Lo nuevo en Article Factory y lo último en el mundo de la IA generativa

AI Face‑Swapping Platform Haotian Fuels Southeast Asian Scam Ecosystem

AI Face‑Swapping Platform Haotian Fuels Southeast Asian Scam Ecosystem
Haotian, a Chinese‑language artificial‑intelligence app that offers near‑perfect face‑swapping for live video calls, has become a key tool for fraudsters in Southeast Asia. The service, promoted mainly through a Telegram channel, enables users to adjust facial features and even clone voices in real time. Researchers found that Haotian’s customers are increasingly scammers who use the technology for "pig‑butchering" schemes, cryptocurrency fraud, and other illegal activities. Payments to the company, largely in USDT, total about $3.9 million and include funds linked to known fraud cases. Haotian’s ties to the now‑sanctioned escrow platform Huione Guarantee further embed it in the region’s gray‑market infrastructure. Leer más →

AI Impersonation Scams Surge as Voice Cloning and Deepfakes Empower Cybercriminals

AI Impersonation Scams Surge as Voice Cloning and Deepfakes Empower Cybercriminals
AI-driven impersonation scams are exploding, using voice cloning and deepfake video to mimic trusted individuals. Criminals target victims through phone calls, video meetings, messages, and emails, often creating urgent requests for money or confidential information. Experts advise slowing down, verifying identities, and adding multi‑factor authentication to protect against these sophisticated attacks. The rise is driven by improved technology, lower costs, and broader accessibility, affecting both consumers and corporations. Leer más →

AI Drives Faster App Development While Amplifying Cyber Threats

AI Drives Faster App Development While Amplifying Cyber Threats
Artificial intelligence is reshaping how developers build applications, delivering speed and automation across the software lifecycle. At the same time, AI tools are empowering threat actors to reverse‑engineer code, generate sophisticated malware, and exploit mobile apps at unprecedented scale. The convergence of rapid app deployment and AI‑enabled attacks is expanding the attack surface, prompting security professionals to embed protections such as runtime application self‑protection (RASP) and continuous testing directly into development pipelines. Leer más →

Stealerium Malware Adds Automated Sextortion via Webcam

Stealerium Malware Adds Automated Sextortion via Webcam
Security researchers at Proofpoint have identified a new variant of the open‑source infostealer known as Stealerium that automatically captures webcam photos and browser screenshots when a victim visits pornographic sites. The malware, distributed freely on GitHub by a developer calling themselves witchfindertr, steals typical data such as passwords and crypto keys while also adding a humiliating sextortion feature. Proofpoint observed the tool being used in phishing campaigns targeting hospitality, education and finance sectors. The discovery highlights a shift toward low‑profile, individual‑targeted extortion by cybercriminals. Leer más →

AI-Powered HexStrike Tool Exploited to Target Citrix Vulnerabilities

AI-Powered HexStrike Tool Exploited to Target Citrix Vulnerabilities
Security researchers have observed that the open‑source red‑team framework HexStrike‑AI, which links large language models such as GPT, Claude and Copilot to over 150 penetration‑testing utilities, is being leveraged by cybercriminals to exploit newly disclosed Citrix NetScaler ADC and Gateway flaws. Check Point Research reported chatter on the dark web detailing how the tool automates unauthenticated remote code execution against CVE‑2025‑7775, CVE‑2025‑7776 and CVE‑2025‑8424, potentially shrinking the window for patching and increasing the speed of attacks. Leer más →

AI Drives Faster App Development While Amplifying Cyber Threats

AI Drives Faster App Development While Amplifying Cyber Threats
Artificial intelligence is reshaping how developers build applications, delivering speed and automation across the software lifecycle. At the same time, AI tools are empowering threat actors to reverse‑engineer code, generate sophisticated malware, and exploit mobile apps at unprecedented scale. The convergence of rapid app deployment and AI‑enabled attacks is expanding the attack surface, prompting security professionals to embed protections such as runtime application self‑protection (RASP) and continuous testing directly into development pipelines. Leer más →

AI Drives Faster App Development While Amplifying Cyber Threats

AI Drives Faster App Development While Amplifying Cyber Threats
Artificial intelligence is reshaping how developers build applications, delivering speed and automation across the software lifecycle. At the same time, AI tools are empowering threat actors to reverse‑engineer code, generate sophisticated malware, and exploit mobile apps at unprecedented scale. The convergence of rapid app deployment and AI‑enabled attacks is expanding the attack surface, prompting security professionals to embed protections such as runtime application self‑protection (RASP) and continuous testing directly into development pipelines. Leer más →

