Cybersecurity
-
3 Questions: How AI is helping us monitor and support vulnerable ecosystems
Source: MIT AI NewsRead more: 3 Questions: How AI is helping us monitor and support vulnerable ecosystemsA study highlights AI’s role in monitoring endangered animal species amidst climate change. Researchers at MIT emphasize new algorithms like…
-
New TruffleNet BEC Campaign Leverages AWS SES Using Stolen Credentials to Compromise 800+ Hosts
Source: Cyber Security NewsRead more: New TruffleNet BEC Campaign Leverages AWS SES Using Stolen Credentials to Compromise 800+ HostsThe TruffleNet campaign exploits stolen AWS credentials, leveraging the Simple Email Service for Business Email Compromise (BEC) attacks. Involving over…
-
Fake Solidity VSCode Extension Backdoors Developers
Source: BleepingComputerRead more: Fake Solidity VSCode Extension Backdoors DevelopersA remote access trojan named SleepyDuck masquerades as the Solidity extension in the Open VSX registry. It utilizes an Ethereum…
-
Incident Response Professionals Indicted for Ransomware Attacks
Source: CyberScoopRead more: Incident Response Professionals Indicted for Ransomware AttacksThree cybersecurity professionals are accused of carrying out ransomware attacks against five U.S. businesses in 2023 instead of providing incident…
-
Microsoft SesameOp Malware Uses OpenAI API for Attacks
Source: BleepingComputerRead more: Microsoft SesameOp Malware Uses OpenAI API for AttacksMicrosoft has identified a new backdoor malware named SesameOp that exploits the OpenAI Assistants API for command-and-control communications. This malware…
-
Malicious VSX Extension SleepyDuck Discovered
Source: The Hacker NewsRead more: Malicious VSX Extension SleepyDuck DiscoveredA new malicious extension in the Open VSX registry has been flagged. It contains a remote access trojan called SleepyDuck,…
-
Hackers Weaponize Remote Tools to Hijack Cargo Freight
Source: Dark ReadingRead more: Hackers Weaponize Remote Tools to Hijack Cargo FreightA new threat campaign has emerged where attackers utilize remote management tools to steal physical cargo from the supply chain.…
-
Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User Data
Source: Cyber Security NewsRead more: Hackers Can Manipulate Claude AI APIs with Indirect Prompts to Steal User DataHackers are able to exploit Anthropic’s Claude AI to extract sensitive user data through indirect prompt injection. This vulnerability allows…
-
Microsoft Patch for WSUS Vulnerability Has Broken Hotpatching on Windows Server 2025
Source: Cyber Security NewsRead more: Microsoft Patch for WSUS Vulnerability Has Broken Hotpatching on Windows Server 2025Microsoft’s recent security update for WSUS has disrupted hotpatching functionality on some Windows Server 2025 systems. This issue, associated with…
-
US Cybersecurity Experts Indicted for BlackCat Ransomware Attacks
Source: BleepingComputerRead more: US Cybersecurity Experts Indicted for BlackCat Ransomware AttacksThree former employees of cybersecurity firms have been indicted for hacking the networks of five U.S. companies using BlackCat ransomware.…








