#nation-state-hacking

[ follow ]
fromBusiness Insider
2 weeks ago

Anthropic says Chinese hackers jailbroke its AI to automate 'large-scale' cyberattack

Anthropic says Chinese nation-state hackers hijacked its AI model Claude to carry out a cyberattack without "substantial" human involvement. In a Thursday blog post, the startup said Claude handled about "80-90%" of the cyberattack against about 30 global targets and that it had "high confidence" that a Chinese state-sponsored group was behind it. Targets included large tech firms, financial institutions, chemical-manufacturing companies, and government agencies, Anthropic said.
Artificial intelligence
fromwww.bbc.com
2 weeks ago

AI firm claims Chinese spies used its tech to automate cyber attacks

The makers of artificial intelligence (AI) chatbot Claude claim to have caught Chinese government hackers using the tool to perform automated cyber attacks against around 30 global organisations. Anthropic said hackers tricked the chatbot into carrying out automated tasks under the guise of carrying out cyber security research. The company claimed in a blog post this was the "first reported AI-orchestrated cyber espionage campaign".
Artificial intelligence
fromAbove the Law
3 weeks ago

Trump Cybersecurity Policy Is Indistinguishable From A Foreign Attack - Above the Law

Last year almost a dozen major U.S. ISPs were the victim of a massive, historic intrusion by Chinese hackers who managed to spy on public U.S. officials for more than a year. The "Salt Typhoon" hack was so severe, the intruders spent much of the last year rooting around the ISP networks even after discovery. AT&T and Verizon, two of the compromised companies, apparently didn't think it was worth informing subscribers any of this happened.
Information security
fromNextgov.com
4 weeks ago

AI has leveled the field between cybercriminals and nation-state hackers, FBI official says

The FBI has not been as quick to adopt AI in its day-to-day operations because it handles sensitive data that requires stringent protections and oversight to maintain security and legal standards, he said. "We're trying to catch up in many ways, and part of that is because we have very sensitive datasets that we have to make sure we protect because of the authorities that we have," Leatherman said.
Information security
#cybersecurity
fromTechCrunch
4 weeks ago
Information security

Government hackers breached telecom giant Ribbon for months before getting caught | TechCrunch

fromNextgov.com
3 months ago
US politics

Wyden calls for review of US court systems' cyber posture after case system hack

U.S. federal courts' outdated cybersecurity and lack of mandatory standards allowed a breach exposing sensitive legal records and informant identities, posing national security risks.
fromThe Hacker News
5 months ago
Artificial intelligence

OpenAI Bans ChatGPT Accounts Used by Russian, Iranian and Chinese Hacker Groups

OpenAI identified and banned accounts used by threat actors for developing malware and social media manipulation.
fromTechCrunch
4 weeks ago
Information security

Government hackers breached telecom giant Ribbon for months before getting caught | TechCrunch

Science
fromTheregister
1 month ago

CISA exec blames hackers, Democrats for network risk

Exploitable vulnerabilities in F5 BIG-IP devices create imminent risk of lateral access and full compromise of US federal networks; urgent patches and inventories are required.
Information security
fromArs Technica
1 month ago

Breach of F5 requires "emergency action" from BIG-IP users, feds warn

A nation-state hacking group breached F5, stole BIG-IP build systems, source code, and customer configurations, creating imminent supply-chain exploitation risk for thousands of networks.
Information security
fromBusiness Insider
2 months ago

Fake military IDs, bogus resumes: How North Korean and Chinese hackers use AI tools to infiltrate companies and other targets

North Korean and Chinese hackers use AI tools like ChatGPT and Claude to create fake IDs, résumés, and phishing materials to enable espionage and unauthorized access.
Information security
fromThe Hacker News
3 months ago

Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More

Effective cybersecurity requires strategic alignment with business, trust, and geopolitics rather than relying solely on technical tools.
Information security
fromIT Pro
3 months ago

Russian hackers are using an old Cisco flaw to target network devices - here's how you can stay safe

Russian government-linked hackers exploit unpatched Cisco Smart Install (CVE-2018-0171) and SNMP to exfiltrate and manipulate network device configurations across critical infrastructure sectors globally.
[ Load more ]