Latest Intelligence
OpenAI’s Sam Altman Warns of AI Voice Fraud Crisis in Banking
Sam Altman of OpenAI has raised concerns about the growing threat of AI voice fraud in the banking sector, where AI voice clones can mimic individuals so accurately that they are nearly indistinguishable from reality. This situation necessitates the development of new verification methods to combat potential fraud. Read Original »
New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials
A new variant of the Coyote banking trojan has been identified as the first malware to exploit the Windows UI Automation framework to steal banking credentials. This variant specifically targets Brazilian users and can extract information from 75 banking institutions and cryptocurrency exchanges. Read Original »
Should We Trust AI? Three Approaches to AI Fallibility
The article discusses the inherent risks of trusting agentic AI, highlighting concerns about its fallibility, the hype surrounding it, and the lack of transparency. Experts caution that these issues necessitate careful consideration before the pace of automation surpasses our understanding of AI systems. Read Original »
France Says Administrator of Cybercrime Forum XSS Arrested in Ukraine
French authorities have announced the arrest of an alleged administrator of the cybercrime forum XSS.is in Ukraine. This forum is noted as one of the longest-running platforms for cybercriminal activities. Read Original »
UK’s Ransomware Payment Ban: Bold Strategy or Dangerous Gamble?
The article discusses concerns regarding the UK's proposed ban on ransomware payments, highlighting potential unintended consequences such as increased secrecy among victims and a shift in tactics by attackers. Critics argue that this bold strategy may lead to more harm than good in the fight against ransomware. Read Original »
Coyote Banking Trojan First to Abuse Microsoft UIA
The Coyote Banking Trojan has been identified as the first malware to exploit Microsoft’s UIA accessibility framework to extract sensitive data. This highlights a new method of attack that leverages legitimate software features for malicious purposes. Read Original »
Organizations Warned of Interlock Ransomware Attacks
The US government has issued an alert regarding the Interlock ransomware, which employs drive-by download attacks to target organizations. This warning highlights the growing threat posed by ransomware in the cybersecurity landscape. Read Original »
Kerberoasting Detections: A New Approach to a Decade-Old Challenge
Kerberoasting remains a persistent challenge in cybersecurity, primarily due to the reliance on brittle heuristics and static rules for detection. These methods often lead to false positives and fail to identify subtle attack patterns in Kerberos traffic. Read Original »
Critical Vulnerabilities Patched in Sophos Firewall
Sophos has addressed five critical vulnerabilities in its Sophos Firewall that could enable remote attackers to execute arbitrary code. These patches are essential for maintaining the security and integrity of the affected systems. Read Original »
High-Severity Flaws Patched in Chrome, Firefox
Recent security updates for Chrome and Firefox have addressed multiple high-severity memory safety vulnerabilities. These updates are crucial for maintaining the security and integrity of users' data. Read Original »
Lumma Stealer Malware Returns After Takedown Attempt
The Lumma Stealer malware has resurfaced following attempts by Microsoft and law enforcement to disrupt its infrastructure. This indicates that the efforts to take down the malware were not entirely successful. Read Original »
Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages
Google has launched OSS Rebuild to enhance the security of open-source package ecosystems and mitigate software supply chain attacks. This initiative aims to provide security teams with valuable data to prevent compromises without overburdening upstream maintainers. Read Original »
Hackers Start Exploiting Critical Cisco ISE Vulnerabilities
Cisco has reported that hackers are actively exploiting critical vulnerabilities in its Identity Services Engine (ISE), which could allow for unauthenticated remote code execution. The situation underscores the urgency for organizations to address these vulnerabilities to prevent potential breaches. Read Original »
CISA Warns of SysAid Vulnerability Exploitation
CISA has identified and added two vulnerabilities in SysAid, designated as CVE-2025-2776 and CVE-2025-2775, to its Known Exploited Vulnerabilities (KEV) catalog. This highlights the potential risks associated with these vulnerabilities and the need for immediate attention from affected users. Read Original »
CISA Warns: SysAid Flaws Under Active Attack Enable Remote File Access and SSRF
CISA has identified two critical vulnerabilities in SysAid IT support software that are currently being actively exploited. These vulnerabilities allow for remote file access and could lead to significant security risks for affected systems. Read Original »