Tag: abuse

  • Schneier on Security: Report on the Malicious Uses of AI

    Source URL: https://www.schneier.com/blog/archives/2025/06/report-on-the-malicious-uses-of-ai.html Source: Schneier on Security Title: Report on the Malicious Uses of AI Feedly Summary: OpenAI just published its annual report on malicious uses of AI. By using AI as a force multiplier for our expert investigative teams, in the three months since our last report we’ve been able to detect, disrupt and…

  • Unit 42: Blitz Malware: A Tale of Game Cheats and Code Repositories

    Source URL: https://unit42.paloaltonetworks.com/blitz-malware-2025/ Source: Unit 42 Title: Blitz Malware: A Tale of Game Cheats and Code Repositories Feedly Summary: Blitz malware, active since 2024 and updated in 2025, was spread via game cheats. We discuss its infection vector and abuse of Hugging Face for C2. The post Blitz Malware: A Tale of Game Cheats and…

  • OpenAI : Disrupting malicious uses of AI: June 2025

    Source URL: https://openai.com/global-affairs/disrupting-malicious-uses-of-ai-june-2025 Source: OpenAI Title: Disrupting malicious uses of AI: June 2025 Feedly Summary: In our June 2025 update, we outline how we’re disrupting malicious uses of AI—through safety tools that detect and counter abuse, support democratic values, and promote responsible AI deployment for the benefit of all. AI Summary and Description: Yes Summary:…

  • Krebs on Security: U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams

    Source URL: https://krebsonsecurity.com/2025/05/u-s-sanctions-cloud-provider-funnull-as-top-source-of-pig-butchering-scams/ Source: Krebs on Security Title: U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams Feedly Summary: The U.S. government today imposed economic sanctions on Funnull Technology Inc., a Philippines-based company that provides computer infrastructure for hundreds of thousands of websites involved in virtual currency investment scams, commonly known as…

  • Microsoft Security Blog: New Russia-affiliated actor Void Blizzard targets critical sectors for espionage

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/05/27/new-russia-affiliated-actor-void-blizzard-targets-critical-sectors-for-espionage/ Source: Microsoft Security Blog Title: New Russia-affiliated actor Void Blizzard targets critical sectors for espionage Feedly Summary: Microsoft Threat Intelligence has discovered a cluster of worldwide cloud abuse activity conducted by a threat actor we track as Void Blizzard, who we assess with high confidence is Russia-affiliated and has been active since…

  • CSA: Consent Phishing: Bypassing MFA with OAuth

    Source URL: https://www.valencesecurity.com/resources/blogs/the-rising-threat-of-consent-phishing-how-oauth-abuse-bypasses-mfa Source: CSA Title: Consent Phishing: Bypassing MFA with OAuth Feedly Summary: AI Summary and Description: Yes Summary: The text discusses the rising threat of consent phishing as a sophisticated attack vector targeting SaaS security, distinct from conventional phishing tactics. By leveraging OAuth 2.0 protocols, attackers can gain persistent access to sensitive resources,…