Workflow
Malware
icon
Search documents
X @Cointelegraph
Cointelegraph· 2025-11-18 16:30
🚨 SECURITY: Private key theft has become a full-fledged business, using malware and seed phrase scanners to raid wallets and backups, GK8 warns. https://t.co/JF5u9aEZGL ...
X @MetaMask.eth 🦊
MetaMask.eth 🦊· 2025-11-10 18:45
🔗 Blockchain malware’s neverending novelty - via @tayvano_https://t.co/Aw6CD5MIvm ...
X @MetaMask.eth 🦊
MetaMask.eth 🦊· 2025-11-10 18:45
Every year, a “brand new” blockchain malware threat makes headlines.But it isn’t what it seems. 👀@tayvano_ broke down the latest waves of blockchain malware.. and explains why they grab headlines, fade fast, and rarely change the real threat landscape.👇 https://t.co/UMD2mwsWgv ...
X @Decrypt
Decrypt· 2025-11-07 07:16
Google Threat Report Links AI-powered Malware to DPRK Crypto Theft► https://t.co/f5yCBSR0wZ https://t.co/f5yCBSR0wZ ...
X @Forbes
Forbes· 2025-10-29 13:25
Malware Threat - A new piece of Android malware named Herodotus can mimic human typing and behaviors to steal passwords and financial credentials [1] - Herodotus is capable of bypassing biometric detection protections [1]
X @Decrypt
Decrypt· 2025-10-21 09:39
DPRK Hackers Use 'EtherHiding' to Host Malware on Ethereum, BNB Blockchains: Google► https://t.co/O70NURkPvp https://t.co/O70NURkPvp ...
Part 2: Social engineering, malware, and the future of cybersecurity in AI
Google DeepMind· 2025-10-16 16:08
Cybersecurity Threats & Actors - Nation-state actors are primarily motivated by geopolitical aims and espionage, often engaging in offensive cyberattacks to support warfare or prepositioning for potential conflicts [5][6] - Subnation-state actors and some nation-state activities are financially motivated, commonly using ransomware attacks to steal and encrypt data, demanding cryptocurrency for its release [9][10] - A gray market exists for zero-day vulnerabilities, with buyers including companies equipping law enforcement and governments, with some vulnerabilities worth millions of dollars [12][14] - AI is exacerbating social engineering risks by enabling deep fakes, making phishing attacks more tailored and effective, such as cloning voices for ransom demands or impersonating executives for financial fraud [30][32][33] Vulnerability Disclosure & Mitigation - Project Zero introduced a 90-day disclosure timeline for vulnerabilities, compelling companies to prioritize security patches to prevent exploitation by malicious actors [19][20] - Governments have been known to deliberately withhold vulnerability information for exploitation purposes, as exemplified by the Eternal Blue case [24] - Healthcare and critical infrastructure sectors often struggle with patch management due to the risk of disrupting essential services, leading to long-term vulnerabilities [29] - Multi-factor authentication and pass keys are emerging as strong defenses against phishing and password-related attacks, enhancing security and user experience [37][39][40] AI & Agent Security - Risk-based authentication, enhanced by AI, assesses user behavior to determine trust levels and adjust security friction accordingly, such as requiring multi-factor authentication based on anomalous activity [43][46] - The rise of AI agents acting on behalf of humans introduces new security challenges, requiring careful consideration of agent identity, permissions, and potential for misuse [50][51] - Contextual integrity is crucial for training AI agents to respect privacy norms and avoid disclosing sensitive data inappropriately, necessitating mechanisms for agents to seek permission before sharing information [57][58][59]
China’s cyber forces are targeting every American #shorts
60 Minutes· 2025-10-13 01:48
Cybersecurity Threats & Tactics - Chinese actors are gaining access to US systems, stealing login credentials, and masquerading as legitimate employees to lay dormant within the network [1] - Automated scanning activity targeting millions of devices occurs daily [2] - The White House is working to assess exposure and mitigate damage from Chinese hacking [2] Impact & Remediation - One network rebuild cost more than $50,000 [3] - Removing an intruder from a network is more resource-intensive than preventing access [3] - Getting the basics right in critical infrastructure is crucial to avoid expending more resources on rooting out intruders [3] Challenges & Capabilities - Perfect knowledge of the extent of Chinese infiltration into US systems is lacking [2] - Scaling cybersecurity efforts remains a challenge [3]
X @Decrypt
Decrypt· 2025-10-11 19:35
The keylogging malware is capable of using GitHub to redirect itself to new servers whenever existing servers go offline. https://t.co/8zqRd3KlVt ...
X @Crypto Rover
Crypto Rover· 2025-10-06 08:49
Core Technology & Vision - Nonossystems (NOX) aims to create a base layer system encompassing OS and Network [1] - The system focuses on user-controlled memory, generating proofs on demand [1] - The system is designed to block malware and prevent data leakage [1] Industry Implications - In the AI era, systems prioritizing user data control and security will be crucial [1]