Tag: techniques

  • Microsoft Security Blog: AI vs. AI: Detecting an AI-obfuscated phishing campaign

    Source URL: https://www.microsoft.com/en-us/security/blog/2025/09/24/ai-vs-ai-detecting-an-ai-obfuscated-phishing-campaign/ Source: Microsoft Security Blog Title: AI vs. AI: Detecting an AI-obfuscated phishing campaign Feedly Summary: Microsoft Threat Intelligence recently detected and blocked a credential phishing campaign that likely used AI-generated code to obfuscate its payload and evade traditional defenses, demonstrating a broader trend of attackers leveraging AI to increase the effectiveness of…

  • The Register: Nearly half of businesses suffered deepfaked phone calls against staff

    Source URL: https://www.theregister.com/2025/09/23/gartner_ai_attack/ Source: The Register Title: Nearly half of businesses suffered deepfaked phone calls against staff Feedly Summary: AI attacks on the rise A survey of cybersecurity bosses has shown that 62 percent reported attacks on their staff using AI over the last year, either by the use of prompt injection attacks or faking…

  • Cisco Talos Blog: How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking

    Source URL: https://blog.talosintelligence.com/how-rainyday-turian-and-a-new-plugx-variant-abuse-dll-search-order-hijacking/ Source: Cisco Talos Blog Title: How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking Feedly Summary: Talos discovered that a new PlugX variant’s features overlap with both the RainyDay and Turian backdoors AI Summary and Description: Yes Summary: Cisco Talos has identified a new variant of the PlugX…

  • The Cloudflare Blog: Building unique, per-customer defenses against advanced bot threats in the AI era

    Source URL: https://blog.cloudflare.com/per-customer-bot-defenses/ Source: The Cloudflare Blog Title: Building unique, per-customer defenses against advanced bot threats in the AI era Feedly Summary: Today, we are announcing a new approach to catching bots: using models to provide behavioral anomaly detection unique to each bot management customer and stop sophisticated bot attacks. AI Summary and Description: Yes…

  • Slashdot: AI Tools Give Dangerous Powers to Cyberattackers, Security Researchers Warn

    Source URL: https://yro.slashdot.org/story/25/09/21/2022257/ai-tools-give-dangerous-powers-to-cyberattackers-security-researchers-warn?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: AI Tools Give Dangerous Powers to Cyberattackers, Security Researchers Warn Feedly Summary: AI Summary and Description: Yes **Summary:** The text highlights significant vulnerabilities associated with AI technologies, particularly in the context of automated systems and malicious actors leveraging them to exploit security gaps. It underscores emerging threats posed by…

  • Slashdot: Secure Software Supply Chains, Urges Former Go Lead Russ Cox

    Source URL: https://developers.slashdot.org/story/25/09/21/0650219/secure-software-supply-chains-urges-former-go-lead-russ-cox?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Secure Software Supply Chains, Urges Former Go Lead Russ Cox Feedly Summary: AI Summary and Description: Yes Summary: The text emphasizes the critical need for enhancing software supply chain security, particularly in the face of ongoing vulnerabilities. It outlines practical solutions, such as adopting software signatures and reproducible builds,…

  • Simon Willison’s Weblog: httpjail

    Source URL: https://simonwillison.net/2025/Sep/19/httpjail/#atom-everything Source: Simon Willison’s Weblog Title: httpjail Feedly Summary: httpjail Here’s a promising new (experimental) project in the sandboxing space from Ammar Bandukwala at Coder. httpjail provides a Rust CLI tool for running an individual process against a custom configured HTTP proxy. The initial goal is to help run coding agents like Claude…