X

Vous n'êtes pas connecté

Maroc Maroc - citizen.co.za - A La Une - 20/Feb 03:00

AI is risky business behind the ghost in the machine

Employees and software using AI behind the scenes expose organisations to breaches, phishing, malware, and compliance failures.

Articles similaires

AI is risky business behind the ghost in the machine

citizen.co.za - 20/Feb 03:00

Employees and software using AI behind the scenes expose organisations to breaches, phishing, malware, and compliance failures.

Sorry! Image not available at this time

Hackers Use Excel Exploit to Hide XWorm 7.2 in JPEG Files, Hijack PCs

itsecuritynews.info - 23/Feb 12:03

A new phishing campaign is spreading XWorm 7.2 via malicious Excel files, hiding the malware in Windows processes, and using AES encryption to steal...

Sorry! Image not available at this time

Hackers Use Excel Exploit to Hide XWorm 7.2 in JPEG Files, Hijack PCs

itsecuritynews.info - 23/Feb 12:03

A new phishing campaign is spreading XWorm 7.2 via malicious Excel files, hiding the malware in Windows processes, and using AES encryption to steal...

Sorry! Image not available at this time

PromptSpy is the first known Android malware to use generative AI at runtime

bleepingcomputer.com - 19/Feb 22:36

Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google's Gemini model to adapt its...

Sorry! Image not available at this time

PromptSpy is the first known Android malware to use generative AI at runtime

bleepingcomputer.com - 19/Feb 22:36

Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google's Gemini model to adapt its...

Sorry! Image not available at this time

Cox Business’ AI Guide

cablefax.com - 24/Feb 00:00

Cox Business is looking to provide some clarity as companies and their employees wrap their hands around AI technology. Cox released “The AI...

Sorry! Image not available at this time

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 85

itsecuritynews.info - 22/Feb 15:37

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware...

Sorry! Image not available at this time

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 85

itsecuritynews.info - 22/Feb 15:37

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware...

Sorry! Image not available at this time

New Phishing Campaign Exploits Booking.com Partners, Targets Customers in Multi-Stage Fraud Scheme

itsecuritynews.info - 18/Feb 06:34

New phishing activity is again abusing the Booking.com ecosystem to defraud both hotel partners and their guests, using a coordinated multi‑stage...

Sorry! Image not available at this time

New Phishing Campaign Exploits Booking.com Partners, Targets Customers in Multi-Stage Fraud Scheme

itsecuritynews.info - 18/Feb 06:34

New phishing activity is again abusing the Booking.com ecosystem to defraud both hotel partners and their guests, using a coordinated multi‑stage...