How to Weaponize Microsoft Copilot for Cyberattackers

Copilot is an AI-based chatbot used by enterprises to streamline tasks, but it can also be manipulated by attackers to steal data and conduct phishing scams without leaving a trace.

Generative AI is a Looming Cybersecurity Threat

Researchers have not identified any AI-engineered cyberattack campaigns, yet, but they say it’s only a matter of time before an AI system is dominant enough in the market to draw attention.

NIST Warns of Security and Privacy Risks from Rapid AI System Deployment

The increased deployment of AI systems poses significant security and privacy challenges, including adversarial manipulation of training data and the potential exfiltration of sensitive information.

Hackers Could Abuse Google Calendar as a Covert C2 Channel

Google has warned about a new threat called Google Calendar RAT (GCR) that uses the Calendar service as command-and-control infrastructure. It creates a covert channel by exploiting event descriptions in Google Calendar, making detection difficult.

As Biohacking Evolves, How Vulnerable are we to Cyber Threats?

The security of implantable technologies lies in the devices themselves, not the human body, and it is crucial to prioritize the security of these technologies before implanting them.

UK Opposition Leader Targeted by AI-Generated Fake Audio Smear

An audio clip of UK opposition leader Keir Starmer verbally abusing his staff, which gained significant traction on social media, has been debunked as AI-generated by private-sector and government analysis.

Dead Grandma Locket Request Tricks Bing Chat’s AI Into Solving Security Puzzle

This incident highlights a new type of vulnerability, similar to prompt injection, where users can bypass the constraints of the AI model. Microsoft is likely to address this issue in future versions of Bing Chat.

Defunct Avaddon Rebranded as NoEscape Ransomware

Defunct Avaddon Rebranded as NoEscape Ransomware - Cybersecurity news - Emerging Threats
A strong argument for a connection has been established between the NoEscape ransomware and the obsolete Avaddon group. The encryption algorithms used by NoEscape and Avaddon ransomware are nearly identical, except that NoEscape switched to using the Salsa20 algorithm. Furthermore, sources have con ... Read More

Emerging Romanian Hacking Group Diicot Steals Cryptocurrency

Emerging Romanian Hacking Group Diicot Steals Cryptocurrency - Cybersecurity news - Emerging Threats
Cado Security spotted the Romanian threat actor Diicot using Cayosin, a variant of Mirai, to launch DDoS and cryptojacking attacks in its latest campaign. The campaign is ongoing and targets OpenWrt routers.  It is claimed that the hacking group is evolving tactics to expand its attack scope.

Microsoft Warns of AitM Phishing Attacks Against Financial Organizations

Microsoft Warns of AitM Phishing Attacks Against Financial Organizations - Cybersecurity news - Emerging Threats
A newly discovered multi-stage AitM phishing and BEC attack campaign has been targeting banking and financial organizations. The phishing kit enabled the attackers to send out more than 16,000 emails to a target’s contacts as part of the second-stage phishing campaign. To remediate the issue, it is ... Read More

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags