Blocks antropia hackers que tentam explorar Claude AI para ataques cibernéticos

GPT

A Anthropic, uma empresa líder de pesquisa de IA, interrompeu com sucesso várias tentativas de criminosos cibernéticos de usar seu modelo de IA Claude para ataques cibernéticos sofisticados, conforme detalhado em seu mais recente relatório de inteligência de ameaças. A empresa implementou salvaguardas avançadas, incluindo classificadores em tempo real e técnicas de resumo hierárquico, para … Ler mais

Netherlands Confirms China’s Salt Typhoon Targeted Small Dutch Telcos

Netherlands Confirms China’s Salt Typhoon Targeted Small Dutch Telcos

Dutch intelligence agencies have revealed that the Chinese hacking group Salt Typhoon targeted organizations in the Netherlands. In a joint statement published August 28 on the Dutch Ministry of Defence’s website, the Military Intelligence and Security Service (MIVD) and the General Intelligence and Security Service (AIVD) said they have now “independently confirmed parts of the … Ler mais

Quebrando a promessa da PassKe

Breaking the Passkey Promise: SquareX Discloses Major Passkey Vulnerability at DEF CON 33

Não é segredo que as senhas são altamente suscetíveis a ataques de phishing e força bruta. Isso levou à adoção em massa de passagens, um método de autenticação sem senha alavancando pares de chaves criptográficas que permitem que os usuários efetuem login com biometria ou uma chave de hardware. De acordo com a FIDO, mais … Ler mais

Screenconnect de screenconnect armado RMM engana os usuários para a instalação do rato Xworm

Weaponized ScreenConnect RMM Tool Deceives Users into Installing Xworm RAT

A equipe de caça à ameaça do Spiderlabs descobriu recentemente uma campanha cibernética na qual os atores de ameaças usaram o aplicativo de gerenciamento remoto genuíno de screenconnect como uma arma para espalhar o Xworm Remote Access Trojan (RAT) por uma cadeia de infecção multifásica. O ataque começa com táticas de engenharia social, incluindo phishing, … Ler mais

A violação de seguros dos agricultores expõe dados de 1,1 milhão de clientes por meio de compromisso do Salesforce

Farmers Insurance Breach Exposes Data of 1.1 Million Customers via Salesforce Compromise

A Farmers Insurance divulgou uma violação de dados decorrente de acesso não autorizado ao banco de dados de um fornecedor de terceiros, potencialmente comprometendo as informações pessoais de aproximadamente 1,1 milhão de clientes. A violação, detectada em 30 de maio de 2025, envolveu um ator não autorizado se infiltrando em um sistema gerenciado pelo fornecedor, … Ler mais

Shadow IT Is Expanding Your Attack Surface. Here’s Proof

Intruder dashboard

Shadow IT – the systems your security team doesn’t know about – is a persistent challenge. Policies may ban them, but unmanaged assets inevitably slip through. And if defenders don’t uncover them first, there’s always a risk attackers will. With just a few days of effort, Intruder’s security team uncovered multiple real-world examples of Shadow … Ler mais

TransUnion suffers data breach impacting over 4.4 million people

Picus Blue Report 2025

Update: Story updated with confirmation that this was another Salesforce data theft attack and the types of data stolen. Consumer credit reporting giant TransUnion warns it suffered a data breach exposing the personal information of over 4.4 million people in the United States, with BleepingComputer learning the data wasstolen from it’s Salesforce account. TransUnion is … Ler mais

200 Swedish municipalities impacted by a major cyberattack on IT provider

200 Swedish municipalities impacted by a major cyberattack on IT provider

200 Swedish municipalities impacted by a major cyberattack on IT provider Cyberattack on Miljödata disrupted services in over 200 Swedish municipalities, with concerns over stolen sensitive data. A cyberattack on Miljödata, an IT supplier serving 80% of Swedish municipalities, including Skellefteå,MönsteråsandKalmar, disrupted services in over 200 municipalities and raised concerns of stolen sensitive data. The … Ler mais

Malicious VS Code Extensions Exploit Name Reuse Loophole

Malicious VS Code Extensions Exploit Name Reuse Loophole

A new campaign involving malicious Visual Studio Code (VS Code) extensions has exposed a loophole in the VS Code Marketplace that allows threat actors to reuse names of previously removed packages. The extensions, which carried the name “shiba,”delivered ransomware through a multi-stage attack. How the Attack Works ReversingLabsresearchers found that one of the malicious extensions, … Ler mais

Nevada Confirms Ransomware Attack, State Data Stolen

Nevada Confirms Ransomware Attack, State Data Stolen

A security incident impacting the state of Nevada has been confirmed to be a ransomware attack. Nevada’s chief information officer (CIO) Tim Galluzi provided the update in a press conference on August 27, also revealing that the attackers had exfiltrated data from state networks. “At this stage of our intensive investigation, we cannot yet identify … Ler mais