AI Impersonation Scams Surge as Voice Cloning and Deepfakes Empower Cybercriminals

AI Impersonation Scams Surge as Voice Cloning and Deepfakes Empower Cybercriminals
AI-driven impersonation scams are exploding, using voice cloning and deepfake video to mimic trusted individuals. Criminals target victims through phone calls, video meetings, messages, and emails, often creating urgent requests for money or confidential information. Experts advise slowing down, verifying identities, and adding multi‑factor authentication to protect against these sophisticated attacks. The rise is driven by improved technology, lower costs, and broader accessibility, affecting both consumers and corporations. Leer más →

AI Impersonation Scams Surge as Voice Cloning and Deepfakes Empower Cybercriminals

AI Impersonation Scams Surge as Voice Cloning and Deepfakes Empower Cybercriminals
AI-driven impersonation scams are exploding, using voice cloning and deepfake video to mimic trusted individuals. Criminals target victims through phone calls, video meetings, messages, and emails, often creating urgent requests for money or confidential information. Experts advise slowing down, verifying identities, and adding multi‑factor authentication to protect against these sophisticated attacks. The rise is driven by improved technology, lower costs, and broader accessibility, affecting both consumers and corporations. Leer más →

Stealerium Malware Adds Automated Sextortion via Webcam

Stealerium Malware Adds Automated Sextortion via Webcam
Security researchers at Proofpoint have identified a new variant of the open‑source infostealer known as Stealerium that automatically captures webcam photos and browser screenshots when a victim visits pornographic sites. The malware, distributed freely on GitHub by a developer calling themselves witchfindertr, steals typical data such as passwords and crypto keys while also adding a humiliating sextortion feature. Proofpoint observed the tool being used in phishing campaigns targeting hospitality, education and finance sectors. The discovery highlights a shift toward low‑profile, individual‑targeted extortion by cybercriminals. Leer más →

Stealerium Malware Adds Automated Sextortion via Webcam

Stealerium Malware Adds Automated Sextortion via Webcam
Security researchers at Proofpoint have identified a new variant of the open‑source infostealer known as Stealerium that automatically captures webcam photos and browser screenshots when a victim visits pornographic sites. The malware, distributed freely on GitHub by a developer calling themselves witchfindertr, steals typical data such as passwords and crypto keys while also adding a humiliating sextortion feature. Proofpoint observed the tool being used in phishing campaigns targeting hospitality, education and finance sectors. The discovery highlights a shift toward low‑profile, individual‑targeted extortion by cybercriminals. Leer más →

AI-Powered HexStrike Tool Exploited to Target Citrix Vulnerabilities

AI-Powered HexStrike Tool Exploited to Target Citrix Vulnerabilities
Security researchers have observed that the open‑source red‑team framework HexStrike‑AI, which links large language models such as GPT, Claude and Copilot to over 150 penetration‑testing utilities, is being leveraged by cybercriminals to exploit newly disclosed Citrix NetScaler ADC and Gateway flaws. Check Point Research reported chatter on the dark web detailing how the tool automates unauthenticated remote code execution against CVE‑2025‑7775, CVE‑2025‑7776 and CVE‑2025‑8424, potentially shrinking the window for patching and increasing the speed of attacks. Leer más →

AI-Powered HexStrike Tool Exploited to Target Citrix Vulnerabilities

AI-Powered HexStrike Tool Exploited to Target Citrix Vulnerabilities
Security researchers have observed that the open‑source red‑team framework HexStrike‑AI, which links large language models such as GPT, Claude and Copilot to over 150 penetration‑testing utilities, is being leveraged by cybercriminals to exploit newly disclosed Citrix NetScaler ADC and Gateway flaws. Check Point Research reported chatter on the dark web detailing how the tool automates unauthenticated remote code execution against CVE‑2025‑7775, CVE‑2025‑7776 and CVE‑2025‑8424, potentially shrinking the window for patching and increasing the speed of attacks. Leer más →

