Monday, December 1, 2025
Tag:

information security

Google Discovers PROMPTFLUX Malware Utilizing Gemini AI for Hourly Code Rewrites

Google's Threat Intelligence Group (GTIG) revealed the discovery of the PROMPTFLUX malware, which utilizes an experimental Visual Basic Script (VBScript) that interacts with the...

Google’s AI ‘Big Sleep’ Discovers Five New Vulnerabilities in Apple’s Safari WebKit

On November 4, 2025, Google’s AI-driven cybersecurity agent, Big Sleep, discovered five vulnerabilities in Apple’s Safari WebKit component, potentially leading to browser crashes and...

Microsoft Uncovers “SesameOp” Backdoor Utilizing OpenAI’s API as a Covert Command Channel

Microsoft has revealed a sophisticated backdoor dubbed SesameOp, leveraging the OpenAI Assistants API for command-and-control (C2) communications. Uncovered in July 2025, this custom malware...

Transforming Enterprise Risk into a Strategic Asset

The rapid integration of AI agents into enterprise workflows presents significant opportunities for automation and productivity but also introduces complex security risks. A recent...

Introducing GPT-5: The Automated Agent for Discovering and Resolving Code Flaws

OpenAI has unveiled Aardvark, an "agentic security researcher" powered by its GPT-5 large language model. Currently in private beta, Aardvark aims to enhance code...

Unmasking Ghost Identities: The Chaos of Poisoned Accounts and AI Agents

BeyondTrust's 2026 cybersecurity predictions highlight the emergence of identity as the core vulnerability for organizations. As traditional defenses falter, unprecedented threats will arise from...

Microsoft Reports: Rising AI-Driven Cyberattacks on the US by Russia and China

Transforming the Cyber Landscape: AI as a Double-Edged Sword A recent Microsoft report highlights a surge in cyber threats, with Russia, China, Iran, and North...

Unveiling Insights: The Significance of AI in Web Applications

In today's cyber landscape, attackers utilize AI to enhance reconnaissance, understanding systems prior to launching attacks. They analyze login flows, JavaScript files, and API...