Hackers are increasingly using remote monitoring and management (RMM) software as a first step in cyberattacks, particularly in email campaigns, according to researchers at cybersecurity firm Proofpoint. Criminals have moved away from tools such as loaders and botnet malware which were commonly used to gain initial access into systems and are instead turning to RMM solutions. Threat groups are targeting compromised systems for varied reasons, including data exfiltration, financial theft, and installing malware.
Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly – The Hacker News
Google Uncovers PROMPTFLUX Malware That Uses Gemini AI to Rewrite Its Code Hourly The Hacker News

