The Rise of Autonomous Scam Calls: Understanding the Threat of AI Powered ScamAgent

Digital Banner AI Headset with Pixelated Face

Artificial intelligence continues to reshape how businesses operate, how customers interact with technology, and unfortunately, how cybercriminals launch attacks. A recent research project called ScamAgent demonstrates how AI systems can autonomously conduct scam calls, marking a concerning shift in the evolution of cybercrime. Researchers developed ScamAgent as an experimental AI agent capable of running fraudulent […]

The Rise of AI Generated Malware: Transparent Tribe’s Vibeware Strategy Signals a New Cyber Threat Landscape

www.coesecurity.com

Cybersecurity researchers are observing a concerning shift in how threat actors develop and deploy malicious tools. A group known as Transparent Tribe, historically associated with targeted cyber espionage campaigns, is now reportedly leveraging a new approach referred to as Vibeware. This strategy involves the use of artificial intelligence to accelerate the development of malware at […]

OpenAI Introduces Codex Security to Detect and Fix Software Vulnerabilities

Close Up of Robotic Hand with Shield

Artificial intelligence is continuing to reshape the way organizations build and secure software. A recent development in this space is the introduction of Codex Security, a new capability designed to help identify, validate, and remediate vulnerabilities directly within the software development lifecycle. As organizations increasingly rely on rapid development cycles and automated pipelines, security teams […]

Indirect Prompt Injection: A New Threat Targeting AI Agents

Futuristic Cybernetic Landscape at Night

As artificial intelligence becomes more deeply integrated into business operations, new types of cyber threats are beginning to emerge. One such risk is indirect prompt injection, a technique that allows attackers to manipulate AI agents by embedding malicious instructions within external content that the AI system processes. Unlike traditional prompt injection attacks where a malicious […]

Europol Disrupts Tycoon 2FA Phishing Platform Behind 64,000 Cyber Attacks

YouTube Banner with Cyber Intrusion Themes

A major international law enforcement operation led by Europol has successfully dismantled infrastructure linked to the Tycoon 2FA phishing as a service platform, a sophisticated cybercrime toolkit responsible for tens of thousands of phishing attacks worldwide. The operation represents a significant step in disrupting organized cybercriminal networks that specialize in bypassing modern authentication defenses. Understanding […]

CISA Flags Active Exploitation of Qualcomm Chipset Memory Corruption Flaw

YouTube Banner CISA Flags Active Exploitationof Qualcomm Chipset Flaw

The cybersecurity landscape continues to evolve as hardware level vulnerabilities become active targets. The Cybersecurity and Infrastructure Security Agency has issued a warning regarding a memory corruption vulnerability affecting Qualcomm chipsets that is reportedly being exploited in real world attacks. This development is significant because Qualcomm processors power a vast ecosystem of smartphones, tablets, embedded […]

Hackerbot-Claw Bot Attacks Microsoft and DataDog via GitHub Actions CI/CD Misconfiguration

YouTube Banner Claw Bot Attacks

A recent security incident involving the Hackerbot Claw bot highlights the growing risks within CI CD environments. The campaign reportedly targeted organizations including Microsoft and DataDog by exploiting misconfigurations in GitHub Actions workflows. This event reinforces a critical lesson for enterprises that rely heavily on automated development pipelines. CI CD platforms are designed to accelerate […]

When File Explorer Becomes an Attack Vector: How Hackers Are Using WebDAV for Stealthy Malware Delivery

YouTube Banner When File ExplorerBecomes an Attack Vector

Cyber attackers continue to evolve their techniques by abusing trusted system features instead of relying only on traditional malware downloads. A newly observed campaign shows threat actors leveraging Windows File Explorer together with WebDAV functionality to silently deliver malicious payloads while bypassing common security controls. This approach highlights a growing trend where legitimate operating system […]

Microsoft Defender Expands URL Click Alerts to Microsoft Teams Strengthening Enterprise Security Visibility

YouTube Banner Microsoft Defender Expands URL Click Alerts

As organizations increasingly rely on collaboration platforms for daily communication, cyber attackers are shifting their focus toward messaging applications as entry points into enterprise environments. Microsoft has now expanded Microsoft Defender capabilities to include URL click alerts within Microsoft Teams, giving security teams deeper visibility into potential threats shared through workplace collaboration channels. This enhancement […]

Google Disrupts Large Scale Hacker Infrastructure Targeting Telecom and Government Networks

Twilight Cityscape Cybersecurity Focus

A recent cybersecurity operation has exposed and disrupted a sophisticated threat infrastructure linked to Chinese state aligned hackers responsible for breaching dozens of telecom and government organizations worldwide. The campaign highlights how advanced persistent threat groups continue to target critical infrastructure using stealth, persistence, and large scale coordination. Security researchers identified malicious infrastructure used to […]