AI isn’t ready to replace human coders for debugging, researchers say – Go Health Pro

AI isn’t ready to replace human coders for debugging, researchers say – Go Health Pro

Agents using debugging tools drastically outperformed those that didn’t, but their success rate still wasn’t high enough. Credit: Microsoft Research This approach is much more successful than relying on the models as they’re usually used, but when your best case is a 48.4 percent success rate, you’re not ready for primetime. The limitations are likely … Read more

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability – Go Health Pro

BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability – Go Health Pro

Mar 29, 2025Ravie LakshmananCybercrime / Vulnerability In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering crucial information about their modus operandi in the process. Resecurity said it identified a security vulnerability in the data leak site (DLS) operated by … Read more

OpenAI’s Operator AI agent can be used in phishing attacks, say researchers – Go Health Pro

OpenAI’s Operator AI agent can be used in phishing attacks, say researchers – Go Health Pro

AI agents such as OpenAI’s Operator have added more functionality than these tools had in the past and can now help attackers launch phishing campaigns.  Symantec researchers explained that about a year ago, they would tell security pros that large language models (LLMs) were passive and could only help attackers create phishing materials or write … Read more

Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials – Go Health Pro

Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials – Go Health Pro

Mar 10, 2025Ravie LakshmananCybersecurity / Malware Cybersecurity researchers have demonstrated a novel technique that allows a malicious web browser extension to impersonate any installed add-on. “The polymorphic extensions create a pixel perfect replica of the target’s icon, HTML popup, workflows and even temporarily disables the legitimate extension, making it extremely convincing for victims to believe … Read more

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates – Go Health Pro

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates – Go Health Pro

Mar 04, 2025Ravie LakshmananCybercrime / Threat Intelligence Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) module for maintaining persistent control over infected hosts, a sign that affiliates previously associated with Black Basta may have transitioned to CACTUS. “Once infiltrated, it grants attackers a … Read more