Loading

All posts tagged in AI in Cybersecurity

  • svg
    Post Image

    At this year’s Mobile World Congress in Barcelona, SK Telecom shared exciting plans to reshape its future around artificial intelligence. The telecom giant is not just adding new AI tools but is fundamentally rewriting its systems, expanding data centers, and upgrading its language models. These moves aim to position Korea as a top player in

  • svg
    Post Image

    A new phishing method has emerged that can trick employees into bypassing Microsoft 365’s multi-factor authentication (MFA). This attack uses a clever tactic involving OAuth device registration to give hackers ongoing access to a victim’s account without needing their password. It’s a sophisticated way to break into Microsoft accounts, and it’s mostly targeting businesses and

  • svg
    Post Image

    Google recently uncovered a significant effort to clone its Gemini AI model. According to a quarterly threat report from Google Threat Intelligence Group, over 100,000 prompts were used in a coordinated attack aimed at model extraction. This process involves copying the core reasoning abilities of a proprietary AI, which could threaten Google’s competitive edge and

  • svg
    Post Image

    Cybercriminals are finding new ways to misuse employee monitoring and remote management tools to carry out malicious activities. Recent research reveals that hackers are abusing legitimate applications to gain access to networks, deploy ransomware, and even steal cryptocurrencies. These tactics highlight how tools meant for security and management can be turned against organizations if not

  • svg
    Post Image

    Recent reports reveal that nation-backed hackers are now using advanced artificial intelligence tools to ramp up their cyberattacks. Countries like Iran, North Korea, China, and Russia are leveraging models such as Google’s Gemini to enhance their campaigns. This shift means more sophisticated phishing, malware development, and reconnaissance efforts, making cyber threats more targeted and harder

  • svg
    Post Image

    Windows 10 has reached the end of its mainstream support, which means most users will no longer get new features or regular updates. Microsoft recommends upgrading to Windows 11, but users can also buy extended security updates to keep their system protected. In this post, we’ll cover the latest updates for Windows 10, specifically versions

  • svg
    Post Image

    Cybercriminals are still finding ways to exploit Windows shortcut (.lnk) files, even after Microsoft patched a vulnerability last summer. A new wave of phishing campaigns is using these files to spread ransomware, specifically the Global Group ransomware. This shows that attackers continue to target Windows shortcuts as a simple way to trick users and deliver

  • svg
    Post Image

    As cybersecurity threats grow more sophisticated, traditional penetration testing methods are falling behind. Modern environments are constantly changing, especially with the rise of cloud services, APIs, and automation. To keep up, security teams are turning to AI-driven solutions that offer continuous, real-time assessments of their systems’ vulnerabilities. How AI Is Transforming Penetration Testing In the

  • svg
    Post Image

    Researchers from Microsoft have introduced a new way to spot malicious modifications in AI models without knowing what to look for. This method targets large language models (LLMs) that are often shared or reused, which can hide secret triggers. These hidden backdoors, called “sleeper agents,” can remain inactive during normal testing but activate harmful behaviors

  • svg
    Post Image

    Rackspace is exploring how artificial intelligence can solve common operational problems. In their recent updates, they talk about issues like messy data, unclear ownership, and the high costs of running AI models in production. They focus on applying AI within service delivery, security, and cloud modernization efforts. Internal AI for Cybersecurity One of the clearest

svg To Top