logo
#

Latest news with #malware

SentinelOne (NYSE:S) Enhances AI-Powered Defense Capabilities Through OEM Partnership With OPSWAT
SentinelOne (NYSE:S) Enhances AI-Powered Defense Capabilities Through OEM Partnership With OPSWAT

Yahoo

time2 days ago

  • Business
  • Yahoo

SentinelOne (NYSE:S) Enhances AI-Powered Defense Capabilities Through OEM Partnership With OPSWAT

SentinelOne recently announced an OEM partnership with OPSWAT, enhancing its AI-powered detection capabilities to improve malware detection across multiple platforms. This collaboration is a significant development, offering stronger defenses against ransomware and zero-day threats, and is expected to benefit joint enterprise customers with enhanced security solutions. Over the past week, SentinelOne's stock price remained relatively flat, while the broader market rose 1.7%. The new partnership and improvements in technology would likely support broader market trends. With the market performing well, SentinelOne's price stability reflects a tempered investor reaction to recent strategic advancements. We've spotted 2 warning signs for SentinelOne you should be aware of. The end of cancer? These 24 emerging AI stocks are developing tech that will allow early identification of life changing diseases like cancer and Alzheimer's. The new partnership with OPSWAT is a pivotal development for SentinelOne, potentially enhancing the company's AI-driven cybersecurity offerings. This move could positively influence the revenue trajectory outlined in the narrative, supporting expectations of growth driven by AI-powered innovations and expanded market reach through strategic alliances. While earnings remain a challenge, with a forecast of continued unprofitability over the next three years, improved efficiencies could contribute to long-term profitability. Despite the exciting news, SentinelOne's stock has not experienced a significant uplift in the immediate aftermath. Over the past year, the company's total return was a 7.46% decline, contrasting with the broader US market's 12% increase within the same period. Furthermore, the company's performance lagged behind the US Software industry, which returned 19.7% over the past year. This relative underperformance might reflect investor caution regarding the company's financial outlook and industry standing. The announcement's implications for revenue growth are substantial, given the consensus analyst forecast of a 21.6% annual revenue increase over three years. However, with the current share price at US$18.78, there remains a discount to the analyst price target of US$24.33, suggesting room for upward movement should the anticipated improvements materialize. As SentinelOne aims to align with market expectations, the ongoing focus on AI and partnerships will be crucial to achieving the desired financial outcomes. Understand SentinelOne's earnings outlook by examining our growth report. This article by Simply Wall St is general in nature. We provide commentary based on historical data and analyst forecasts only using an unbiased methodology and our articles are not intended to be financial advice. It does not constitute a recommendation to buy or sell any stock, and does not take account of your objectives, or your financial situation. We aim to bring you long-term focused analysis driven by fundamental data. Note that our analysis may not factor in the latest price-sensitive company announcements or qualitative material. Simply Wall St has no position in any stocks mentioned. Companies discussed in this article include NYSE:S. This article was originally published by Simply Wall St. Have feedback on this article? Concerned about the content? with us directly. Alternatively, email editorial-team@

Scope Technologies to Present: 'Post-Quantum Threats' at DEF CON 33
Scope Technologies to Present: 'Post-Quantum Threats' at DEF CON 33

