Author: Cyberthreat Blog
AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims
Cybersecurity researchers are drawing attention to a new campaign that’s using legitimate generative artificial intelligence (AI)-powered website building tools like DeepSite AI and BlackBox AI to create replica phishing...
Read MoreVU#554637: TP-Link Archer C50 router is vulnerable to configuration-file decryption
Overview The TP-Link Archer C50 router, which has reached End-of-Life (EOL), contains a hardcoded encryption key in its firmware, enabling decryption of sensitive configuration files. This vulnerability allows attackers to...
Read MoreA Roadmap for Incorporating Positive Deterrence in Insider Risk Management
Positive deterrence reduces insider risk through workforce practices that promote the mutual interests of employees and their organization.
Read MoreReflections from the First Cyber AI Profile Workshop
Thank you to everyone who participated in the Cyber AI Profile Workshop NIST hosted this past April! This work intends to support the cybersecurity and AI communities — and the input you provided during this workshop is...
Read More