Rogue AI is the Future of Cyber Threats
Credit to Author: AI Team| Date: Thu, 15 Aug 2024 00:00:00 +0000
This is the first blog in a series on Rogue AI. Later articles will include technical guidance, case studies and more.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: AI Team| Date: Thu, 15 Aug 2024 00:00:00 +0000
This is the first blog in a series on Rogue AI. Later articles will include technical guidance, case studies and more.
Read MoreCredit to Author: Juan Pablo Castro| Date: Fri, 02 Aug 2024 00:00:00 +0000
Explore how the Cybersecurity Compass can guide various security professionals’ and stakeholders’ decision-making before, during, and after a breach.
Read MoreCredit to Author: Jaromir Horejsi| Date: Thu, 01 Aug 2024 00:00:00 +0000
We uncovered a malvertising campaign where the threat actor hijacks social media pages, renames them to mimic popular AI photo editors, then posts malicious links to fake websites.
Read MoreCredit to Author: Trend Micro Research| Date: Tue, 09 Jul 2024 00:00:00 +0000
Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important.
Read MoreCredit to Author: Trend Micro Research| Date: Tue, 09 Jul 2024 00:00:00 +0000
Cybersecurity teams are well-equipped to handle threats to technology assets that they manage. But with unmanaged devices providing ideal spots for attackers to lurk unseen, network detection and response capabilities have become vitally important.
Read MoreCredit to Author: Cedric Pernet| Date: Thu, 27 Jun 2024 00:00:00 +0000
In this blog we uncover threat actors using the 2024 Olympics to lure victims into investing in an initial coin offering (ICO). Similar schemes have been found to use AI-generated images for their fake ICO websites.
Read MoreCredit to Author: Sunil Bharti| Date: Thu, 06 Jun 2024 00:00:00 +0000
We analyze a cryptojacking attack campaign exploiting exposed Docker remote API servers to deploy cryptocurrency miners, using Docker images from the open-source Commando project.
Read MoreCredit to Author: Pierre Lee| Date: Thu, 16 May 2024 00:00:00 +0000
This report describes how Waterbear and Deuterbear — two of the tools in Earth Hundun’s arsenal — operate, based on a campaign from 2024.
Read More