Anthropic Thwarts Hackers’ Attempts To Abuse Claude AI In Cyber Crime | #cybercrime | #infosec

[ad_1] Jakarta – Anthropic announced on Wednesday 27 August that it managed to detect and block hackers’ attempts to abuse Claude’s artificial intelligence (AI) system in making phishing emails, producing malicious codes, and trying to trick security filters. The findings, published in a report, highlight growing concerns that AI tools are increasingly being exploited for […]

Someone Created First AI-Powered Ransomware Using OpenAI’s gpt-oss:20b Model | #ransomware | #cybercrime

[ad_1] Cybersecurity company ESET has disclosed that it discovered an artificial intelligence (AI)-powered ransomware variant codenamed PromptLock. Written in Golang, the newly identified strain uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts in real-time. The open-weight language model was released by OpenAI earlier this month. “PromptLock leverages […]

Anthropic Thwarts Hackers’ Attempts To Abuse Claude AI In Cyber Crime | #cybercrime | #infosec

[ad_1] Jakarta – Anthropic announced on Wednesday 27 August that it managed to detect and block hackers’ attempts to abuse Claude’s artificial intelligence (AI) system in making phishing emails, producing malicious codes, and trying to trick security filters. The findings, published in a report, highlight growing concerns that AI tools are increasingly being exploited for […]

Undergraduate research program bridging advanced manufacturing and cybersecurity coming to OSU | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware

[ad_1] Wednesday, August 27, 2025 Media Contact: Desa James | Communications Coordinator | 405-744-2669 | desa.james@okstate.edu The U.S. is facing a projected shortfall of 2.1 million unfilled manufacturing jobs by 2030.  Two researchers from the College of Engineering, Architecture and Technology, Drs. Sri Ramesh and Ranji Vaidyanathan, are prepared to face this issue head-on with […]

Cephalus Ransomware Exploits RDP for Initial Access in Latest Attack Campaign | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware

[ad_1] Cybersecurity researchers at Huntress identified a novel ransomware variant dubbed Cephalus, deployed in two separate incidents targeting organizations lacking robust access controls. This emerging threat, which claims its name from Greek mythology symbolizing inevitable tragedy, leverages exposed Remote Desktop Protocol (RDP) endpoints as its primary initial access vector, exploiting compromised credentials without multi-factor authentication […]

Joint effort: CBI, FBI bust major cybercrime network; $40M fraud exposed in crackdown | #cybercrime | #infosec

[ad_1] The US Embassy in India on Wednesday said a major cybercrime syndicate has been dismantled through joint efforts by the Central Bureau of Investigation (CBI) and the US Federal Bureau of Investigation (FBI).According to the embassy’s post on X, the operation targeted a network accused of defrauding US nationals of nearly $40 million through […]

Global Salt Typhoon hacking campaigns linked to Chinese tech firms | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker

[ad_1] The U.S. National Security Agency (NSA), the UK’s National Cyber Security Centre (NCSC), and partners from over a dozen countries have linked the Salt Typhoon global hacking campaigns to three China-based technology firms. According to the joint advisories [NSA, NCSC], Sichuan Juxinhe Network Technology Co. Ltd., Beijing Huanyu Tianqiong Information Technology Co., and Sichuan […]

Microsoft details Storm-0501’s focus on ransomware in the cloud | #ransomware | #cybercrime

[ad_1] A financially motivated threat group operating since 2021 has refined its technical tradecraft, honing its focus on cloud-based systems that allow it to expand ransomware operations beyond the scope of on-premises infrastructure, Microsoft Threat Intelligence said in a report released Wednesday. By leveraging cloud-native capabilities, Storm-0501 has exfiltrated large volumes of data with speed, […]

National Cyber Security

FREE
VIEW