The FBI has issued a warning that malicious actors are creating sex-themed deepfakes [https://www.bitdefender.com/blog/hotforsecurity/facebook-declares-war-on-deepfakes/] by manipulating photos and videos shared online by regular people. Criminals have long been using AI to create synthetic content, commonly referred to as “deepfake,” with the purpose of deceiving victims – either for financial gain (spear phishing [https://www.bitdefender.com/blog/hotforsecurity/spear-phishing-is-now-the-mai
The cybersecurity landscape is constantly evolving and as technology advances, so do the tools and tactics employed by both cybercriminals and cybersecurity professionals. One significant, recent development that has garnered much attention is the emergence of open-source, generative artificial intelligence (AI) tools and powerful language models such as ChatGPT and Bard. AI technologies can be a double-edged sword – while they can assist overworked cybersecurity professionals by automating and streamlining routine tasks, they can also be used by cybercriminals to automate and scale their attacks, or make their attacks more convincing.
North Korean state-sponsored hackers are targeting think tanks, research centres, media organisations, and academics in the United States and South Korea to gather intelligence. The notorious Kimsuky hacking group (also known as Velvet Chollima, Thallium, or Black Banshee) are posing as journalists to steal information in spear-phishing campaigns, according to a warning issued last week. The warning comes in the form of a joint advisory [https://content.govdelivery.com/attachments/USSTATEBPA/2
MCNA Dental, the largest dental insurer in the US for government‑sponsored programs, has revealed that hackers stole troves of data on millions of customers in an attack in March. On March 6, the company became aware of “certain activity” in its IT infrastructure that happened without permission, according to a data breach notice. The insurer hired cybersecurity experts to assess the intrusion and soon learned that “a criminal was able to see and take copies of some information in our computer