Google DeepMind Researchers Map Web Attacks Against AI Agents

Malicious web content can be used to manipulate, deceive, and exploit autonomous AI agents navigating the internet, Google DeepMind researchers show. The researchers have identified six types of attacks against AI agents that can be mounted via web con… Continue reading Google DeepMind Researchers Map Web Attacks Against AI Agents

European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

Hackers stole over 300GB of data from the Commission’s AWS environment, including personal information.
The post European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack appeared first on SecurityWeek.
Continue reading European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack

TrueConf Zero-Day Exploited in Asian Government Attacks

A Chinese threat actor exploited the video conferencing platform to perform reconnaissance, escalate privileges, and execute additional payloads.
The post TrueConf Zero-Day Exploited in Asian Government Attacks appeared first on SecurityWeek.
Continue reading TrueConf Zero-Day Exploited in Asian Government Attacks

North Korean Hackers Drain $285 Million From Drift in 10 Seconds

The attackers prepared infrastructure and multiple nonce-based transactions, took over an admin key, and drained five vaults.
The post North Korean Hackers Drain $285 Million From Drift in 10 Seconds appeared first on SecurityWeek.
Continue reading North Korean Hackers Drain $285 Million From Drift in 10 Seconds