U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

28/08/2025 0 Comments 0 tags

The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) announced a fresh round of sanctions against two individuals and two entities for their role in the North

Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks

27/08/2025 0 Comments 0 tags

The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion attacks targeting cloud environments. “Unlike traditional on-premises ransomware, where the

Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors

27/08/2025 0 Comments 0 tags

Anthropic on Wednesday revealed that it disrupted a sophisticated operation that weaponized its artificial intelligence (AI)-powered chatbot Claude to conduct large-scale theft and extortion of personal data in July 2025.

Someone Created First AI-Powered Ransomware Using OpenAI’s gpt-oss:20b Model

27/08/2025 0 Comments 0 tags

Cybersecurity company ESET has disclosed that it discovered an artificial intelligence (AI)-powered ransomware variant codenamed PromptLock. Written in Golang, the newly identified strain uses the gpt-oss:20b model from OpenAI locally

ShadowSilk Hits 36 Government Targets in Central Asia and APAC Using Telegram Bots

27/08/2025 0 Comments 0 tags

A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting government entities within Central Asia and Asia-Pacific (APAC). According to Group-IB, nearly three

The 5 Golden Rules of Safe AI Adoption

27/08/2025 0 Comments 0 tags

Employees are experimenting with AI at record speed. They are drafting emails, analyzing data, and transforming the workplace. The problem is not the pace of AI adoption, but the lack

Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra

27/08/2025 0 Comments 0 tags

Cybersecurity researchers have discovered five distinct activity clusters linked to a persistent threat actor known as Blind Eagle between May 2024 and July 2025. These attacks, observed by Recorded Future

Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data

27/08/2025 0 Comments 0 tags

A widespread data theft campaign has allowed hackers to breach sales automation platform Salesloft to steal OAuth and refresh tokens associated with the Drift artificial intelligence (AI) chat agent. The

New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station

26/08/2025 0 Comments 0 tags

A team of academics has devised a novel attack that can be used to downgrade a 5G connection to a lower generation without relying on a rogue base station (gNB).

Citrix Patches Three NetScaler Flaws, Confirms Active Exploitation of CVE-2025-7775

26/08/2025 0 Comments 0 tags

Citrix has released fixes to address three security flaws in NetScaler ADC and NetScaler Gateway, including one that it said has been actively exploited in the wild. The vulnerabilities in