Scammers Are Using Grok to Spread Malicious Links on X
Scammers Are Using Grok to Spread Malicious Links on X Summary Bad actors on X (formerly Twitter) are exploiting X’s AI assistant Grok to make malicious links clickable and widely…
Scammers Are Using Grok to Spread Malicious Links on X Summary Bad actors on X (formerly Twitter) are exploiting X’s AI assistant Grok to make malicious links clickable and widely…
Secretive MaaS Group ‘TAG-150’ Develops Novel ‘CastleRAT’ Summary Researchers have mapped an emerging malware-as-a-service (MaaS) cluster labelled TAG-150 that centres on a loader and bespoke remote access Trojans (RATs) collectively…
Anyone Using Agentic AI Needs to Understand Toxic Flows Summary This Dark Reading piece explains why organisations adopting agentic AI must pay attention to “toxic flows” — dangerous interactions between…
Critical SAP S/4HANA Vulnerability Under Attack, Patch Now Summary A critical code-injection vulnerability in SAP S/4HANA, CVE-2025-42957 (CVSS 9.9), is being exploited in the wild. The flaw lets a low-privileged…
First CRISPR horses spark controversy: what’s next for gene-edited animals? Summary Scientists in Argentina have produced the first horses whose genomes were edited with CRISPR–Cas9. The five cloned foals are…
Nature goes inside the world’s largest ‘mosquito factory’ — here’s the buzz Summary A large facility in Brazil is mass-producing mosquitoes infected with the harmless bacterium Wolbachia, which reduces the…
Critical, make-me-super-user SAP S/4HANA bug under active exploitation Summary A critical code-injection vulnerability (CVE-2025-42957) in SAP S/4HANA — rated 9.9 — is being actively exploited. SecurityBridge Threat Research Labs, which…
HHS warns US health care industry to share data with patients or else Summary The US Department of Health and Human Services (HHS) has announced it will take an “active…
Shell to pay: Crims invade your PC with CastleRAT malware, now in C and Python Summary A criminal crew called TAG-150 has developed CastleRAT in two flavours — a stealthy…
The crazy, true story behind the first AI-powered ransomware Summary A New York University engineering team built a proof-of-concept AI-driven ransomware they call Ransomware 3.0. The system uses large language…