Topic: defense-in-depth

  • OpenAI Fortifies AI Defenses Against Rising Cyber Threats

    OpenAI Fortifies AI Defenses Against Rising Cyber Threats

    AI capabilities in cybersecurity are advancing rapidly, with OpenAI's models showing a dramatic performance increase, which could enable more sophisticated cyber operations. Experts emphasize that strong foundational security practices remain the best defense, as AI amplifies existing threats and...

    Read More »
  • Why Satellite Cybersecurity Is Everyone's Concern

    Why Satellite Cybersecurity Is Everyone's Concern

    Satellite cybersecurity has become a critical global issue due to the widespread reliance on these systems for communications, navigation, finance, and national security, with many older satellites lacking modern security protections. Vulnerabilities exist across all segments of space systems, in...

    Read More »
  • ScamAgent: How AI Is Fueling a New Era of Fraudulent Calls

    ScamAgent: How AI Is Fueling a New Era of Fraudulent Calls

    AI-driven scams are evolving to use multi-turn conversations that bypass traditional safety systems by breaking malicious intent into incremental, seemingly harmless steps. These advanced scams can adapt their approach based on victim responses, altering tone and tactics, and are increasingly rea...

    Read More »
  • AI Platforms: A New Backdoor for Malware

    AI Platforms: A New Backdoor for Malware

    Cybersecurity researchers have demonstrated that malware can use popular AI assistants like Grok and Microsoft Copilot as covert command-and-control channels, bypassing traditional security by relaying instructions through these trusted services. The attack manipulates the AI's web interface to f...

    Read More »
  • LinkedIn Phishing Attack Uses Pen Testing Tool to Target Executives

    LinkedIn Phishing Attack Uses Pen Testing Tool to Target Executives

    A sophisticated phishing campaign targets business leaders and IT professionals via LinkedIn, using industry-specific lures to build false trust and deliver malicious links. The attack deploys a Remote Access Trojan (RAT) by abusing a legitimate PDF reader through DLL sideloading, which complicat...

    Read More »