Unknown threat actors have been observed weaponizing v0, a generative artificial intelligence (AI) tool from Vercel, to design fake sign-in pages that impersonate their legitimate counterparts. “This observation signals a new evolution in the weaponization of Generative AI by threat actors who have demonstrated an ability to generate a functional phishing site from simple text […]
Author Archives: Onsite Computing, Inc.
The attack uses sideloading to deliver a variant of the popular Gh0stRAT malware and lures victims by posing — among other things — as a purported installer for DeepSeek’s LLM. Go to Source Author: Robert Lemos, Contributing Writer
Australian airline Qantas disclosed that it detected a cyberattack on Monday after threat actors gained access to a third-party platform containing customer data. […] Go to Source Author: Lawrence Abrams
Just as attackers have used SEO techniques to poison search engine results, they could rinse and repeat with artificial intelligence and the responses LLMs generate from user prompts. Go to Source Author: Jai Vijayan, Contributing Writer
AT&T has launched a new security feature called “Wireless Lock” that protects customers from SIM swapping attacks by preventing changes to their account information and the porting of phone numbers while the feature is enabled. […] Go to Source Author: Lawrence Abrams
As the largest managed security services provider, the combined entity will offer cyber consulting, managed detection and response, and incident response services. Go to Source Author: Jeffrey Schwartz
Microsoft warns thousands of North Korean workers have infiltrated tech, manufacturing, and transportation sectors to steal money and data. Go to Source Author: Becky Bracken
Cyber insurance companies were forced to adapt once ransomware skyrocketed and highlighted crucial security weaknesses among organizations in all sectors. Go to Source Author: Arielle Waldman
Microsoft has released the source code for the GitHub Copilot Chat extension for VS Code under the MIT license. […] Go to Source Author: Bill Toulas
Teaching employees to detect malicious emails isn’t really having an impact. What other options do organizations have? Go to Source Author: Nate Nelson, Contributing Writer
