Aggregator
Lynx
You must login to view this content
Tech giants launch AI-powered ‘Project Glasswing’ to identify critical software vulnerabilities
The program comes as the tech industry races to secure software before similar AI-powered offensive capabilities become too much for defenders to handle.
The post Tech giants launch AI-powered ‘Project Glasswing’ to identify critical software vulnerabilities appeared first on CyberScoop.
Знакомьтесь, ваша замена: робот GEN-1 складывает сотни футболок без ошибок. И не устаёт ни на секунду
Iranian hackers launching disruptive attacks at U.S. energy, water targets, feds warn
Iranian government hackers are launching disruptive cyberattacks on American energy and water infrastructure, U.S. government agencies “urgently” warned Tuesday. The hackers are taking aim at devices and systems that control industrial processes, and have harmed victims in the last month following the onset of U.S.-Israel strikes against Iran, according to the joint alert from the […]
The post Iranian hackers launching disruptive attacks at U.S. energy, water targets, feds warn appeared first on CyberScoop.
Hackers Pose as Non-Profit Developers to Deploy Monero Mining Malware
После взлома — сжечь. Северная Корея запустила производство одноразовых вирусов
Cybersecurity in the Age of Instant Software
AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an application on demand—a spreadsheet, for example—and delete it when you’re done using it than to buy one commercially. Future systems could include a mix: both traditional long-term software and ephemeral instant software that is constantly being written, deployed, modified, and deleted.
AI is changing cybersecurity as well. In particular, AI systems are getting better at finding and patching vulnerabilities in code. This has implications for both attackers and defenders, depending on the ways this and related technologies improve...
The post Cybersecurity in the Age of Instant Software appeared first on Security Boulevard.
Russia Hacked Routers to Steal Microsoft Office Tokens
Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks without deploying any malicious software or code.
The post Russia Hacked Routers to Steal Microsoft Office Tokens appeared first on Security Boulevard.
Russia Hacked Routers to Steal Microsoft Office Tokens
Max severity Flowise RCE vulnerability now exploited in attacks
Threat Actor Selling Root RCE Shell Access to Botswana Government Health Portal Firewall for $300
Так просто сайты ещё не взламывали. Популярный плагин обнулил безопасность огромного числа веб-ресурсов
Russian State-Linked APT28 Exploits SOHO Routers in Global DNS Hijacking Campaign
Emulating the Multi-Stage RoningLoader Malware
AttackIQ has released a new assessment template that emulates the behaviors of RoningLoader, a multi-stage loader observed in recent intrusion campaigns. RoningLoader operates through a layered execution chain, enabling stealthy delivery and execution of follow-on payloads while evading traditional detection mechanisms.
The post Emulating the Multi-Stage RoningLoader Malware appeared first on AttackIQ.
The post Emulating the Multi-Stage RoningLoader Malware appeared first on Security Boulevard.
Cybercrime losses jumped 26% to $20.9 billion in 2025
The FBI’s annual report on digital crimes exposes a worsening environment. Yet, an unknown number of victims still suffer in the shadows never reporting the crimes they endure.
The post Cybercrime losses jumped 26% to $20.9 billion in 2025 appeared first on CyberScoop.