NYU Researchers Create AI-Assisted Malware to Probe Security Risks
NYU researchers built “PromptLock,” an AI-powered malware, as a scientific demonstration. The software uses language models to autonomously perform ransomware…
AI Tools Support CISA in Managing Growing Software Vulnerabilities
CISA highlights AI's role in tracking software vulnerabilities. Experts stress human oversight remains essential alongside automation. AI aids in quicker…
Authorities Shut Down Streameast’s Vast Pirated Sports Network
Streameast, a leading piracy network, was dismantled following a police raid in Egypt. The site provided illegal streams of major…
Google Fixes Two Active Android Zero-Days, Details 120 Patches
Google patched two new Android zero-day vulnerabilities in September 2025. The security update covers 120 software bugs, the highest count…
Salesloft Drift Supply Chain Attacks Impact Security Leaders
Major security firms faced data exposure via Salesloft Drift integration compromise. The incident highlighted ongoing risks in third-party SaaS tool…
Russian Ransomware Suspect Remains on Bail in California
Ianis Antropenko is accused of operating the Zeppelin ransomware from California. He remains free on bail despite repeated pretrial violations…
FBI Highlights Risks in China’s Dependence on Tech Firms for Hacking
China faces scrutiny for using local tech firms in cyber offensives. International agencies are boosting information sharing against hacking groups.…
Salesloft Drift Attack Compromises Major Integrations Across Platforms
Attackers exploited SaleLoft Drift integrations beyond initial victim estimates. Security teams urge immediate review and rotation of all API keys.…
Treasury Targets Facilitators in North Korea IT Worker Scheme
U.S. Treasury extends sanctions on North Korean IT worker facilitators and front companies. Scheme relies on fake identities, international payment…
Storm-0501 Exploits Cloud Gaps to Target Hybrid Infrastructures
Storm-0501 uses cloud-native methods to expand ransomware operations beyond local networks. The group exploits security gaps in hybrid environments with…