AI Security & Threats

10
Feb
Android Trojan Hijacks Hugging Face to Distribute RAT Payloads

Android Trojan Hijacks Hugging Face to Distribute RAT Payloads

Bitdefender researchers identified a new Android trojan that uses the Hugging Face platform—normally a repository for AI models—to
1 min read
10
Feb
CrowdStrike’s Falcon Wins Gartner Customers’ Choice for External Attack Surface Management

CrowdStrike’s Falcon Wins Gartner Customers’ Choice for External Attack Surface Management

CrowdStrike’s Falcon platform has been named the exclusive Gartner Customers’ Choice for External Attack Surface Management (EASM). The award
1 min read
10
Feb
CrowdStrike Unveils Linux Sensor Techniques to Sniff Out Web‑Shell Persistence

CrowdStrike Unveils Linux Sensor Techniques to Sniff Out Web‑Shell Persistence

CrowdStrike’s recent blog details how its Falcon sensor on Linux platforms now correlates file‑system changes, process‑injection behavior,
1 min read
10
Feb
Bitdefender Finds Malicious Payloads Lurking in OpenClaw AI Skills

Bitdefender Finds Malicious Payloads Lurking in OpenClaw AI Skills

Bitdefender Labs conducted a systematic review of the OpenClaw AI skill marketplace and identified a rising tide of skills that
1 min read
10
Feb

CISA Flags Public Hacking Tools Seen in Recent Breaches

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory that catalogs dozens of publicly available hacking utilities identified
1 min read
10
Feb
Turn Cloud Logs into Threat Intel: Unit42’s New Detection Playbook

Turn Cloud Logs into Threat Intel: Unit42’s New Detection Playbook

Unit42’s latest research shows how defenders can repurpose native cloud logs—such as AWS CloudTrail and Azure Activity Logs—
1 min read
10
Feb
AI Chat Previews Leak Malicious URL Contents, Exposing Sensitive Data

AI Chat Previews Leak Malicious URL Contents, Exposing Sensitive Data

AI agents built into popular messaging apps automatically generate link previews by fetching the target URL and extracting a snippet
1 min read
10
Feb
Shadow Campaigns: New Espionage Ops Exploit Hundreds of CVEs for Persistent Access

Shadow Campaigns: New Espionage Ops Exploit Hundreds of CVEs for Persistent Access

Unit42’s latest research uncovered a coordinated set of espionage operations, labeled “Shadow Campaigns,” that systematically abuse a broad spectrum
1 min read
10
Feb
GreyNoise Adds Vendor CVE & Tag Spike Feeds for Rapid Threat Detection

GreyNoise Adds Vendor CVE & Tag Spike Feeds for Rapid Threat Detection

GreyNoise has released two new event streams—Vendor CVE Spike and Tag Spike—that automatically flag sudden surges in Internet‑
1 min read
10
Feb
Digital Parasites Keep Ransomware Inside Networks Longer, Extending Dwell Time

Digital Parasites Keep Ransomware Inside Networks Longer, Extending Dwell Time

Picus Security’s Red Report, cited by The Hacker News, reveals a tactical evolution from flash‑in‑the‑pan ransomware
1 min read