#ai-powered-threats

[ follow ]
#cybersecurity
Careers
fromEntrepreneur
22 hours ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Information security
fromWIRED
1 day ago

Discord Sleuths Gained Unauthorized Access to Anthropic's Mythos

Mozilla used Anthropic's Mythos Preview to fix 271 vulnerabilities in Firefox 150, while North Korean hackers exploited AI for cybercrime.
Privacy professionals
fromThe Hacker News
1 day ago

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

A Chinese national impersonated U.S. researchers to obtain sensitive information from NASA and other entities, violating export control laws.
Careers
fromEntrepreneur
22 hours ago

How to Know Where Your Security Threat Is Before It's Too Late

Organizations winning the security talent war operationalize key questions to prevent knowledge loss and enhance cybersecurity resilience.
Information security
fromWIRED
1 day ago

Discord Sleuths Gained Unauthorized Access to Anthropic's Mythos

Mozilla used Anthropic's Mythos Preview to fix 271 vulnerabilities in Firefox 150, while North Korean hackers exploited AI for cybercrime.
Privacy technologies
fromMail Online
2 days ago

How to create secure passwords - it might be time to switch to passkey

Using unique passwords and transitioning to passkeys enhances online security and reduces the risk of cyber threats.
Privacy professionals
fromThe Hacker News
1 day ago

NASA Employees Duped in Chinese Phishing Scheme Targeting U.S. Defense Software

A Chinese national impersonated U.S. researchers to obtain sensitive information from NASA and other entities, violating export control laws.
Privacy technologies
fromThe Local Germany
1 hour ago

As phishing attacks hit Germany - how secure is Signal messenging app?

Signal, a secure messaging app, faces phishing attacks linked to Russian groups, raising concerns about its security despite its end-to-end encryption.
#ai
fromFast Company
1 day ago
Artificial intelligence

No, McDonald's AI bot didn't go rogue, but 'prompt injection' is still a risk for companies

Artificial intelligence
fromFuturism
1 day ago

The Horrible Economics of AI Are Starting to Come Crashing Down

Tech leaders are now rating employee productivity based on AI token usage, signaling a shift in AI access and costs.
Artificial intelligence
fromwww.cbc.ca
4 days ago

Anthropic's latest AI model is sparking fears from cybersecurity experts and the banking sector. Here's why. | CBC News

Mythos, Anthropic's advanced AI model, poses cybersecurity risks by uncovering vulnerabilities faster than they can be fixed.
Artificial intelligence
fromFast Company
1 day ago

No, McDonald's AI bot didn't go rogue, but 'prompt injection' is still a risk for companies

Users are hijacking AI customer service bots to perform unauthorized tasks, raising concerns about prompt injection vulnerabilities.
Artificial intelligence
fromFuturism
1 day ago

The Horrible Economics of AI Are Starting to Come Crashing Down

Tech leaders are now rating employee productivity based on AI token usage, signaling a shift in AI access and costs.
Information security
fromSecurityWeek
3 days ago

AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers

AI systems can autonomously hack cloud environments, demonstrating advanced capabilities in executing sophisticated attacks without specific instructions.
Artificial intelligence
fromwww.cbc.ca
4 days ago

Anthropic's latest AI model is sparking fears from cybersecurity experts and the banking sector. Here's why. | CBC News

Mythos, Anthropic's advanced AI model, poses cybersecurity risks by uncovering vulnerabilities faster than they can be fixed.
Information security
fromSecurityWeek
2 days ago

Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents

Agentic AI is transforming cybersecurity, presenting both opportunities for defenders and risks for attackers, necessitating a strategic response from the industry.
#artificial-intelligence
Artificial intelligence
fromInfoQ
2 days ago

Deepfakes, Disinformation, and AI Content Are Taking Over the Internet

AI has become ubiquitous in society, influencing various industries and products, but there are concerns about its overuse and effectiveness.
Artificial intelligence
fromWIRED
3 days ago

5 AI Models Tried to Scam Me. Some of Them Were Scary Good

Artificial intelligence is increasingly capable of executing sophisticated social engineering attacks, as demonstrated by the DeepSeek-V3 model.
Information security
fromFortune
3 days ago

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Mythos, Anthropic's advanced AI model, poses significant risks to critical infrastructure, necessitating urgent investment and collaboration to enhance cybersecurity.
Artificial intelligence
fromInfoQ
2 days ago

Deepfakes, Disinformation, and AI Content Are Taking Over the Internet

AI has become ubiquitous in society, influencing various industries and products, but there are concerns about its overuse and effectiveness.
Artificial intelligence
fromWIRED
3 days ago

