// AI SECURITY

// AI БЕЗПЕКА

9 articles
All Zero-Day Ransomware Phishing Supply Chain AI Security Data Breaches Malware Vulnerabilities Attacks Security
CyberStrikeAI tool adopted by hackers for AI-powered attacks

Security researchers discovered that threat actors are actively using CyberStrikeAI, an open-source AI security testing platform, in real attacks. The same threat actor used this tool in a campaign that successfully breached hundreds of Fortinet FortiGate firewalls, representing an actual active malware/attack campaign with identified victims.

Bug in Google's Gemini AI Panel Opens Door to Hijacking

A vulnerability was discovered in Google's Gemini AI Panel that could allow attackers to escalate privileges, violate user privacy during browsing, and access sensitive resources. This represents an actual vulnerability disclosure affecting a real product with potential security impact to users.

Vulnerability Allowed Hijacking Chrome’s Gemini Live AI Assistant

A vulnerability was discovered that allowed malicious Chrome extensions to hijack the Gemini Live AI assistant feature, enabling attackers to spy on users and steal their files. This represents an actual security vulnerability affecting Chrome users with potential for real-world exploitation.

Hackers Weaponize Claude Code in Mexican Government Cyberattack

Mexican government was targeted in a cyberattack where hackers weaponized Claude AI to write exploits, create malicious tools, and exfiltrate over 150GB of data. This represents an actual hacking incident against a specific government target with documented data theft.

ClawJacked Flaw Lets Malicious Sites Hijack Local OpenClaw AI Agents via WebSocket

OpenClaw patched a high-severity vulnerability (ClawJacked) in its core gateway that could allow malicious websites to hijack locally running AI agents via WebSocket connections. The flaw affected the bare OpenClaw system without requiring plugins or extensions, representing a real vulnerability disclosure with demonstrated attack potential.

ScarCruft Uses Zoho WorkDrive and USB Malware to Breach Air-Gapped Networks

Security researchers at Zscaler ThreatLabz discovered an active malware campaign by North Korean threat actor ScarCruft using new tools including a backdoor leveraging Zoho WorkDrive for command-and-control and USB malware designed to breach air-gapped networks. This represents a real threat campaign with documented malware tools and attack techniques targeting specific network architectures.

In Other News: ATT&CK Advisory Council, Russian Cyberattacks Aid Missile Strikes, Predator Bypasses iOS Indicators

This roundup article mentions multiple actual security incidents including: Russian cyberattacks coordinating with missile strikes, the Predator spyware bypassing iOS security indicators, and ShinyHunters claiming responsibility for breaching Odido (a telecom company). While presented as brief news items, these describe real threat actors, vulnerabilities, and breaches with specific targets.

APT37 hackers use new malware to breach air-gapped networks

APT37, a North Korean threat group, has been discovered using new malware specifically designed to breach air-gapped networks by leveraging removable drives for data exfiltration and lateral movement. This represents an active malware campaign with real adversarial capabilities targeting isolated systems.

Zyxel Patches Critical Vulnerability in Many Device Models

Zyxel has patched a critical vulnerability in multiple device models affecting the UPnP function that could allow remote code execution. This is a legitimate vulnerability disclosure with real security impact across multiple products.