Tag: EN

PureHVNC RAT Distributed via Weaponized Judicial Documents

The campaign leverages judicial document themes to distribute Hijackloader malware, which subsequently deploys PureHVNC remote access trojan (RAT)—marking the first observed instance where this combination has been used against Spanish-speaking users in Latin America. The campaign represents a significant tactical…

StrongestLayer Adds AI Reasoning Engine to Validate Emails

StrongestLayer has launched AI Advisor, an advanced email protection tool powered by large language models (LLMs) that evaluates message provenance in real time to detect phishing attacks. By triangulating sender legitimacy and assigning dynamic risk scores, AI Advisor cuts false…

How to reduce your TCO with Check Point’s SASE

Network security solutions can be complex and expensive to operate, especially when based on hardware appliances. Additionally, they can degrade performance, which can impact productivity. Adopting the right solution can help simplify the network, reduce costs, improve productivity and time…

Cybercriminals Launch Flood of Fake Forex Platforms to Harvest Logins

Fraudulent investment platforms impersonating legitimate cryptocurrency and forex exchanges have emerged as the primary financial threat across Asia, with organized crime groups operating at unprecedented scale. These sophisticated scams leverage social engineering tactics to deceive victims into transferring funds to…

Gmail breach panic? It’s a misunderstanding, not a hack

No, Gmail wasn’t hacked. But a flood of old stolen credentials on the dark web sparked headlines suggesting otherwise. Here’s what really happened. This article has been indexed from Malwarebytes Read the original article: Gmail breach panic? It’s a misunderstanding,…

AI Security Firm Polygraf Raises $9.5 Million in Seed Funding

Polygraf AI has developed proprietary small language model (SLM) technology designed to help organizations mitigate AI risks. The post AI Security Firm Polygraf Raises $9.5 Million in Seed Funding appeared first on SecurityWeek. This article has been indexed from SecurityWeek…