Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Attackers are integrating LLMs directly into malware #cybersecurity #ai #malware #infosec #podcast

Threat actors have moved beyond using AI to speed up operations. They're now embedding large language models directly into malware. In this Intel Chat, Matt Bromiley and Chris Luft discuss Google's Threat Intelligence Group findings on malware families like PromptFlux and PromptSteal. These threats query LLMs mid-execution to dynamically alter behavior, obfuscate code, and generate system commands on demand.

Defeating BLOCKADE SPIDER: How CrowdStrike Stops Cross-Domain Attacks

Cross-domain attacks exemplify adversaries’ drive for speed and stealth. In these attacks, threat actors navigate multiple domains such as endpoint, cloud, and identity systems to maximize their reach and impact. Their goal is to exploit the weaknesses in organizations’ fast-growing and complex environments.

Agentic AI and Identity Sprawl: The Convergence Redefining Cyber Risk

Welcome to Data Security Decoded. In this episode, Caleb Tolin welcomes back Joe Hladik, Head of Rubrik Zero Labs, for a focused look at how identity-driven threats are redefining modern security. Drawing insights from Rubrik Zero Labs’ latest report, Identity Crisis: Understanding and Building Resilience Against Identity-Driven Threats, Joe explains why identity has become the new perimeter in an era where hybrid and multi-cloud environments dominate.

What is Ransomware-as-a-Service? How It Happens and How to Defend Against It?

Cyberattacks are becoming more advanced and threatening with every passing day. Even if you have a reliable security system in place, the risk of cyberattacks remains. Of all the cyberattacks, Ransomware is perhaps the most dangerous because it causes both data and financial loss. It started as simple encryption malware, but over the years, it has turned into a full-scale business model known as Ransomware as a Service (RaaS).

Endpoint Protection Blindspot: The Rise of Ransomware in the VM Layer

Learn about the shift from physical to virtual data centers in the 2000s and the rise of ransomware attacks that take advantage of security blind spots (e.g. lack of endpoint protection) to target hypervisors and breach your data. Learn why you need to shift from prevention only to cyber resilience for stronger defenses against modern adversaries (Scattered Spider, UNC5112, and others). Rubrik can help.

Intel Chat: LLM in malware, LandFall, Windows kernel zero-day & Ex-L3Harris exec sells secrets [268]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

E-Commerce Security: A Complete Guide to Protecting Your Online Store

When you shop online, you trust the website with your most personal information-your name, address, and credit card details. And if you expect safety as a customer, imagine how much responsibility an online store owner carries. That's why e-commerce security isn't just another technical task-it's the foundation of keeping your customers safe and your business trustworthy.

New Android Malware Platform Targets Bank Accounts

Researchers at Zimperium are tracking a new malware-as-a-service platform designed to target Android phones with banking Trojans. The platform, dubbed “Fantasy Hub,” allows unskilled threat actors to launch sophisticated malware campaigns that trick victims into granting access to their bank accounts.