HackMyIP

網路安全資訊

來自頂級安全媒體的最新動態

2026-05-10BleepingComputer
Hackers Abuse Google Ads & Claude.ai Chats to Spread Mac Malware

A sophisticated malvertising campaign is leveraging Google Ads and the public chat‑sharing feature of Anthropic’s Claude.ai to distribute a macOS backdoor. Victims who search for "...

MalwareAI ThreatsPhishing
Read More → Use Tool →
2026-05-07SecurityWeek
Musk Sues OpenAI Over AI Humanity Risks, Calls for AI Regulation

Musk's legal team filed a complaint in the Delaware Court of Chancery on 12 March, alleging that OpenAI's board has abandoned its original mission to develop artificial general int...

AI SecurityRegulationAI Threats
Read More → Use Tool →
2026-05-07Dark Reading
AI-Driven Attack on Mexico Foiled by SCADA Login Shield

Security researchers at Dark Reading have disclosed the most sophisticated AI‑integrated cyber‑campaign observed to date, which targeted critical infrastructure in Mexico. The oper...

AI ThreatsIncident ResponseZero-Day
Read More → Use Tool →
2026-05-07Dark Reading
AI-Driven Cyberattack Targets SCADA Systems, Foiled by Login Screen

Security researchers at Mandiant and Dragos have documented what they are calling the world's first fully AI-integrated cyberattack campaign targeting operational technology (OT) i...

AI ThreatsVulnerabilityThreat Intel
Read More → Use Tool →
2026-05-06The Hacker News
AI Agents Outpacing Enterprise Governance: Security Teams Sound Alarm

According to Gartner's inaugural Market Guide for Guardian Agents, published in 2024, enterprise deployment of AI agents is accelerating at a pace that outstrips the development of...

AI SecurityAI ThreatsLLM Security
Read More → Use Tool →
2026-05-04The Hacker News
AI-Assisted Attack: 17-Year-Old Arrested for 7M User Data Breach

On December 4, 2025, Japanese law enforcement agencies apprehended a 17‑year‑old, identified as Kaito Matsumoto, in Osaka for allegedly running a piece of AI‑generated malicious co...

AI ThreatsData BreachMalware
Read More → Use Tool →
2026-05-01Dark Reading
North Korean APTs Dominate 2026 Crypto Theft, AI in the Mix

North Korean advanced persistent threat (APT) groups have consolidated their dominance over the cryptocurrency threat landscape in 2026, accounting for an estimated 76 % of all dig...

APTAI ThreatsThreat Intel
Read More → Use Tool →
2026-04-30Dark Reading
Anthropic's Mythos AI Redefines Cyber Threat Landscape

Anthropic has officially launched Mythos, its latest large language model designed with a reported 1.2 trillion parameters and native multimodal reasoning capabilities. According t...

AI SecurityAI ThreatsLLM Security
Read More → Use Tool →
2026-04-30Dark Reading
Japan Banks on Edge Over Anthropic's Superhacker AI Model

Japan’s financial services industry is on high alert after the release of Anthropic’s latest large language model, internally dubbed “Claude Mythos,” which early demonstrations sug...

AI SecurityAI ThreatsLLM Security
Read More → Use Tool →
2026-04-30BleepingComputer
Bluekit Phishing Kit Offers AI Assistant, 40+ Templates

Security researchers have uncovered a new phishing-as-a-service platform called Bluekit that advertises more than 40 ready‑made templates targeting popular online services such as ...

PhishingAI ThreatsAI Security
Read More → Use Tool →
2026-04-29The Hacker News
AI-Powered Kill Chain Automation Shifts Threat Landscape in 2026

In February 2026, a joint research team from SentinelLabs and the University of Calgary published a report revealing a paradigm shift in cyber‑attack tradecraft. The analysts, led ...

AI ThreatsAI SecurityThreat Intel
Read More → Use Tool →
2026-04-28Dark Reading
BlueNoroff Leverages Fake Zoom Calls, Deepfakes to Target Crypto Execs

BlueNoroff, the North Korean threat group tracked as an advanced persistent threat (APT), has refined its attack playbook by weaponizing fake Zoom calls to snare cryptocurrency exe...

APTDeepfakeAI Threats
Read More → Use Tool →
2026-04-27Dark Reading
Frontier AI Models Spark Cybersecurity Debate Among Experts

The rapid advancement of frontier large language models, including Anthropic's Claude family and OpenAI's rumored GPT-5.5, has ignited fierce debate within the cybersecurity commun...

AI SecurityLLM SecurityAI Threats
Read More → Use Tool →
2026-04-24Dark Reading
AI Phishing Surges: Hackers Shift to 1-to-1 Personalized Attacks

In the past six months, a surge of AI‑powered phishing campaigns has reshaped the threat landscape, according to an analysis published by Dark Reading. Threat actors are moving awa...

PhishingAI ThreatsThreat Intel
Read More → Use Tool →
2026-04-23Dark Reading
Zealot AI Attack Exposes Cloud Security Risks

In a live demonstration at the Dark Reading CyberStorm conference, researchers from Sentinel Labs unveiled 'Zealot', a proof‑of‑concept AI framework designed to autonomously compro...

AI ThreatsCloud Security
Read More → Use Tool →
2026-04-23The Hacker News
Beating Automated AI Exploitation: Webinar Reality Check

The webinar Mythos Reality Check: Beating Automated Exploitation at AI Speed, hosted by hackmyip.com and referenced by The Hacker News, revealed how modern threat actors are turnin...

AI ThreatsVulnerabilityZero-Day
Read More → Use Tool →
2026-04-17Dark Reading
How AI Is Amplifying Legacy Software Vulnerabilities Today

A new analysis published by Dark Reading warns that the most pressing security risk posed by artificial intelligence is not the emergence of novel code flaws, but the rapid amplifi...

VulnerabilityAI SecurityAI Threats
Read More → Use Tool →
2026-03-08KrebsOnSecurity
AI Assistants Redefine Cybersecurity Landscape

AI assistants, often marketed as autonomous "agents", are rapidly becoming a staple in developer toolchains, promising to automate everything from code generation to system configu...

AI SecurityAI ThreatsPrivacy
Read More → Use Tool →
2025-10-03Ars Technica
AI-Designed Protein Threat: DNA Screening Misses Biological Zero-Days

Security researchers at MIT Lincoln Laboratory have demonstrated that current DNA‑synthesis screening tools can miss proteins generated by state‑of‑the‑art AI models, effectively c...

Zero-DayAI ThreatsSupply Chain
Read More → Use Tool →