AI
-
Posted: September 22, 2025Views: 24Read moreTrend Micro warns of cybercriminals using AI to create fake CAPTCHA pages that trick users into revealing sensitive data, boosting phishing success rates and challenging cybersecurity defenses.
-
Read moreA zero-click flaw in ChatGPT’s Deep Research agent allowed attackers to exfiltrate sensitive Gmail data via hidden email prompts. OpenAI patched the service-side vulnerability in 2025 to prevent stealthy data leaks from its cloud infrastructure.
-
Read moreDiscover how AI is becoming the new weapon against financial crime, with Themis’ AI Investigator platform cutting investigation times from weeks to minutes by revealing hidden criminal networks.
-
Read moreRevengeHotels (TA558) escalates cyberattacks with AI-crafted loaders delivering VenomRAT malware, targeting Windows users via phishing. The malware features stealth, persistence, and encrypted communication.
-
Read moreA remote code execution flaw in Cursor AI Code Editor allows malicious code to run automatically when opening a project. Learn how disabling Workspace Trust exposes developers and how to protect your environment.
-
Read moreSpamGPT is a dark web “spam-as-a-service” platform using AI to automate large-scale phishing campaigns. Learn how KaliGPT and SMTP cracking training empower cybercriminals.
-
Read moreCybercriminals use X’s AI assistant Grok to bypass ad restrictions and distribute malware through hidden links, reaching millions. Learn about the “Grokking” technique and its impact.
-
Read moreDiscover BruteForceAI, an innovative penetration testing tool that uses AI and browser automation to detect login pages and execute advanced brute-force attacks with intelligent evasion and logging.
-
Read moreDiscover how the AI-driven ransomware PromptLock leverages OpenAI’s gpt-oss:20b model to generate sophisticated, variable malware code. Learn about detection challenges and mitigation strategies for this emerging cybersecurity threat.
-
Read moreDiscover how AI-generated ransomware bypasses antivirus software, posing new cybersecurity risks in 2025 and challenging traditional defenses.