI is being promoted in underground cybercrime forums as a modular, self-hosted solution for automated…
20-Year-Old Scattered Spider Hacker Pleads Guilty Of Sophisticated Ransomware Attacks
A 20-year-old Florida man identified as a key member of the notorious “Scattered Spider” cybercriminal collective has pleaded guilty to orchestrating sophisticated ransomware attacks and cryptocurrency theft schemes targeting major corporations. Noah Urban, also known by aliases “King Bob” and…
UK’s attempt to keep details of Apple ‘backdoor’ case secret… denied
Last month’s secret hearing comes to light Details of Apple’s appeal against the UK’s so-called “backdoor order” will now play out in public after the Home Office failed in its bid to keep them secret on national security grounds.… This…
Chrome to patch decades-old flaw that let sites peek at your history
After 23 years, the privacy plumber has finally arrived to clean up this mess A 23-year-old side-channel attack for spying on people’s web browsing histories will get shut down in the forthcoming Chrome 136, released last Thursday to the Chrome…
⚡ Weekly Recap: VPN Exploits, Oracle’s Silent Breach, ClickFix Surge and More
Today, every unpatched system, leaked password, and overlooked plugin is a doorway for attackers. Supply chains stretch deep into the code we trust, and malware hides not just in shady apps — but in job offers, hardware, and cloud services…