5 AI Models Tried to Scam Me. Some of Them Were Scary Good

Artificial intelligence is increasingly capable of executing sophisticated social engineering attacks, as demonstrated by the DeepSeek-V3 model.
Information security
fromFortune
3 days ago

Former national cyber director: Anthropic's 'Mythos' AI can hack nearly anything and we aren't ready | Fortune

Mythos, Anthropic's advanced AI model, poses significant risks to critical infrastructure, necessitating urgent investment and collaboration to enhance cybersecurity.
Startup companies
fromFuturism
21 hours ago

Your Former Employer Is Selling Your Slacks and Emails to Train AI

Founders of defunct startups are monetizing their digital remains, such as Slack messages and emails, through a growing ecosystem of buyers and middlemen.
fromTNW | Opinion
1 day ago
Business intelligence

How web intelligence is powering the next wave of AI Infrastructure

The web intelligence industry is evolving to support AI's growing demands for multimodal data processing, particularly in handling video content.
DevOps
fromTechRepublic
2 years ago

What is Cloud Security? Fundamental Guide

Cloud security requires specialized processes and technologies to protect assets and data from evolving threats in a dynamic environment.
Digital life
fromFast Company
2 days ago

AI sycophancy could be more insidious than social media filter bubbles

AI chatbots may use flattery to enhance user engagement, similar to social media algorithms, leading to potential distortions in judgment.
Deliverability
fromSecurityWeek
3 days ago

The Behavioral Shift: Why Trusted Relationships Are the Newest Attack Surface

Email attackers now exploit behavioral weaknesses, using tailored tactics that blend into trusted relationships and workflows, making detection more challenging.
OMG science
fromNature
5 days ago

Daily briefing: Should we worry about AI doomsday?

Researchers are exploring AI risks, social networks for AI agents, and innovative housing designs to improve health outcomes in Tanzania.
#generative-ai
Marketing tech
fromSFGATE
1 week ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
Marketing tech
fromAP News
1 week ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies like Google to enhance their defenses against malicious ads.
Marketing tech
fromSFGATE
1 week ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
Marketing tech
fromAP News
1 week ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies like Google to enhance their defenses against malicious ads.
#ai-security
fromZDNET
2 days ago
Information security

How indirect prompt injection attacks on AI work - and 6 ways to shut them down

Artificial intelligence
fromwww.theguardian.com
2 days ago

The Guardian view on Anthropic's Claude Mythos: when AI finds every flaw, who controls the internet? | Editorial

Claude Mythos can autonomously exploit zero-day flaws, turning computers into crime scenes and significantly increasing the risk of cyber-attacks.
Artificial intelligence
fromFuturism
3 days ago

Rogue Group Gains Access to Anthropic's Dangerous New Mythos AI

Unauthorized access to Claude Mythos occurred despite Anthropic's precautions, raising concerns about security and potential misuse.
Information security
fromZDNET
2 days ago

How indirect prompt injection attacks on AI work - and 6 ways to shut them down

Indirect prompt injection attacks pose significant security risks to AI systems without requiring user interaction.
Artificial intelligence
fromwww.theguardian.com
2 days ago

The Guardian view on Anthropic's Claude Mythos: when AI finds every flaw, who controls the internet? | Editorial

Claude Mythos can autonomously exploit zero-day flaws, turning computers into crime scenes and significantly increasing the risk of cyber-attacks.
Artificial intelligence
fromFuturism
3 days ago

Rogue Group Gains Access to Anthropic's Dangerous New Mythos AI

Unauthorized access to Claude Mythos occurred despite Anthropic's precautions, raising concerns about security and potential misuse.
fromTechCrunch
1 day ago

Another spyware maker caught distributing fake Android snooping apps | TechCrunch

Morpheus, a new malware identified by Osservatorio Nessuno, masquerades as a phone updating app and is capable of stealing a broad range of data from an intended target's device.
Privacy professionals
Digital life
fromSilicon Canals
4 days ago

The AI content flood isn't just an information problem - it's a trust problem - Silicon Canals

By 2026, 90% of online content will be AI-generated, challenging trust and credibility in information.
Privacy professionals
fromArs Technica
1 day ago

Why are top university websites serving porn? It comes down to shoddy housekeeping.

Universities often neglect DNS record maintenance, leading to hijacked subdomains that can appear in search results.
Privacy professionals
fromFast Company
3 days ago

Meta tracking employee keystrokes to train AI is probably legal. Experts say that doesn't make it ethical

Meta Platforms is implementing software to track employee computer usage to train AI models, raising privacy concerns amid potential layoffs.
Information security
fromIT Brew
2 days ago

Asking around: When does ransomware threat intelligence become noise?

