The Lazarus Group, a hacking collective linked to the North Korean government, is targeting employees of nuclear power organizations and other critical infrastructures through a sophisticated malware campaign. Using phishing emails and social engineering tactics, the group compromises system security, conducts data theft and espionage, and could potentially launch ransomware attacks. The campaign, named ‘Operation DreamJob’, is currently focused on the US, UK, Canada, and Australia. Meanwhile, Russian cybersecurity firm Kaspersky has warned of phishing scams targeting Telegram users, offering seemingly discounted premiums services.
Criminals Leveraging AI Tools to Rewrite and Obfuscate Malware, Evading Detection
Large language models (LLMs) are being used to generate sophisticated variants of malicious JavaScript, bypassing detection systems, says a Palo Alto Networks report. Despite struggling