Topic: defense strategies
-
Defending Against Adversarial AI Attacks: A Complete Guide
Adversarial AI attacks are a growing threat where subtle data alterations can deceive models into making harmful decisions, requiring both technical and strategic defenses. The book provides practical guidance on creating test environments, executing attacks like data poisoning, and implementing ...
Read More » -
Ransomware's New Target: Manufacturing
Ransomware tactics in manufacturing are evolving from data encryption to data theft and extortion, directly exploiting the high cost of production downtime and the value of proprietary designs. Attackers primarily breach systems through exploited vulnerabilities and malicious emails, while intern...
Read More » -
Ransomware Groups Pivot as Victims Stop Paying
Ransomware payment rates have plummeted to just 23% in Q3 2025, significantly undermining the financial model of cybercriminals and marking a victory for cybersecurity efforts. Attackers are increasingly relying on social engineering tactics like insider threats, helpdesk impersonation, and callb...
Read More » -
Entra ID Account Takeover Attacks: Researchers Issue Urgent Warning
Security experts warn of a surge in account takeover attacks targeting Microsoft Entra ID, using the TeamFiltration framework to brute-force corporate accounts, linked to the threat group UNK_SneakyStrike. Attackers have compromised over 80,000 user accounts across 100 organizations, weaponizing ...
Read More » -
ConsentFix Attack Hijacks Microsoft Accounts via Azure CLI
A new phishing campaign called **ConsentFix** compromises Microsoft accounts by exploiting the legitimate Azure CLI OAuth application, bypassing passwords and multi-factor authentication. The attack deceives users into authenticating themselves via a fake CAPTCHA and a Microsoft login page, then ...
Read More » -
Defeat Malware Evasion with New Framework
Malware creators use subtle code modifications to evade AI detection systems while preserving harmful functionality, but a new framework called ERDALT offers a countermeasure by focusing on robust features. ERDALT, developed by Inria and CISPA, trains on adversarial examples and prioritizes stabl...
Read More » -
New Atroposia RAT Emerges on Dark Web
Atroposia is a newly discovered remote access trojan sold on dark web marketplaces, offering encrypted remote control, credential theft, and cryptocurrency wallet data extraction. The malware is modular and integrates with tools like SpamGPT for AI-driven phishing campaigns and MatrixPDF for weap...
Read More » -
Microsoft Warns AI Could Engineer Biological Threats
A Microsoft report warns that AI could be exploited to design biological threats, such as redesigning toxic proteins, which lowers barriers to creating dangerous agents and highlights the need for stronger global biosecurity. Experts call for enhanced DNA synthesis screening and enforcement mecha...
Read More »