South Korea Suspends DeepSeek AI Downloads Over Privacy Violations
Feb 17, 2025Ravie LakshmananArtificial Intelligence / Data Protection South Korea has formally…
AI-Powered Social Engineering: Ancillary Tools and Techniques
Social engineering is advancing fast, at the speed of generative AI. This…
SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images
A new malware campaign dubbed SparkCat has leveraged a suit of bogus…
AI-Powered Social Engineering: Reinvented Threats
The foundations for social engineering attacks – manipulating humans – might not…
Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection
Feb 08, 2025Ravie LakshmananArtificial Intelligence / Supply Chain Security Cybersecurity researchers have…
DeepSeek App Transmits Sensitive User and Device Data Without Encryption
Feb 07, 2025Ravie LakshmananMobile Security / Artificial Intelligence A new audit of…
Top 5 AI-Powered Social Engineering Attacks
Social engineering has long been an effective tactic because of how it…
Over 57 Nation-State Threat Groups Using AI for Cyber Operations
Over 57 distinct threat actors with ties to China, Iran, North Korea,…
What’s Effective and What’s Not – Insights from 200 Experts
Jan 29, 2025The Hacker NewsThreat Detection / Artificial Intelligence Curious about the…


