#ai-enabled-attacks

[ follow ]
Information security
fromSecuritymagazine
1 week ago

The New Era of Supply Chain Attacks: When One Falls, All Fall

Modern supply chains are highly vulnerable to third-party attacks; legacy risk management and limited partner visibility expose organizations to cascading operational, financial, and reputational harm.
Information security
fromSecuritymagazine
1 month ago

When Employees Help Hackers: How Threat Actors Bypass MFA

Criminals increasingly bypass MFA by tricking employees with sophisticated phishing, driving business email compromise and largely irretrievable wire fraud losses.
fromTechzine Global
1 month ago

Cybercriminal installs security software only to be found out by it

A cyber attacker installed the Huntress endpoint security solution to protect himself. What he didn't realize was that this allowed Huntress to monitor his activities. Despite some controversy, the security company claims that valuable information was obtained. When a host signaled malware to Huntress, it turned out to be an old acquaintance: the same "machine name," or unique device identifier, had appeared in several previous incidents.
Information security
fromSecuritymagazine
1 month ago

Critical Steps to Strengthening Satellite Network Security

Satellite networks are integral to myriad aspects of modern society, providing essential services that support both civilian and military operations. As our dependency on satellite networks has increased, so has the risk of cyber threats targeting these critical infrastructures. Any disruption of satellite services can negatively impact everything from emergency response systems to financial transactions to navigation. That makes ensuring the cybersecurity of satellite networks essential to maintaining global stability and security.
Information security
Information security
fromTheregister
2 months ago

Crims boast of using HexStrike AI against Citrix bugs

HexStrike AI's release enabled rapid criminal adoption against Citrix NetScaler flaws, sharply reducing the time between disclosure and widespread exploitation.
[ Load more ]