GhostGPT: New Chatbot for Malware Creation, Scams

GhostGPT: New Chatbot for Malware Creation, Scams

Security researchers have discovered a new malicious chatbot advertised on cybercrime forums. GhostGPT generates malware, business email compromise scams, and more material for illegal activities. The chatbot likely uses a wrapper to connect to a jailbroken version of OpenAI’s ChatGPT or another large language model, the Abnormal Security experts suspect. Jailbroken chatbots have been instructed to ignore their safeguards to prove more useful to criminals. Must-read security coverage What is GhostGPT? The security researchers found…

Read More

Sneaky Log Phishing Scheme Targets Two-Factor Security

Sneaky Log Phishing Scheme Targets Two-Factor Security

Security researchers at French firm Sekoia detected a new phishing-as-a-service kit targeting Microsoft 365 accounts in December 2024, the company announced on Jan. 16. The kit, called Sneaky 2FA, was distributed through Telegram by the threat actor service Sneaky Log. It is associated with about 100 domains and has been active since at least October 2024. Sneaky 2FA is an adversary-in-the-middle attack, meaning it intercepts information sent between two devices: in this case, a device…

Read More

UK Considers Banning Ransomware Payments

UK Considers Banning Ransomware Payments

The U.K. government is considering banning ransomware payments to make critical industries “unattractive targets for criminals.” It would apply to all public sector bodies and critical national infrastructure, which includes NHS trusts, schools, local councils, and data centres. Currently, all government departments nationwide are banned from paying cyber criminals to decrypt their data or prevent it from being leaked. This rule intends to protect the services and infrastructure the British public relies on from financial…

Read More

Protecting AI so AI Can Improve the World, Safely

Protecting AI so AI Can Improve the World, Safely

The world is in the middle of an unprecedented era of artificial intelligence innovation. Looking ahead, there will be two types of companies: those who will lead on AI and those that risk irrelevance. For the organizations who take AI seriously, the composition of their workforce is about to change dramatically. Today, their workforce is entirely human. Tomorrow, it will expand exponentially to include a variety of AI workers—including apps, agents, robots, and even humanoids….

Read More

US Chip Export Rule Proposes Limits to Thwart Chinese GPUs

US Chip Export Rule Proposes Limits to Thwart Chinese GPUs

The federal government on Jan. 13 proposed a global policy to limit the distribution of powerful, U.S.-made GPUs, an effort to promote U.S. dominance over China in the AI chip industry. “To enhance U.S. national security and economic strength, it is essential that we do not offshore this critical technology and that the world’s AI runs on American rails,” the White House’s announcement reads. The White House moved forward with the proposal despite pushback from…

Read More

US to Launch Cyber Trust Mark to Label Secure Smart Devices

US to Launch Cyber Trust Mark to Label Secure Smart Devices

The U.S. government is set to introduce a seal of approval to help consumers identify secure internet-connected devices, the White House announced in a press release on Jan. 7. The U.S. Cyber Trust Mark will certify devices that meet certain security standards. Following the initiative’s first announcement in July 2023, the Federal Communications Commission provided details on Tuesday about how companies can submit their products for approval under the new label. The label applies to…

Read More

Malware metamorphosis: 2024 reflections and 2025 predictions.

Malware metamorphosis: 2024 reflections and 2025 predictions.

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks.  Being a security researcher is…

Read More

What Boards Need To Know On Digital And Cybersecurity Governance In 2025

What Boards Need To Know On Digital And Cybersecurity Governance In 2025

Will digital governance move backwards in 2025? Photo by Hulton Archive/Getty Images. Getty Images The year 2024 was a relatively big year in digital, cybersecurity and systemic risk governance, if you knew where to look. While the growing pains of implementing new SEC cybersecurity disclosure rules and U.S. Senator Ron Wyden calling out the UnitedHealth Group (NYSE:UNH) CEO and board for their colossal cybersecurity failure made headlines, there was not a singular event that can…

Read More

China-Linked Cyber Threat Group Hacks US Treasury Department

China-Linked Cyber Threat Group Hacks US Treasury Department

A Chinese-state-sponsored cyberattack compromised the U.S. Treasury, gaining access to classified documents through a vulnerability through third-party cybersecurity provider BeyondTrust. The breach, revealed on Dec. 31, underscores the growing sophistication of state-backed cyber espionage efforts. “Treasury takes very seriously all threats against our systems, and the data it holds,” a department spokesperson said in a statement. “Over the last four years, Treasury has significantly bolstered its cyber defense, and we will continue to work with…

Read More
1 4 5 6 7 8 30