CrowdStrike Security Report: Generative AI Powers Social Engineering Attacks

CrowdStrike Security Report: Generative AI Powers Social Engineering Attacks

Phishing was no longer as common in 2024 as before, according to CrowdStrike’s 2025 Global Threat Report. Threat actors trend toward accessing legitimate accounts through social engineering techniques like voice phishing (vishing), callback phishing, and help desk social engineering attacks. We’re well within the era of what cybersecurity technology CrowdStrike called “the enterprising adversary,” with malware-as-a-service and criminal ecosystems replacing the old-fashioned image of the lone threat actor. Attackers are also using legitimate remote management…

Read More

SonicWall Report: “Threat Actors are Moving at Unprecedented Speeds”

SonicWall Report: “Threat Actors are Moving at Unprecedented Speeds”

SonicWall’s new 2025 Annual Threat Report highlights startling revelations, including that hackers exploited new vulnerabilities within two days 61% of the time, and that it takes the average organization between 120 and 150 days to apply a patch. In addition, the firm’s researchers detected 210,258 “never-before-seen” malware variants in 2024. Researchers reported that, in 2024, the average ransomware payment reached $850,700, with total related losses often exceeding $4.91 million when factoring in downtime and recovery…

Read More

Data Theft Drove 94% of Cyberattacks in 2024

Data Theft Drove 94% of Cyberattacks in 2024

Data theft accounted for 94% of all cyber attacks worldwide in 2024, according to new research, as cybercriminals increasingly combine data exfiltration with encryption in ransomware campaigns. Beyond encryption, ransomware attackers now threaten to leak or sell a company’s data on the dark web if victims refuse to pay. Stolen information often includes personally identifiable data and proprietary intellectual property. The findings come from BlackFog’s 2024 Ransomware Trend Report, which analysed ransomware activity across hundreds…

Read More

Darktrace: 96% of Phishing Attacks in 2024 Exploited Trusted Domains

Darktrace: 96% of Phishing Attacks in 2024 Exploited Trusted Domains

Threat actors are increasingly targeting trusted business platforms such as Dropbox, SharePoint, and QuickBooks in their phishing email campaigns and leveraging legitimate domains to bypass security measures, a new report released today has found. By embedding sender addresses or payload links within legitimate domains, attackers evade traditional detection methods and deceive unsuspecting users. According to Darktrace’s Annual Threat Report 2024, the authors detected more than 30.4 million phishing emails, reinforcing phishing as the preferred attack…

Read More

iOS 18.3.1 Release Expected Within the Next Few Weeks

iOS 18.3.1 Release Expected Within the Next Few Weeks

The first incremental update to Apple’s iOS 18.3 may drop next week, both 9to5Mac and MacRumors predict. Both sites monitor the devices used by their visitors to track waves of updates. It’s normal for Apple to release minor fixes after the launch of a new version, and iOS 18.3.1 is likely to include the same. However, the new release gained some unlikely buzz because of a TikTok rumor related to an optional satellite connectivity feature….

Read More

IT Leaders Fear AI-Driven Cybersecurity Costs Will Soar

IT Leaders Fear AI-Driven Cybersecurity Costs Will Soar

IT leaders are concerned about the rocketing costs of cyber security tools, which are being inundated with AI features. Meanwhile, hackers are largely eschewing AI, as there are relatively few discussions about how they could use it posted on cyber crime forums. Featured Partners: Artificial Intelligence (AI) Software 1 New Relic Visit website Optimize your business operations with New Relic’s comprehensive observability platform. Designed for multi-dimensional enterprises, it provides real-time insights and robust application performance…

Read More

U.K. Announces 'World-First' Cyber Code of Practice

U.K. Announces 'World-First' Cyber Code of Practice

The U.K. government has introduced its “world-first” AI Cyber Code of Practice for companies developing AI systems. The voluntary framework outlines 13 principles designed to mitigate risks such as AI-driven cyberattacks, system failures, and data vulnerabilities. The voluntary code applies to developers, system operators, and data custodians at organisations that create, deploy, or manage AI systems. AI vendors that only sell models or components fall under other relevant guidelines. “From securing AI systems against hacking…

Read More

DeepSeek Locked Down Public Database Access That Exposed Chat History

DeepSeek Locked Down Public Database Access That Exposed Chat History

On Jan. 29, U.S.-based Wiz Research announced it responsibly disclosed a DeepSeek database previously open to the public, exposing chat logs and other sensitive information. DeepSeek locked down the database, but the discovery highlights possible risks with generative AI models, particularly international projects. DeepSeek shook up the tech industry over the last week as the Chinese company’s AI models rivaled American generative AI leaders. In particular, DeepSeek’s R1 competes with OpenAI o1 on some benchmarks….

Read More

DeepSeek Chatbot Beats OpenAI on App Store Leaderboard

DeepSeek Chatbot Beats OpenAI on App Store Leaderboard

Over the weekend, Chinese AI company DeepSeek released an AI chat app including a “reasoning” AI model comparable to OpenAI’s o1, causing a stir among American AI companies as DeepSeek rose to the top of Apple’s App Store. DeepSeek is a Hangzhou, China-based company providing generative AI models and AI integration. Its first products to make waves in the American market are the GPT-4-like DeepSeek-V3 and R1, an advanced “reasoning model.” Like ChatGPT, DeepSeek-V3 and…

Read More

GhostGPT: New Chatbot for Malware Creation, Scams

GhostGPT: New Chatbot for Malware Creation, Scams

Security researchers have discovered a new malicious chatbot advertised on cybercrime forums. GhostGPT generates malware, business email compromise scams, and more material for illegal activities. The chatbot likely uses a wrapper to connect to a jailbroken version of OpenAI’s ChatGPT or another large language model, the Abnormal Security experts suspect. Jailbroken chatbots have been instructed to ignore their safeguards to prove more useful to criminals. Must-read security coverage What is GhostGPT? The security researchers found…

Read More
1 2 3 10