Google Creates a Red Team to Attack AI Systems

Google says it is creating a red team that will specialize in “sophisticated technical attacks on AI systems.” Among examples of such attacks, the company’s report lists prompt engineering, extracting information from LLM training data, and so on. In its report, Google highlights the importance of the AI red team, and also lists the different… Continue reading Google Creates a Red Team to Attack AI Systems

Information Security Threats in Social Media

Social media compromises information security, but most people ignore it for some reason

Social media has become an important aspect of our everyday lives in this age of technology and information. Despite its numerous advantages, social media has raised concerns about protecting personal privacy. In particular, social networks pose a significant danger to information security – and it is mostly unspoken. But is this threat real? And how… Continue reading Information Security Threats in Social Media

Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site

A new phishing campaign targeting cryptocurrency users

With the ever-increasing number of cyber threats, hackers and cybersecurity specialists are taking the initiative. This time, cybercriminals went ahead of the curve. They created a phishing website to coincide with the news that Microsoft was developing a crypto wallet exclusively for its Edge browser. Such a scheme is used to spread Luca Stealer. Microsoft… Continue reading Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site

Fake Ads on Facebook Promote Scam AI Services

Growing interest in AI has prompted attackers to take advantage of it

Facebook has been hit by a wave of fake ads that offer what looks like AI services. In fact, those are scam pages that trick people into installing malware. AI Scam in Facebook Ads The use of social media for cybercrime, in general, is nothing new. However, to maintain effectiveness, sometimes fraudsters have to adjust… Continue reading Fake Ads on Facebook Promote Scam AI Services

WormGPT Helps Cybercriminals to Launch Sophisticated Phishing Attacks

LLM development gave an obvious and predicted boost to phishing emails

SlashNext noticed that cybercriminals are increasingly using generative AI in their phishing attacks, such as the new WormGPT tool. WormGPT is advertised on hacker forums, and it can be used to organize phishing mailings and compromise business mail (Business Email Compromise, BEC). WormGPT Is Massively Used for Phishing WormGPT is based on the GPTJ language… Continue reading WormGPT Helps Cybercriminals to Launch Sophisticated Phishing Attacks

Cloud Mining Scams Spread Banking Trojans

Roamer Banking Trojan is implicated in cloud mining scam

It’s no secret that cybercriminals are increasingly using mobile platforms as an attack vector lately. One example is a new Android malware. It spreads through fake cloud mining scams services and targets cryptocurrency wallets and online banking apps. Analysts dubbed this banking trojan as Roamer, though hackers may use different other malware for such attacks.… Continue reading Cloud Mining Scams Spread Banking Trojans

Protection Against Instagram Scams: What You Need to Know

Instagram scams may threaten your personal data and compromise your account

Instagram, one of the world’s most popular social media platforms, turns out to be far from secure for its users. Serious security issues often arise, leading to the loss of accounts and personal data. However, the most unpleasant part awaits you ahead. When you try to recover your data, you’ll realize that the support is… Continue reading Protection Against Instagram Scams: What You Need to Know

ChatGPT has become a New tool for Cybercriminals in Social Engineering

Scammers massively use ChatGPT to create convincing phishing emails

Artificial intelligence has become an advanced tool in today’s digital world. It can facilitate many tasks, help solve complex multi-level equations and even write a novel. But like in any other sphere, cybercriminals here have found some profit. With ChatGPT, they can deceive a user correctly and skillfully and thus steal his data. The key… Continue reading ChatGPT has become a New tool for Cybercriminals in Social Engineering