Source
DARKReading
Like its predecessor, SparkCat, the new malware appears to be going after sensitive data — such as seed phrases for cryptocurrency wallets — in device photo galleries.
An AI security researcher has developed a proof of concept that uses subtle, seemingly benign prompts to get GPT and Gemini to generate inappropriate content.
IBM is integrating its governance and AI security tools to address the risks associated with the AI adoption boom.
Citrix is recommending its customers upgrade their appliances to mitigate potential exploitation of the vulnerabilities.
After President's Trump decision to enter the US into the conflict in the Middle East, the Department of Homeland Security expects there to be an uptick in Iranian hacktivists and state-sponsored actors targeting US systems.
The attack is similar to previous campaigns by an actor called Commando Cat to use misconfigured APIs to compromise containers and deploy cryptocurrency miners.
In a market where security budgets flatten while threats accelerate, improving analyst throughput is fiscal stewardship.
At this week's re:Inforce 2025 conference, the cloud giant introduced new capabilities to several core security products to provide customers with better visibility and more context on potential threats.
As package registries find better ways to combat cyberattacks, threat actors are finding other methods for spreading their malware to developers.
The communications company shared the discoveries of its investigation with government partners, but there is little information they can publicly disclose other than that there seems to be no impact on customers.