Tag: North Korean actors
-
Schneier on Security: Generative AI as a Cybercrime Assistant
Source URL: https://www.schneier.com/blog/archives/2025/09/generative-ai-as-a-cybercrime-assistant.html Source: Schneier on Security Title: Generative AI as a Cybercrime Assistant Feedly Summary: Anthropic reports on a Claude user: We recently disrupted a sophisticated cybercriminal that used Claude Code to commit large-scale theft and extortion of personal data. The actor targeted at least 17 distinct organizations, including in healthcare, the emergency services,…
-
Cloud Blog: Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/2024-zero-day-trends/ Source: Cloud Blog Title: Hello 0-Days, My Old Friend: A 2024 Zero-Day Exploitation Analysis Feedly Summary: Written by: Casey Charrier, James Sadowski, Clement Lecigne, Vlad Stolyarov Executive Summary Google Threat Intelligence Group (GTIG) tracked 75 zero-day vulnerabilities exploited in the wild in 2024, a decrease from the number we identified in 2023…
-
Slashdot: Microsoft Isn’t Fixing 8-Year-Old Shortcut Exploit Abused For Spying
Source URL: https://it.slashdot.org/story/25/03/18/2226205/microsoft-isnt-fixing-8-year-old-shortcut-exploit-abused-for-spying?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Microsoft Isn’t Fixing 8-Year-Old Shortcut Exploit Abused For Spying Feedly Summary: AI Summary and Description: Yes Summary: The text outlines a significant security vulnerability linked to malicious .LNK shortcut files being exploited in an eight-year-long spying campaign. Despite the findings, Microsoft categorizes the issue as a user interface problem,…
-
Hacker News: Microsoft isn’t fixing 8-year-old shortcut exploit abused for spying
Source URL: https://www.theregister.com/2025/03/18/microsoft_trend_flaw/ Source: Hacker News Title: Microsoft isn’t fixing 8-year-old shortcut exploit abused for spying Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses a vulnerability identified by Trend Micro that has been exploited in a prolonged espionage campaign, highlighting Microsoft’s response (or lack thereof) to the issue. It underscores the…
-
The Register: FCC stands up Council on National Security to fight China in ways that CISA used to
Source URL: https://www.theregister.com/2025/03/16/infosec_news_in_brief/ Source: The Register Title: FCC stands up Council on National Security to fight China in ways that CISA used to Feedly Summary: PLUS: Alleged Garantex admin arrested in India; Google deletes more North Korean malware Infosec In Brief United States Federal Communications Commission chair Brendan Carr has unveiled plans to form a…
-
Cloud Blog: Adversarial Misuse of Generative AI
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/adversarial-misuse-generative-ai/ Source: Cloud Blog Title: Adversarial Misuse of Generative AI Feedly Summary: Rapid advancements in artificial intelligence (AI) are unlocking new possibilities for the way we work and accelerating innovation in science, technology, and beyond. In cybersecurity, AI is poised to transform digital defense, empowering defenders and enhancing our collective security. Large language…
-
Hacker News: New ‘OtterCookie’ malware used to backdoor devs in fake job offers
Source URL: https://www.bleepingcomputer.com/news/security/new-ottercookie-malware-used-to-backdoor-devs-in-fake-job-offers/ Source: Hacker News Title: New ‘OtterCookie’ malware used to backdoor devs in fake job offers Feedly Summary: Comments AI Summary and Description: Yes Summary: The text outlines a cybersecurity threat posed by North Korean actors using new malware called OtterCookie in a campaign targeting software developers through fake job offers. It highlights…