AI Security Risks | Cybersecurity Threats | Data Exfiltration Techniques CometJacking: Single Click Transforms Perplexity’s Comet AI Browser into Data Stealer
Malware Campaign | Phishing Attacks | WhatsApp Propagation New self-replicating WhatsApp malware called SORVEPOTEL
Advanced Malware Techniques | Cloud-Native Security Threats | DDoS Operations Advanced ShadowV2 DDoS-as-a-service botnet operating in the cloud
Cyber Espionage | Malware Analysis | Targeted Attacks BRICKSTORM cyberespionage malware detected within network infrastructure