Tag:
information security
AI
Google Discovers PROMPTFLUX Malware Utilizing Gemini AI for Hourly Code Rewrites
Google's Threat Intelligence Group (GTIG) revealed the discovery of the PROMPTFLUX malware, which utilizes an experimental Visual Basic Script (VBScript) that interacts with the...
AI
Google’s AI ‘Big Sleep’ Discovers Five New Vulnerabilities in Apple’s Safari WebKit
On November 4, 2025, Google’s AI-driven cybersecurity agent, Big Sleep, discovered five vulnerabilities in Apple’s Safari WebKit component, potentially leading to browser crashes and...
AI
Microsoft Uncovers “SesameOp” Backdoor Utilizing OpenAI’s API as a Covert Command Channel
Microsoft has revealed a sophisticated backdoor dubbed SesameOp, leveraging the OpenAI Assistants API for command-and-control (C2) communications. Uncovered in July 2025, this custom malware...
AI
Transforming Enterprise Risk into a Strategic Asset
The rapid integration of AI agents into enterprise workflows presents significant opportunities for automation and productivity but also introduces complex security risks. A recent...
AI
Introducing GPT-5: The Automated Agent for Discovering and Resolving Code Flaws
OpenAI has unveiled Aardvark, an "agentic security researcher" powered by its GPT-5 large language model. Currently in private beta, Aardvark aims to enhance code...
AI
Unmasking Ghost Identities: The Chaos of Poisoned Accounts and AI Agents
BeyondTrust's 2026 cybersecurity predictions highlight the emergence of identity as the core vulnerability for organizations. As traditional defenses falter, unprecedented threats will arise from...
AI Hacker News
Microsoft Reports: Rising AI-Driven Cyberattacks on the US by Russia and China
Transforming the Cyber Landscape: AI as a Double-Edged Sword
A recent Microsoft report highlights a surge in cyber threats, with Russia, China, Iran, and North...
AI
Unveiling Insights: The Significance of AI in Web Applications
In today's cyber landscape, attackers utilize AI to enhance reconnaissance, understanding systems prior to launching attacks. They analyze login flows, JavaScript files, and API...