The AI-powered cyberattack era is here
Prognosticators have been prognosticating for 20 years about a future in which hackers use AI to breach networks, steal data, and socially engineer credulous employees. And like so many AI-related futurisms in the age of LLM-based generative AI, this prediction is coming true. Anthropic reported last week that a hacker used its technology for an […] more…IT threat evolution Q1 2019
Targeted attacks and malware campaigns Go Zebrocy Zebrocy was first observed being used as a Sofacy backdoor in 2015. However, the collection of cases where this tool has been used mean that we consider it a subset of activity in its own right. On the basis of this threat actor’s past behaviour, we predicted last […] more…More information
- Planned Wireless Network Disruption
- ITS Alerts rebranding to IT Alerts
- Anonymous dumps VMware source code in hacking spree
- HTTP/2 Implementation Vulnerabilities Expose Servers to DoS Attacks
- Microsoft Internet Explorer CVE-2015-0066 Remote Memory Corruption Vulnerability
- We Made It, Together: 20 Years of VirusTotal!
- Risk and Regulation: Preparing for the Era of Cybersecurity Compliance
- Microsoft Windows Media Center CVE-2014-4060 Remote Code Execution Vulnerability
- Microsoft Office CVE-2016-0140 Memory Corruption Vulnerability
- Bank joins Interpol cyber-crime fighting centre