Latest security news
- Public Instagram posts provide raw material for AI phishing campaigns
- Earbud sensors can authenticate users by their heartbeat, study finds
- AI infrastructure is cracking under sovereignty demands
- AI is drowning software maintainers in junk security reports
- Game over for 74 suspected scammers after Dutch cops plastered their faces on billboards
- Interpol Launches Sweeping Cybercrime Crackdown in MENA Region
- The Infosecurity Europe Cyber Startup Competition: Meet the Finalists
- Attackers are exploiting critical NGINX vulnerability (CVE-2026-42945)
- NCSC Publishes Guidance on Securing Agentic AI Use
- Security Researchers Find 47 Zero-Days at Pwn2Own Berlin
- Attackers accessed, downloaded code from Grafana Labs’ GitHub
- Bank of England, FCA and Treasury Raise Alarm Over Frontier AI
- 201 arrested in INTERPOL disruption of phishing and fraud networks
- Gremlin Stealer Evolves into Modular Threat with Advanced Evasion Capabilities
- Microsoft Reports Severe Zero-Day Flaw in On-Prem Exchange Servers
- China-Linked Hackers Deploy New TencShell Malware Against Global Manufacturer
- Mustang Panda Linked to Updated FDMTP Backdoor in Asia-Pacific Espionage Campaign
- Google Launches Android Spyware Forensics Tool for High-Risk Users
- New Fragnesia Flaw Hands Linux Local Users Root Access
- Most Organizations Now Use AI Agents for Sensitive Security Tasks
- ICO Publishes Five-Step Plan to Counter Emerging AI-Powered Attacks
- Canvas Owner Reaches Agreement With Cybercriminals After Ransomware Attack
- Avada Builder Flaws Expose One Million WordPress Sites
A handful of public Instagram posts can give attackers enough material to generate convincing phishing emails with GenAI. Research from the University of Texas at Arlington and Louisiana State University showed how public social media activity can be turned into phishing messages that appear personal and credible to human recipients. Attack pipeline overview (Source: Research paper) The findings highlight a growing problem for security teams and users. Attackers no longer need stolen databases or long …
(C) Do-Know.com (http://do-know.com/). Do not copy without permission from info at do-know.com.