Analytics & Intelligence

Hunters International Dumps Ransomware, Goes Full-on Extortion
Hunters International, the RaaS group that some believe evolved from Hive, appears to be rebranding and shifting operations, moving away from an unprofitable and risky ransomware business and focusing solely on exfiltrating ...
Security Boulevard

When AI Agents Start Whispering: The Double-Edged Sword of Autonomous Agent Communication
Deepak Gupta - Tech Entrepreneur, Cybersecurity Author | | agentic, agents, AI (Artificial Intelligence), architecture, Artificial Intelligence, Awareness, data protection, security
AI agents develop their own communication channels beyond our monitoring frameworks, we face a pivotal challenge: harnessing their collaborative problem-solving potential while preventing security breaches and compliance violations that could arise when ...

Longtime ‘Fast Flux’ Evasion Technique Now a National Security Threat
CISA, the FBI, and NSA issued an advisory about the national security threat posed by "fast flux," a technique used by threat actors to evade detection of their C2 infrastructures that has ...
Security Boulevard

App Stores OK’ed VPNs Run by China PLA
Richi Jennings | | 360 Security Technology, App Store, App Stores, Apple, CCP, china, china espionage, China-nexus cyber espionage, Chinese, Chinese Communists, Chinese cyber espionage, chinese government, free vpn app, google, Google Play Store, Peoples Republic of China, Privacy, Qihoo 360, SB Blogwatch, Signal Secure VPN, Snap VPN, Tech Transparency Project, Thunder VPN, TikTok, TikTok Ban, Turbo VPN, VPN, VPN Proxy Master
Bad Apple: Chinese firm banned by the U.S. is the shady entity behind a clutch of free VPN apps—with over a million downloads ...
Security Boulevard
AIs as Trusted Third Parties
This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as trusted third parties: Abstract: ...

Yes, GitHub’s Copilot can Leak (Real) Secrets
Researchers successfully extracted valid hard-coded secrets from Copilot and CodeWhisperer, shedding light on a novel security risk associated with the proliferation of secrets ...

Hackers Use Atlantis AIO Tool to Automate Account Takeover Attacks
Atlantis AIO, a tool available to hackers on the dark web, gives threat actors an automated tool to rapidly test millions of stolen credentials against email, ecommerce, and other online accounts on ...
Security Boulevard

Spit Happens: 23andMe is Bankrupt — Secure Your DNA Data NOW Already
Double hell-ix: Personal genomics firm tells customers your data is safe—but few will trust the loss-making biotech pioneer ...
Security Boulevard

Cato Uses LLM-Developed Fictional World to Create Jailbreak Technique
Jeffrey Burt | | AI (Artificial Intelligence), DeepSeek AI, llm security, Microsoft Copilot, OpenAI ChatGPT
A Cato Networks threat researcher with little coding experience was able to convince AI LLMs from DeepSeek, OpenAI, and Microsoft to bypass security guardrails and develop malware that could steal browser passwords ...
Security Boulevard

Microsoft Won’t Fix This Bad Zero Day (Despite Wide Abuse)
Richi Jennings | | .lnk, APT37, APT43, BitterAPT, china espionage, CWE-451, Cybersecurity zero-day flaw, Earth Anansi, Earth Imp, Earth Kumiho, Earth Manticore, Evil Corp., InkySquid, Iranian hackers, kimsuky, Kimsuky hacking group, Konni, LNK file malware, LNKFiles, malicious LNK files, Microsoft, Microsoft Windows Zero Day, North Korean cyber espionage, russia hacker, SB Blogwatch, ScarCruft, Windows, ZDI-CAN-25373, Zero Day Attacks, zero day exploit attack, Zero Day Initiative, Zero Day Initiative (ZDI), zero-day, zero-day attack, Zero-Day Bug
Satya says NO: Redmond blames Windows users, rather than solve 30-year-old bug—exploited since 2017 ...
Security Boulevard