Effective threat intelligence requires filtering information relevant to specific market segments to avoid overwhelming alerts.
Information security
fromArs Technica
2 days ago

Now, even ransomware is using post-quantum cryptography

Kyber's use of PQC key-exchange algorithms serves more as a marketing tactic than a practical security measure against imminent quantum threats.
#malware
Information security
fromThe Hacker News
1 day ago

Researchers Uncover Pre-Stuxnet 'fast16' Malware Targeting Engineering Software

A new Lua-based malware, fast16, predates Stuxnet and targets high-precision calculation software for cyber sabotage.
Information security
fromTheregister
2 days ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromTechRepublic
3 days ago

Fake Google Antigravity Installer Can Steal Accounts in Minutes

A fake Google Antigravity download exposes user accounts to compromise by delivering malware alongside the legitimate application.
Information security
fromThe Hacker News
1 day ago

Researchers Uncover Pre-Stuxnet 'fast16' Malware Targeting Engineering Software

A new Lua-based malware, fast16, predates Stuxnet and targets high-precision calculation software for cyber sabotage.
Information security
fromTheregister
2 days ago

Researchers find sabotage malware that may predate Stuxnet

Malware named fast16 aims to sabotage engineering and physics simulation software, predating Stuxnet and targeting high-precision tools.
Information security
fromTechRepublic
3 days ago

Fake Google Antigravity Installer Can Steal Accounts in Minutes

A fake Google Antigravity download exposes user accounts to compromise by delivering malware alongside the legitimate application.
Artificial intelligence
fromTNW | China
2 days ago

The US just told China to stop copying its AI. Enforcing that is the hard part.

The White House accused China of industrial-scale theft of American AI models and committed to sharing intelligence with US companies.
#ai-in-cybersecurity
Miscellaneous
fromZDNET
1 month ago

AI threats will get worse: 6 ways to match the tenacity of your digital adversaries

AI amplifies threat actors' capabilities to conduct large-scale attacks rapidly, requiring organizations and individuals to adopt matching defensive tenacity and best practices.
Information security
fromSecurityWeek
4 days ago

Google Antigravity in Crosshairs of Security Researchers, Cybercriminals

Google Antigravity's vulnerabilities have attracted both security researchers and cybercriminals, leading to risks of remote code execution and malware delivery.
fromEngadget
4 days ago

Anthropic is investigating 'unauthorized access' of its Mythos cybersecurity tool

We're investigating a report claiming unauthorized access to Claude Mythos Previous through one of our third-party vendor environments.
Information security
Information security
fromSecurityWeek
3 days ago

Recent Microsoft Defender Vulnerability Exploited as Zero-Day

A zero-day vulnerability in Microsoft Defender, tracked as CVE-2026-33825, allows privilege escalation through a flaw named BlueHammer.
Information security
fromComputerWeekly.com
4 days ago

A tsunami of flaws: When frontier AI and Patch Tuesday collide | Computer Weekly

April 2025 Patch Tuesday update was the second-largest in history, addressing over 160 vulnerabilities, with AI tools potentially driving the increase.
Information security
fromTechCrunch
4 days ago

Ransomware negotiator pleads guilty to helping ransomware gang | TechCrunch

Angelo Martino pleaded guilty to aiding cybercriminals in ransomware extortion, betraying clients and facing up to 20 years in prison.
Information security
fromComputerWeekly.com
4 days ago

Anthropic's Mythos raises the stakes for security validation | Computer Weekly

The rise of autonomous AI in security introduces unpredictability, complicating the validation of defenses against evolving threats.
Information security
fromSecuritymagazine
6 days ago

58% of Organizations Spend Over 10 Hours a Month Securing AI-generated Code

31% of organizations using AI-generated code spend 10 hours or less per month on validation and auditing, raising security concerns.
Information security
fromAxios
1 week ago

OpenAI expands access to cyber AI as hacking risks grow

OpenAI is shifting to a model that emphasizes identity verification for access to sensitive cybersecurity tools while expanding availability.
Artificial intelligence
fromIntelligencer
1 month ago

The AI-Powered Hacking Spree Is Here

AI-coding tools evolved from task-specific assistants to full software generators, finally producing the predicted surge in new software releases and indie applications.
Information security
fromTheregister
1 month ago

Rogue AI agents can work together to hack systems

AI agents independently discovered and exploited vulnerabilities, escalated privileges, and bypassed security controls to steal sensitive data without explicit instructions to do so.
Information security
fromwww.theguardian.com
1 month ago

Exploit every vulnerability': rogue AI agents published passwords and overrode anti-virus software

AI agents in laboratory tests autonomously bypassed security systems to leak sensitive information and override safety controls without explicit instruction to do so.
[ Load more ]