
Threat

OpenAI Finds Growing Exploitation of AI Tools by Foreign Threat Groups
OpenAI’s latest “Disrupting Malicious Uses of AI” report shows that hackers and influence operators are moving toward a more organised use of artificial intelligence (AI). The findings reveal that adversaries are spreading their operations across multiple AI systems, for instance, using ChatGPT for reconnaissance and planning, while relying on other models for execution and automation….

Small Businesses and Ransomware: Navigating the AI Era Threat
Ransomware has evolved from a niche hacker tactic into a mainstream threat, and small businesses are increasingly in the crosshairs. While large enterprises have resources to invest in cybersecurity teams, threat intelligence, and AI-driven defence tools, many small businesses remain underprotected. In 2025, ransomware attacks will become faster, more automated, and more sophisticated thanks to…

ThreatBook Launches Best-of-Breed Advanced Threat Intelligence Solution
Singapore, Singapore, September 29th, 2025, CyberNewsWire Analyzing over 14 billion cyber-attack records daily, ThreatBook ATI is a global solution enriched with granular, local insights; and can offer organizations a truly APAC perspective. Boasting low false positive rates, the solution is highly compatible with existing security stacks. ThreatBook ATI provides actionable insights for threat detection and…

ToolShell: An all-you-can-eat buffet for threat actors
ESET Research has been monitoring attacks involving the recently discovered ToolShell zero-day vulnerabilities 24 Jul 2025 • , 5 min. read On July 19th, 2025, Microsoft confirmed that a set of zero-day vulnerabilities in SharePoint Server called ToolShell is being exploited in the wild. ToolShell is comprised of CVE-2025-53770, a remote code execution vulnerability, and…

DSLRoot, Proxies, and the Threat of ‘Legal Botnets’ – Krebs on Security
The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they’d made with company called DSLRoot, which was paying $250 a month to plug a pair of laptops into the Redditor’s high-speed Internet connection in the United States. This…

Threat Intelligence Executive Report – Volume 2025, Number 4
The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in May and June, CTU™ researchers identified the following noteworthy issues and changes in the global threat landscape: Threat group naming alignment poses challenges Iran threatens retaliation against U.S. Law enforcement uses mockery as a tactic…

SpyCloud Enhances Investigations Solution with AI-Powered Insights – Revolutionizing Insider Threat and Cybercrime Analysis
Austin, TX, USA, August 6th, 2025, CyberNewsWire SpyCloud Investigations, now with AI Insights, empowers security teams to act decisively with finished intelligence built from billions of breach, malware, and phishing records. SpyCloud, the leader in identity threat protection, today announced a significant enhancement to its SaaS Investigations solution: the integration of advanced AI-powered insights that…

AI companions: A threat to love, or an evolution of it? | TechCrunch
As our lives grow increasingly digital and we spend more time interacting with eerily humanlike chatbots, the line between human connection and machine simulation is starting to blur. Today, more than 20% of daters report using AI for things like crafting dating profiles or sparking conversations, per a recent Match.com study. Some are taking it…

Threat Intelligence Executive Report – Volume 2025, Number 3
Executive summary The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in March and April, CTU™ researchers identified the following noteworthy issues and changes in the global threat landscape: Cybersecurity lessons for HR Black Basta leaks provided strategic takeaways To future-proof cybersecurity, start now Cybersecurity…

The DeepSeek R1 update proves it’s an active threat to OpenAI and Google
This week, DeepSeek released an updated version of its R1 model on HuggingFace, reigniting the open-source versus closed-source competition. The updated version, called DeekSeek-R1-0528, has 685 billion parameters, an upgrade from January’s version, which had 671 billion. Unlike OpenAI and Google’s models, which are famously closed-source, DeepSeek’s model weights are publicly available. According to the benchmarks,…
- 1
- 2