News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Report: Gemini is being abused by state hacker groups 
B2B Cyber ​​Security ShortNews

The Google Threat Intelligence Group (GTIG) shows in a report that Iranian, Chinese, North Korean and Russian hacker groups in particular are accessing the Gemini AI. Although they do not have malware written, they use AI as a basis for code, to find vulnerabilities and to assist with malicious scripting techniques. The Google Threat Intelligence Group (GTIG) has published a comprehensive report on the use of generative artificial intelligence (AI) by threat actors. Generative AI models such as Gemini are also accessible to attackers. This leads to concerns about the possible misuse of AI for malicious purposes. Important countries in focus...

Read more

Misuse of GenAI: Deepfake tools available on the darknet
Misuse of GenAI: Deepfake tools on the darknet Image: Bing - AI

Cybercriminals are expanding their range of Large Language Models (LLMs) and deepfake technologies, producing more and expanding their reach. Criminal Telegram marketplaces are promoting new ChatGPT-like chatbots that promise to provide unfiltered answers to all kinds of malicious questions. Commercial LLMs like Gemini or ChatGPT are programmed to refuse to answer malicious or unethical requests. Criminals are also avoiding well-known services like ChatGPT because they fear being tracked down by regulated tools. Jailbreak-as-a-service frontends allow users to package malicious questions in special prompts, which undermines the ethical code of AI tools…

Read more

Abuse of Cloudflare tunnels
B2B Cyber ​​Security ShortNews

Security experts have recently identified a new tactic used by cyber criminals. The security researchers observed an increasing spread of malware through the misuse of Cloudflare tunnels. Cyber ​​criminals are particularly taking advantage of the "TryCloudflare" function, which can be used to create temporary tunnels without an account. The attackers' activities observed by Proofpoint are financially motivated and aim to spread remote access Trojans (RATs). How the attacks work The attacks usually begin with emails that contain URLs or attachments that lead to Internet links (.URL files). After a click, these establish connections to...

Read more