Tag: detection mechanisms
-
Cisco Talos Blog: Too salty to handle: Exposing cases of CSS abuse for hidden text salting
Source URL: https://blog.talosintelligence.com/too-salty-to-handle-exposing-cases-of-css-abuse-for-hidden-text-salting/ Source: Cisco Talos Blog Title: Too salty to handle: Exposing cases of CSS abuse for hidden text salting Feedly Summary: A simple yet effective tactic, known as hidden text salting, is increasingly used by cybercriminals over the past few months to evade even the most advanced email security solutions, including those powered…
-
Microsoft Security Blog: Empowering defenders in the era of agentic AI with Microsoft Sentinel
Source URL: https://www.microsoft.com/en-us/security/blog/2025/09/30/empowering-defenders-in-the-era-of-agentic-ai-with-microsoft-sentinel/ Source: Microsoft Security Blog Title: Empowering defenders in the era of agentic AI with Microsoft Sentinel Feedly Summary: Microsoft Sentinel is expanding into an agentic platform with general availability of the Sentinel data lake, and the public preview of Sentinel graph and Sentinel Model Context Protocol (MCP) server. The post Empowering defenders in the era of…
-
The Register: Nearly half of businesses suffered deepfaked phone calls against staff
Source URL: https://www.theregister.com/2025/09/23/gartner_ai_attack/ Source: The Register Title: Nearly half of businesses suffered deepfaked phone calls against staff Feedly Summary: AI attacks on the rise A survey of cybersecurity bosses has shown that 62 percent reported attacks on their staff using AI over the last year, either by the use of prompt injection attacks or faking…
-
Slashdot: Journals Infiltrated With ‘Copycat’ Papers That Can Be Written By AI
Source URL: https://science.slashdot.org/story/25/09/23/1825258/journals-infiltrated-with-copycat-papers-that-can-be-written-by-ai?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Journals Infiltrated With ‘Copycat’ Papers That Can Be Written By AI Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a significant concern regarding the misuse of text-generating AI tools, such as ChatGPT and Gemini, in rewriting scientific papers and producing fraudulent research. This highlights the potential…
-
The Cloudflare Blog: Building unique, per-customer defenses against advanced bot threats in the AI era
Source URL: https://blog.cloudflare.com/per-customer-bot-defenses/ Source: The Cloudflare Blog Title: Building unique, per-customer defenses against advanced bot threats in the AI era Feedly Summary: Today, we are announcing a new approach to catching bots: using models to provide behavioral anomaly detection unique to each bot management customer and stop sophisticated bot attacks. AI Summary and Description: Yes…
-
The Register: US puts $10M bounty on three Russians accused of attacking critical infrastructure
Source URL: https://www.theregister.com/2025/09/04/us_10m_bounty_fsb_attackers/ Source: The Register Title: US puts $10M bounty on three Russians accused of attacking critical infrastructure Feedly Summary: Seven-year-old Cisco vuln that remains inexplicably unpatched is their way in The US State Department has put a $10 million bounty on the heads of three Russians accused of being intelligence agents hacking America’s…
-
Slashdot: $1M Stolen in ‘Industrial-Scale Crypto Theft’ Using AI-Generated Code
Source URL: https://yro.slashdot.org/story/25/08/11/0037258/1m-stolen-in-industrial-scale-crypto-theft-using-ai-generated-code?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: $1M Stolen in ‘Industrial-Scale Crypto Theft’ Using AI-Generated Code Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a sophisticated cybercrime operation, GreedyBear, which utilizes a highly coordinated strategy, weaponizing browser extensions and phishing sites to facilitate industrial-scale crypto theft. The group’s innovative techniques, including the modification…