Android malware taps Gemini to navigate infected devices
First Android malware using generative AI, called PromptSpy, uses Gemini to adapt to any device UI to maintain persistence. It's likely a proof of concept.
40 articles tagged #cybersecurity
First Android malware using generative AI, called PromptSpy, uses Gemini to adapt to any device UI to maintain persistence. It's likely a proof of concept.
ATM jackpotting attacks using malware like Ploutus stole over $20M last year, with 700+ incidents in 2025. Criminals physically access ATMs to install malware that forces cash dispensing. The FBI warns of rising cases and shares detection signs.
GAO urges NSF CIO to improve IT management, including cloud procurement and cybersecurity, to enhance efficiency and compliance.
Criminals created a fake RMM vendor, "TrustConnect," which is actually a RAT sold as a service. They used a professional-looking website and a legitimate code-signing certificate to appear authentic, distributing it via phishing campaigns.
Tenga's data breach exposed about 600 U.S. customers' names, emails, and order details after an employee's email was hacked. The company has notified affected individuals.
Cellebrite cut off Serbian police after abuse allegations but dismissed similar claims in Jordan and Kenya, despite evidence from Citizen Lab researchers.
ATM jackpotting has evolved from a security demo to a widespread criminal operation. The FBI reports over 700 attacks in 2025, netting $20M, often using malware like Ploutus to force ATMs to dispense cash.
UK businesses face frequent cyber incidents, yet most lack basic defenses. The government launched a campaign urging firms to adopt Cyber Essentials, as only 30% currently comply.
The Trump admin seeks a Deputy Federal CIO ($198k-$228k) to manage federal IT and cybersecurity. The CIO wants someone who cuts noise, executes strategy, and has "zero patience for theater," focusing on efficiency.
The European Parliament disabled AI features on lawmakers' devices due to data security concerns. AI assistants send data to cloud services, raising fears of confidential info leaks. It's a temporary ban until data sharing is clarified.
Dragos reports 3 new, 2 existing state-backed groups, including China's Volt Typhoon/Voltzite, are actively targeting global critical infrastructure for espionage and destructive attacks, with a focus on OT systems.
China-linked hackers exploited a Dell RecoverPoint zero-day (CVE-2026-22769) since mid-2024 to deploy malware like Grimbolt for long-term access. Dell patched the flaw and warns of active exploitation.