[ad_1] Apr 30, 2025Ravie LakshmananArtificial Intelligence / Email Security As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has found how techniques that render the Model Context Protocol (MCP) susceptible to prompt injection attacks could be used to develop security tooling or identify malicious tools, according to a…
Month: April 2025
RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control
[ad_1] Cybersecurity researchers have revealed that RansomHub‘s online infrastructure has “inexplicably” gone offline as of April 1, 2025, prompting concerns among affiliates of the ransomware-as-a-service (RaaS) operation. Singaporean cybersecurity company Group-IB said that this may have caused affiliates to migrate to Qilin, given that “disclosures on its DLS [data leak site] have doubled since February.”…
Nebulous Mantis Targets NATO-Linked Entities with Multi-Stage Malware Attacks
[ad_1] Apr 30, 2025Ravie LakshmananThreat Intelligence / Malware Cybersecurity researchers have shed light on a Russian-speaking cyber espionage group called Nebulous Mantis that has deployed a remote access trojan called RomCom RAT since mid-2022. RomCom “employs advanced evasion techniques, including living-off-the-land (LOTL) tactics and encrypted command and control (C2) communications, while continuously evolving its infrastructure…
Chinese Hackers Abuse IPv6 SLAAC for AitM Attacks via Spellbinder Lateral Movement Tool
[ad_1] Apr 30, 2025Ravie LakshmananMalware / DNS Security A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool called Spellbinder that can facilitate adversary-in-the-middle (AitM) attacks. “Spellbinder enables adversary-in-the-middle (AitM) attacks, through IPv6 stateless address autoconfiguration (SLAAC) spoofing, to move laterally in the compromised network, intercepting packets and…
[Free Webinar] Guide to Securing Your Entire Identity Lifecycle Against AI-Powered Threats
[ad_1] Apr 30, 2025The Hacker News How Many Gaps Are Hiding in Your Identity System? It’s not just about logins anymore. Today’s attackers don’t need to “hack” in—they can trick their way in. Deepfakes, impersonation scams, and AI-powered social engineering are helping them bypass traditional defenses and slip through unnoticed. Once inside, they can take…
The Multi-Billion Dollar Problem You Don’t Know About
[ad_1] Everyone has cybersecurity stories involving family members. Here’s a relatively common one. The conversation usually goes something like this: “The strangest thing happened to my streaming account. I got locked out of my account, so I had to change my password. When I logged back in, all my shows were gone. Everything was in…
Meta Launches LlamaFirewall Framework to Stop AI Jailbreaks, Injections, and Insecure Code
[ad_1] Apr 30, 2025Ravie LakshmananSecure Coding / Vulnerability Meta on Tuesday announced LlamaFirewall, an open-source framework designed to secure artificial intelligence (AI) systems against emerging cyber risks such as prompt injection, jailbreaks, and insecure code, among others. The framework, the company said, incorporates three guardrails, including PromptGuard 2, Agent Alignment Checks, and CodeShield. PromptGuard 2…
Indian Court Orders Action to Block Proton Mail Over AI Deepfake Abuse Allegations
[ad_1] Apr 30, 2025Ravie LakshmananPrivacy / Data Protection A high court in the Indian state of Karnataka has ordered the blocking of end-to-end encrypted email provider Proton Mail across the country. The High Court of Karnataka, on April 29, said the ruling was in response to a legal complaint filed by M Moser Design Associated…
New Reports Uncover Jailbreaks, Unsafe Code, and Data Theft Risks in Leading AI Systems
[ad_1] Various generative artificial intelligence (GenAI) services have been found vulnerable to two types of jailbreak attacks that make it possible to produce illicit or dangerous content. The first of the two techniques, codenamed Inception, instructs an AI tool to imagine a fictitious scenario, which can then be adapted into a second scenario within the…
WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy
[ad_1] Apr 29, 2025Ravie LakshmananArtificial Intelligence / Data Protection Popular messaging app WhatsApp on Tuesday unveiled a new technology called Private Processing to enable artificial intelligence (AI) capabilities in a privacy-preserving manner. “Private Processing will allow users to leverage powerful optional AI features – like summarizing unread messages or editing help – while preserving WhatsApp’s…









