Tag: abuse
-
Microsoft Security Blog: Cyber Signals Issue 9 | AI-powered deception: Emerging fraud threats and countermeasures
Source URL: https://www.microsoft.com/en-us/security/blog/2025/04/16/cyber-signals-issue-9-ai-powered-deception-emerging-fraud-threats-and-countermeasures/ Source: Microsoft Security Blog Title: Cyber Signals Issue 9 | AI-powered deception: Emerging fraud threats and countermeasures Feedly Summary: Microsoft maintains a continuous effort to protect its platforms and customers from fraud and abuse. This edition of Cyber Signals takes you inside the work underway and important milestones achieved that protect customers.…
-
The Cloudflare Blog: How we simplified NCMEC reporting with Cloudflare Workflows
Source URL: https://blog.cloudflare.com/simplifying-ncmec-reporting-with-cloudflare-workflows/ Source: The Cloudflare Blog Title: How we simplified NCMEC reporting with Cloudflare Workflows Feedly Summary: We transitioned to Cloudflare Workflows to manage complex, multi-step processes more efficiently. This shift replaced our National Center for Missing & Exploited Children (NCMEC) reporting system. AI Summary and Description: Yes Summary: The text outlines Cloudflare’s implementation…
-
Wired: Sex-Fantasy Chatbots Are Leaking a Constant Stream of Explicit Messages
Source URL: https://www.wired.com/story/sex-fantasy-chatbots-are-leaking-explicit-messages-every-minute/ Source: Wired Title: Sex-Fantasy Chatbots Are Leaking a Constant Stream of Explicit Messages Feedly Summary: Some misconfigured AI chatbots are pushing people’s chats to the open web—revealing sexual prompts and conversations that include descriptions of child sexual abuse. AI Summary and Description: Yes Summary: The text highlights a critical security issue related…
-
The Register: Generative AI app goes dark after child-like deepfakes found in open S3 bucket
Source URL: https://www.theregister.com/2025/04/01/nudify_website_open_database/ Source: The Register Title: Generative AI app goes dark after child-like deepfakes found in open S3 bucket Feedly Summary: ‘They went silent and secured the images,’ Jeremiah Fowler tells El Reg Jeremiah Fowler, an Indiana Jones of insecure systems, says he found a trove of sexually explicit AI-generated images exposed to the…
-
Cisco Talos Blog: Beers with Talos: Year in Review episode
Source URL: https://blog.talosintelligence.com/beers-with-talos-year-in-review-episode/ Source: Cisco Talos Blog Title: Beers with Talos: Year in Review episode Feedly Summary: In this podcast, Joe, Hazel, Bill and Dave break down Talos’ Year in Review 2024 and discuss how and why cybercriminals have been leaning so heavily on attacks that are routed in stealth in simplicity. AI Summary and…
-
Cisco Talos Blog: Available now: 2024 Year in Review
Source URL: https://blog.talosintelligence.com/available-now-2024-year-in-review/ Source: Cisco Talos Blog Title: Available now: 2024 Year in Review Feedly Summary: Download Talos’ 2024 Year in Review now, and access key insights on the top targeted vulnerabilities of the year, network-based attacks, email threats, adversary toolsets, identity attacks, multi-factor authentication (MFA) abuse, ransomware and AI-based attacks. AI Summary and Description:…