Another AI Threat – Slopsquatting
Published Apr 18 2025 11:36 AM
Slopsquatting is another form of AI hallucinations. This time tied to code development that can infect the output of the AI system. The AI systems hallucinated over 20% of the repository dependencies. Very dangerous.
More AI hallucinations=more risks
Crypto Developers Targeted by Python Malware Disguised as Coding Challenges
Published Apr 18 2025 11:33 AM
Another attack on software developers uses job ads. When someone replies, they are sent an infected assignment. Opening it compromises and infects their systems!
Developers beware
ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading
Published Apr 18 2025 11:28 AM
A new RAT, Remote Access Trojan, has been found allowing attackers to penetrate and take control of systems. Phishing emails are how it arrives. Healthcare and pharmaceuticals are current targets.
New RAT discovered
MITRE Hackers’ Backdoor Has Targeted Windows for Years
Published Apr 18 2025 11:21 AM
The same technique that was used to compromise MITRE has been found to have been used against Windows systems for a few years. It is a complex sophisticated attack.
Windows backdoor attack going on for years
Man Helped Chinese Nationals Get Jobs Involving Sensitive US Government Projects
Published Apr 18 2025 11:16 AM
Much was written about North Koreans being unknowingly hired by many US companies. Now Chinese nationals are getting into US companies through someone who lied and scammed the companies. Vetting new hires is getting more difficult but is more important than ever.
Chinese nationals infiltrate American companies
Insider Threats – Growing More Dangerous
Published Apr 11 2025 3:00 PM
Insiders are always under attack through phishing, smishing, vishing and more. Why? Because attackers know insiders are users that already have access to the desired data. Learn more about this in this Insight.
Insiders can be the worst threats
Spam after spam after spam after spam after spam after spam, etc. That is a new technique attackers are using as a lead in to social engineering attacks.