Aug 27, 2025 | Podcast
https://www.wiz.io/blog/s1ngularity-supply-chain-attack Attackers have successfully compromised multiple Nx NPM packages in a sophisticated supply chain attack that leverages artificial intelligence tools for reconnaissance, marking what researchers believe to be the...
Aug 26, 2025 | Podcast
#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/6...
Aug 25, 2025 | Podcast
https://android-developers.googleblog.com/2025/08/elevating-android-security.html Google has announced a comprehensive new security initiative called “Developer Verification” that will require all Android app developers to verify their identities before...
Aug 22, 2025 | Podcast
https://www.bleepingcomputer.com/news/security/bookingcom-phishing-campaign-uses-sneaky-character-to-trick-you Threat actors have launched a sophisticated phishing campaign targeting Booking.com users by exploiting the Japanese hiragana character “ん” to...
Aug 21, 2025 | Podcast
https://www.bleepingcomputer.com/news/security/microsoft-teams-to-protect-against-malicious-urls-dangerous-file-types Microsoft has announced significant security enhancements for Microsoft Teams that will strengthen protection against malware and file-based attacks...
Aug 20, 2025 | Podcast
https://krebsonsecurity.com/2025/08/mobile-phishers-target-brokerage-accounts-in-ramp-and-dump-cashout-scheme Cybercriminal groups specializing in mobile phishing attacks have shifted their focus to targeting customers of major brokerage platforms, implementing a...