AI Drives Faster App Development While Amplifying Cyber Threats

AI Drives Faster App Development While Amplifying Cyber Threats
Artificial intelligence is reshaping how developers build applications, delivering speed and automation across the software lifecycle. At the same time, AI tools are empowering threat actors to reverse‑engineer code, generate sophisticated malware, and exploit mobile apps at unprecedented scale. The convergence of rapid app deployment and AI‑enabled attacks is expanding the attack surface, prompting security professionals to embed protections such as runtime application self‑protection (RASP) and continuous testing directly into development pipelines. Leer más →

Stealerium Malware Adds Automated Sextortion via Webcam

Stealerium Malware Adds Automated Sextortion via Webcam
Security researchers at Proofpoint have identified a new variant of the open‑source infostealer known as Stealerium that automatically captures webcam photos and browser screenshots when a victim visits pornographic sites. The malware, distributed freely on GitHub by a developer calling themselves witchfindertr, steals typical data such as passwords and crypto keys while also adding a humiliating sextortion feature. Proofpoint observed the tool being used in phishing campaigns targeting hospitality, education and finance sectors. The discovery highlights a shift toward low‑profile, individual‑targeted extortion by cybercriminals. Leer más →

AI-Powered HexStrike Tool Exploited to Target Citrix Vulnerabilities

AI-Powered HexStrike Tool Exploited to Target Citrix Vulnerabilities
Security researchers have observed that the open‑source red‑team framework HexStrike‑AI, which links large language models such as GPT, Claude and Copilot to over 150 penetration‑testing utilities, is being leveraged by cybercriminals to exploit newly disclosed Citrix NetScaler ADC and Gateway flaws. Check Point Research reported chatter on the dark web detailing how the tool automates unauthenticated remote code execution against CVE‑2025‑7775, CVE‑2025‑7776 and CVE‑2025‑8424, potentially shrinking the window for patching and increasing the speed of attacks. Leer más →

AI-Powered HexStrike Tool Exploited to Target Citrix Vulnerabilities

AI-Powered HexStrike Tool Exploited to Target Citrix Vulnerabilities
Security researchers have observed that the open‑source red‑team framework HexStrike‑AI, which links large language models such as GPT, Claude and Copilot to over 150 penetration‑testing utilities, is being leveraged by cybercriminals to exploit newly disclosed Citrix NetScaler ADC and Gateway flaws. Check Point Research reported chatter on the dark web detailing how the tool automates unauthenticated remote code execution against CVE‑2025‑7775, CVE‑2025‑7776 and CVE‑2025‑8424, potentially shrinking the window for patching and increasing the speed of attacks. Leer más →

Stealerium Malware Adds Automated Sextortion via Webcam

Stealerium Malware Adds Automated Sextortion via Webcam
Security researchers at Proofpoint have identified a new variant of the open‑source infostealer known as Stealerium that automatically captures webcam photos and browser screenshots when a victim visits pornographic sites. The malware, distributed freely on GitHub by a developer calling themselves witchfindertr, steals typical data such as passwords and crypto keys while also adding a humiliating sextortion feature. Proofpoint observed the tool being used in phishing campaigns targeting hospitality, education and finance sectors. The discovery highlights a shift toward low‑profile, individual‑targeted extortion by cybercriminals. Leer más →

AI Drives Faster App Development While Amplifying Cyber Threats

AI Drives Faster App Development While Amplifying Cyber Threats
Artificial intelligence is reshaping how developers build applications, delivering speed and automation across the software lifecycle. At the same time, AI tools are empowering threat actors to reverse‑engineer code, generate sophisticated malware, and exploit mobile apps at unprecedented scale. The convergence of rapid app deployment and AI‑enabled attacks is expanding the attack surface, prompting security professionals to embed protections such as runtime application self‑protection (RASP) and continuous testing directly into development pipelines. Leer más →

AI Impersonation Scams Surge as Voice Cloning and Deepfakes Empower Cybercriminals

AI Impersonation Scams Surge as Voice Cloning and Deepfakes Empower Cybercriminals
AI-driven impersonation scams are exploding, using voice cloning and deepfake video to mimic trusted individuals. Criminals target victims through phone calls, video meetings, messages, and emails, often creating urgent requests for money or confidential information. Experts advise slowing down, verifying identities, and adding multi‑factor authentication to protect against these sophisticated attacks. The rise is driven by improved technology, lower costs, and broader accessibility, affecting both consumers and corporations. Leer más →