Aggregator
邮箱相关的功能的测试
Nigeria jails 9 Chinese nationals for being part of international cyberfraud syndicate
Beware: Fake AI Business Tools Spreading Hidden Ransomware
As small businesses increasingly adopt artificial intelligence (AI) tools to streamline operations, cybercriminals are seizing the opportunity to deploy ransomware through deceptive campaigns. According to a recent report by Cisco Talos, attackers are masquerading as legitimate AI software providers, embedding malware within counterfeit applications that mimic popular services. With 98% of small businesses using at […]
The post Beware: Fake AI Business Tools Spreading Hidden Ransomware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Sausages and incentives: rewarding a resilient technology future
Report on the Malicious Uses of AI
OpenAI just published its annual report on malicious uses of AI.
By using AI as a force multiplier for our expert investigative teams, in the three months since our last report we’ve been able to detect, disrupt and expose abusive activity including social engineering, cyber espionage, deceptive employment schemes, covert influence operations and scams.
These operations originated in many parts of the world, acted in many different ways, and focused on many different targets. A significant number appeared to originate in China: Four of the 10 cases in this report, spanning social engineering, covert influence operations and cyber threats, likely had a Chinese origin. But we’ve disrupted abuses from many other countries too: this report includes case studies of a likely task scam from Cambodia, comment spamming apparently from the Philippines, covert influence attempts potentially linked with Russia and Iran, and deceptive employment schemes...
The post Report on the Malicious Uses of AI appeared first on Security Boulevard.
New PathWiper data wiper malware hits critical infrastructure in Ukraine
Неравенство с зеркала: как внешность определяет шансы в жизни
OpenAI takes down ChatGPT accounts linked to state-backed hacking, disinformation
Scattered Spider Hackers Target Tech Company Help-Desk Administrators
A newly identified wave of cyberattacks by the notorious Scattered Spider hacking group has zeroed in on help-desk administrators at major technology companies, leveraging advanced social engineering techniques to breach corporate defenses. Known for their adept use of psychological manipulation, these threat actors have demonstrated a chilling ability to exploit human vulnerabilities as effectively as […]
The post Scattered Spider Hackers Target Tech Company Help-Desk Administrators appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
AI and Wearable Health Tech: Real-Time Insights for Preventive Care
What if your smartwatch could spot a heart condition before your doctor did? That’s not science fiction, it’s today’s reality. Powered by artificial intelligence, wearable...Read More
The post AI and Wearable Health Tech: Real-Time Insights for Preventive Care appeared first on ISHIR | Software Development India.
The post AI and Wearable Health Tech: Real-Time Insights for Preventive Care appeared first on Security Boulevard.
Off-brand IoT devices are still vulnerable to BadBox botnet, FBI says
Akira
You must login to view this content
Scattered Spider Uses Tech Vendor Impersonation and Phishing Kits to Target Helpdesks
Synthetic Data Is Here to Stay, but How Secure Is It?
Microsoft Unveils European Security Program to Target Cybercriminal Networks
To combat malicious actors across Europe, Microsoft has introduced a comprehensive European Security Program designed to tackle sophisticated cybercriminal networks targeting European infrastructure. Announced in Berlin on June 4, 2025, the initiative specifically targets ransomware groups and state-sponsored threat actors from Russia, China, Iran, and North Korea, who continue to evolve in scope and sophistication. […]
The post Microsoft Unveils European Security Program to Target Cybercriminal Networks appeared first on Cyber Security News.
New Mirai Variant Exploits TBK DVR Flaw for Remote Code Execution
The latest wave of Mirai botnet activity has resurfaced with a refined attack chain exploiting CVE-2024-3721, a critical command injection vulnerability in TBK DVR-4104 and DVR-4216 devices. This campaign leverages unpatched firmware to deploy a modified Mirai variant designed for IoT device hijacking and DDoS operations. Exploitation Vector & Payload Delivery Attackers exploit the vulnerability […]
The post New Mirai Variant Exploits TBK DVR Flaw for Remote Code Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Microsoft Unveils European Security Effort to Disrupt Cybercrime Networks
A critical heap-based buffer overflow vulnerability, tracked as CVE-2025-24993, has been discovered in the Windows New Technology File System (NTFS), posing a significant threat to millions of Windows users globally. The flaw, patched during Microsoft’s March 2025 Patch Tuesday, was actively exploited as a zero-day in the wild, prompting urgent advisories from both Microsoft and […]
The post Microsoft Unveils European Security Effort to Disrupt Cybercrime Networks appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
ViperSoftX Malware Used by Threat Actors to Steal Sensitive Information
The AhnLab Security Intelligence Center (ASEC) has recently issued a detailed report confirming the persistent distribution of ViperSoftX malware by threat actors, with notable impact on users in South Korea and beyond. First identified by Fortinet in 2020, ViperSoftX is a sophisticated PowerShell-based malware designed to infiltrate infected systems, execute remote commands, and steal sensitive […]
The post ViperSoftX Malware Used by Threat Actors to Steal Sensitive Information appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.