How AI will shape the next generation of cyber threats

In this Help Net Security interview, Buzz Hillestad, CISO at Prismatic, discusses how AI’s advancement reshapes cybercriminal skillsets and lowers entry barriers for potential attackers. Hillestad highlights that, as AI tools become more accessib… Continue reading How AI will shape the next generation of cyber threats

Operation Magnus: Joint Law Enforcement Operation Targets Major Infostealer Networks

Read more about a joint operation between several law enforcement agencies across the globe to tackle RedLine Stealer and META malware. Continue reading Operation Magnus: Joint Law Enforcement Operation Targets Major Infostealer Networks

4 new LockBit-related arrests, identities of suspected Evil Corp members, affiliates revealed

The third phase of Operation Cronos, which involved officers from the UK National Crime Agency (NCA), the FBI, Europol and other law enforcement agencies, has resulted in the arrest of four persons for allegedly participating in the LockBit ransomware-… Continue reading 4 new LockBit-related arrests, identities of suspected Evil Corp members, affiliates revealed

Access control is going mobile — Is this the way forward?

Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use […]

The post Access control is going mobile — Is this the way forward? appeared first on Security Intelligence.

Continue reading Access control is going mobile — Is this the way forward?

Telegram will share IP addresses, phone numbers of criminal suspects with cops

Telegram will start handing over the IP addresses and phone numbers of users who violate their Terms of Service “to relevant authorities in response to valid legal requests”, Telegram founder and CEO Pavel Durov has announced on Monday. Thi… Continue reading Telegram will share IP addresses, phone numbers of criminal suspects with cops

AI cybersecurity needs to be as multi-layered as the system it’s protecting

Cybercriminals are beginning to take advantage of the new malicious options that large language models (LLMs) offer them. LLMs make it possible to upload documents with hidden instructions that are executed by connected system components. This is a boo… Continue reading AI cybersecurity needs to be as multi-layered as the system it’s protecting

Exposed: Russian military Unit 29155 does digital sabotage, espionage

The US Department of Justice has named five Russian computer hackers as members of Unit 29155 – i.e., the 161st Specialist Training Center of the Russian General Staff Main Intelligence Directorate (GRU) – which they deem resposible for the… Continue reading Exposed: Russian military Unit 29155 does digital sabotage, espionage

How cyber criminals are compromising AI software supply chains

With the adoption of artificial intelligence (AI) soaring across industries and use cases, preventing AI-driven software supply chain attacks has never been more important. Recent research by SentinelOne exposed a new ransomware actor, dubbed NullBulge, which targets software supply chains by weaponizing code in open-source repositories like Hugging Face and GitHub. The group, claiming to […]

The post How cyber criminals are compromising AI software supply chains appeared first on Security Intelligence.

Continue reading How cyber criminals are compromising AI software supply chains

Suspected head of Reveton, Ransom Cartel RaaS groups arrested

An international operation coordinated by the UK National Crime Agency (NCA) has resulted in the arrest and extradition of a man believed to be one of the world’s most prolific Russian-speaking cybercrime actors. The arrest The NCA has been investigati… Continue reading Suspected head of Reveton, Ransom Cartel RaaS groups arrested