OpenAI Finds Growing Exploitation of AI Tools by Foreign Threat Groups

OpenAI Finds Growing Exploitation of AI Tools by Foreign Threat Groups

OpenAI’s latest “Disrupting Malicious Uses of AI” report shows that hackers and influence operators are moving toward a more organised use of artificial intelligence (AI). The findings reveal that adversaries are spreading their operations across multiple AI systems, for instance, using ChatGPT for reconnaissance and planning, while relying on other models for execution and automation….

Read More
How to get better results from bug bounty programs without wasting money – Help Net Security

How to get better results from bug bounty programs without wasting money – Help Net Security

The wrong bug bounty strategy can flood your team with low-value reports. The right one can surface critical vulnerabilities that would otherwise slip through. A new academic study based on Google’s Vulnerability Rewards Program (VRP) offers rare data on how to tell the difference. The team behind the study included experts from Harvard, Bocconi University,…

Read More
GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes

ESET researchers have identified a new threat actor, whom we have named GhostRedirector, that compromised at least 65 Windows servers mainly in Brazil, Thailand, and Vietnam. GhostRedirector used two previously undocumented, custom tools: a passive C++ backdoor that we named Rungan, and a malicious Internet Information Services (IIS) module that we named Gamshen. While Rungan…

Read More
Neue Phishing-Variante greift Gmail-Nutzer an

Neue Phishing-Variante greift Gmail-Nutzer an

srcset=” 7008w, 300w, 768w, 1024w, 1536w, 2048w, 1240w, 150w, 854w, 640w, 444w” width=”1024″ height=”576″ sizes=”auto, (max-width: 1024px) 100vw, 1024px”>Hacker haben gefälschte PDF-Dateien an Gmail-Nutzer verschickt, die täuschend echt wirken. Prae_Studio – shutterstock.com Forscher des Sicherheitsunternehmens Varonis haben eine raffinierte Phishing-Methode entdeckt, die auf Gmail-Nutzer zielt. Dabei kommt eine Malware zum Einsatz, die sich nicht nur…

Read More
Small Businesses and Ransomware: Navigating the AI Era Threat

Small Businesses and Ransomware: Navigating the AI Era Threat

Ransomware has evolved from a niche hacker tactic into a mainstream threat, and small businesses are increasingly in the crosshairs. While large enterprises have resources to invest in cybersecurity teams, threat intelligence, and AI-driven defence tools, many small businesses remain underprotected. In 2025, ransomware attacks will become faster, more automated, and more sophisticated thanks to…

Read More
4 ways to use time to level up your security monitoring – Help Net Security

4 ways to use time to level up your security monitoring – Help Net Security

SIEMs excel at correlating events and firing alerts, but their ingest pipelines can get overwhelmed when scaled. And because most SIEMs rely on general-purpose log storage platforms, even with lower-cost archive tiers, long-term retention at full fidelity remains expensive, forcing teams to choose between visibility and budget. With AI making the threat landscape more complex…

Read More