Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Pennsylvania House Passes Bill to Limit Payments for Cyber ​​Charter Schools

Trump moves to block US entry for Harvard-bound foreigners

Top 10 Startup and Tech Funding News – June 4, 2025

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » 57 or more national threats that use AI for cyber operations
Identity

57 or more national threats that use AI for cyber operations

userBy userJanuary 30, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cyber ​​operation AI

Observed more than 57 different threat actors with connecting China, Iran, North Korea, and Russia to enable malicious cyber and information operations using Google -mounted artificial intelligence (AI) technology. It is done.

Google Threat Intelligence Group (GTIG) said in a new report that “threats have not yet developed gemini, enabled operation, and have not yet developed new abilities.” “Currently, they use AI mainly for research, chord trouble shooting, content creation and localization.”

Government -supported attackers are called highly permanent threats (apt) groups, but using the tools to collect information on coding, scripting tasks, payload development, potential targets, and public. We are trying to strengthen multiple phases of the attack cycle, including research on known vulnerabilities. , And enabling post -agricultural activities such as defense avoidance.

Cyber ​​security

GTIG, which describes Iran APT actors as “the heavyest user of Gemini,” describes the Hacking Crew, which is known as Apt42, states that the country’s hacker accounts for more than 30 % of the use of gemini, creating a fishing campaign. , Tools for conducting defense reconnaissance have been used. Production of experts and organizations, and content using cyber security themes.

Apt42, which overlaps with attractive kittens and cluster tracked as mint sandstorms, has a history of adjusting social engineering schemes to penetrate the target network and cloud environment. In May last year, Mandiant has adopted journalists and event organizers to clarify the target of NGOs, media organizations, academia, legal services, and activists threatening actors in the western and Middle East.

A hostile group has been discovered to study military and weapons systems, study strategic trends in the Chinese defense industry, and better understand the US -made aerospace system.

The Chinese APT Group is searching for Gemini how to dig a deep hole in reconnaissance, troubleshooting codes, and victim network through technology such as horizontal movement, privileged escalation, data removal, and avoiding detection. I understand.

Russian APT actors have converted the generally available malware into another coding language and restricted Gemini to add encrypted layers to existing code, but North Korean actors are Google. We used AI services to study infrastructure and hosting providers.

“It is noteworthy that North Korean actors have used Gemini to keep their cover letter and research work. This supports North Korea’s efforts to place secret IT workers in Western companies. GTIG says, “said GTIG.

“One of the groups supported by North Korea used GEMINI to draft the cover letter and proposals of the duties description, investigated the average salary of specific jobs, and asked about Linkedin’s work. The group. We also use GEMINI for information on overseas employee exchange.

Tech Giant further noted that the underground forum posted to advertise a large language model (LLM) that can generate a response except for safety and ethical constraints.

Cyber ​​security

An example of such tools includes WormGpt, Wolfgpt, Escapegpt, fraud, and GhostGpt. These are designed to create personalized phishing emails, create templates for business email compromise (BEC) attacks, and design unauthorized websites.

The attempt to abuse Gemini is developed mainly in local events, creating, translation, and localization, as part of the impact on Iran, China, and Russia. As a whole, Apt Groups of 20 or more countries used gemini.

Google states that it will “actively develop defense” to compete with quick injection attacks, but further emphasizes the need for cyber defense and strengthen public -private collaboration to confuse threats. “It is necessary to cooperate with the US industry and the government to cooperate. Economic safety.”

Did you find this article interesting? Follow on Twitter and Linkedin and read the exclusive content to post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous Article“It’s sealed.”: President Panama says there is no debate about us and the canal | Political News
Next Article Solobit coin minor strike gold: $ 400 home rigs get 326K blocks $ 326k blocks for odds
user
  • Website

Related Posts

Google publishes vishing group UNC6040 targeting salesforce with fake data loader app

June 4, 2025

Chaos Rat Malware Targets Window and Linux via fake network tools download

June 4, 2025

Why traditional DLP solutions fail in the browser era

June 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Pennsylvania House Passes Bill to Limit Payments for Cyber ​​Charter Schools

Trump moves to block US entry for Harvard-bound foreigners

Top 10 Startup and Tech Funding News – June 4, 2025

Nebraska Governor Signature Building Prohibits Transgender Students from Women’s Sports

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top 10 Startup and Tech Funding News – June 4, 2025

$Zeus marks his territory: announces IP collaboration with original Zeus artists and trademark holders

AI Startup You.com discusses funding at a $1.4 billion valuation for funding for AI-driven enterprise search

ThreatSpike raises $14 million in Series A funding after 14 years of bootstrap

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.