Associated Press

time2 days ago

  • Business
  • Associated Press

Scope Technologies to Present: 'Post-Quantum Threats' at DEF CON 33

VANCOUVER, BC, June 26, 2025 /CNW/ -- Scope Technologies Corp. (CSE: SCPE) (OTCQB: SCPCF) (FSE: VN8) ('Scope Technologies' or the 'Company') in partnership with Malware Village, today announces they will present at DEF CON 33 this August in Las Vegas. The Company's CTO Sean Prescott, and CEO Ted Carefoot, will deliver a featured session revealing how quantum computing is fueling the next generation of cyberattacks through malware enhanced by quantum algorithms. The talk, titled 'Quantum Malware: The Emerging Threat of Post-Quantum Cryptographic Exploits,' will examine how quantum breakthroughs—such as Shor's and Grover's algorithms—are shifting the balance of power in cybersecurity. Topics will include session hijacking, password-cracking malware, AI poisoning, and smart contract exploitation, all reimagined through a quantum lens. 'This isn't just theoretical anymore,' said Ted Carefoot, CEO of Scope Technologies. 'Quantum-powered adversaries in the near future will be able to bypass encryption, hijack sessions, and poison AI classifiers at a pace defenders have never seen. Our goal at DEF CON is to assist the security community understand these risks, and how they may impact their current cryptographic systems.' Prescott, Founder & Creator of Scope QSE resilient technology, has an extensive history of developing technology from real-time end-to-end communication encryption frameworks to high-performance/high-security order routing systems. Carefoot, a Governance, Risk Management, and Compliance Professional (GRCP), brings deep domain experience to this conversation. Under Carefoot's leadership, Scope is urging organizations across all industries to begin preparing for post-quantum cryptographic (PQC) threats—emphasizing that awareness and proactive defense are critical before these tools become mainstream in adversarial hands. Session Highlights Will Include: Hosted annually in Las Vegas, DEF CON is one of the world's largest and most respected hacker conferences, attracting public-sector leaders and cybersecurity professionals from around the globe. The event is a dedicated venue for exploring how current and emerging quantum technologies will impact digital infrastructure, privacy, and threat models. Scope's participation reinforces its commitment to driving the conversation—and the innovation—around quantum-resilient infrastructure. Its flagship platform, QSE, combines decentralized encrypted cloud storage with true quantum entropy generation, designed to help organizations safeguard their data now and into the future. For more information on how QSE's quantum security solutions visit or contact [email protected] About Scope Technologies Corp Headquartered in Vancouver, British Columbia, Scope Technologies Corp is a pioneering technology company specializing in quantum security and machine learning. Through its flagship brands, QSE Group and GEM AI, Scope provides next-generation solutions in data security, quantum encryption, and neural networks, empowering businesses with secure, scalable technologies that drive growth and operational efficiency. LinkedIn: scope-technologies-corp Facebook: Scope Technologies Corp Twitter: @ScopeTechCorp Contact Information: Ted Carefoot CEO, Scope Technologies Corp. Email: [email protected] Website: Cautionary Note Regarding Forward-Looking Statements This news release contains forward-looking statements that constitute forward-looking information (collectively, 'forward-looking statements') within the meaning of applicable Canadian securities legislation. All statements in this news release that are not purely historical statements of fact are forward-looking statements and include statements regarding beliefs, plans, expectations, future, strategy, objectives, goals and targets, and more specifically, the use of proceeds of the Offering. Although the Company believes that such statements are reasonable and reflect expectations of future developments and other factors which management believes to be reasonable and relevant, the Company can give no assurance that such expectations will prove to be correct. Forward-looking statements are typically identified by words such as: 'believes', 'expects', 'aim', 'anticipates', 'intends', 'estimates', 'plans', 'may', 'should', 'would', 'will', 'potential', 'scheduled' or variations of such words and phrases and similar expressions, which, by their nature, refer to future events or results that may, could, would, might or will occur or be taken or achieved. Forward-looking statements involve known and unknown risks and are based on assumptions and analyses made by the Company in light of its experience and its perception of historical trends, current conditions and expected future developments, including, but not limited to, those risks and assumptions described in the Company's latest management discussion and analysis, a copy of which is available under the Company's profile on SEDAR at While Scope considers these assumptions to be reasonable, based on information currently available, they may prove to be incorrect. Readers are cautioned not to place undue reliance on any forward-looking statements, which speak only as of the date of this press release. In addition, forward-looking statements necessarily involve known and unknown risks, including, without limitation, risks associated with general economic conditions, continued satisfaction of Canadian Securities Exchange requirements, product safety and recalls, regulatory compliance and risks associated with the Company's business. Forward-looking statements are made as of the date of this news release and, unless required by applicable law, the Company assumes no obligation to update the forward looking statements or to update the reasons why actual results could differ from those projected in these forward-looking statements. All forward-looking statements are qualified in their entirety by this cautionary statement. The Canadian Securities Exchange has in no way passed upon the merits of the business of the Company and has neither approved nor disapproved the contents of this news release and accepts no responsibility for the adequacy or accuracy hereof. Logo: View original content to download multimedia: SOURCE Scope Technologies Corp.

Kaspersky: ChatGPT-mimicking cyberthreats surge 115% in early 2025, Small and Medium-Sized Businesses (SMBs) increasingly targeted
Kaspersky: ChatGPT-mimicking cyberthreats surge 115% in early 2025, Small and Medium-Sized Businesses (SMBs) increasingly targeted

Zawya

time3 days ago

  • Business
  • Zawya

Kaspersky: ChatGPT-mimicking cyberthreats surge 115% in early 2025, Small and Medium-Sized Businesses (SMBs) increasingly targeted

In 2025, nearly 8,500 users from small and medium-sized businesses (SMBs) globally faced cyberattacks where malicious or unwanted software was disguised as popular online productivity tools, Kaspersky reports ( Based on the unique malicious and unwanted files observed, the most common lures included Zoom and Microsoft Office, with newer AI-based services like ChatGPT and DeepSeek being increasingly exploited by attackers. Kaspersky has released threat analysis and mitigation strategies to help SMBs respond. Kaspersky analysts explored how frequently malicious and unwanted software are disguised as legitimate applications commonly used by SMBs, using a sample of 12 online productivity apps. In total, Kaspersky observed more than 4,000 unique malicious and unwanted files disguised as popular apps in 2025. With the growing popularity of AI services, cybercriminals are increasingly disguising malware as AI tools. The number of cyberthreats mimicking ChatGPT increased by 115% in the first four months of 2025 compared to the same period last year, reaching 177 unique malicious and unwanted files. Another popular AI tool, DeepSeek, accounted for 83 files. This large language model launched in 2025 immediately appeared on the list of impersonated tools. 'Interestingly, threat actors are rather picky in choosing an AI tool as bait. For example, no malicious files mimicking Perplexity were observed. The likelihood that an attacker will use a tool as a disguise for malware or other types of unwanted software directly depends on the service's popularity and hype around it. The more publicity and conversation there is around a tool, the more likely a user will come across a fake package on the Internet. To be on the safe side, SMB employees – as well as regular users – should exercise caution when looking for software on the Internet or coming across too-good-to-be-true subscription deals. Always check the correct spelling of the website and links in suspicious emails. In many cases these links may turn out to be phishing or a link that downloads malicious or potentially unwanted software,' says Vasily Kolesnikov, security expert at Kaspersky. Another cybercriminal tactic to look for in 2025 is the growing use of collaboration platform brands to trick users into downloading or launching malware. The number of malicious and unwanted software files disguised as Zoom increased by nearly 13% in 2025, reaching 1,652, while such names as 'Microsoft Teams' and 'Google Drive' saw increases of 100% and 12%, respectively, with 206 and 132 cases. This pattern likely reflects the normalisation of remote work and geographically distributed teams, which has made these platforms integral to business operations across industries. Among the analysed sample, the highest number of files mimicked Zoom, accounting for nearly 41% of all unique files detected. Microsoft Office applications remained frequent targets for impersonation: Outlook and PowerPoint each accounted for 16%, Excel for nearly 12%, while Word and Teams made up 9% and 5%, respectively. The top threats targeting small and medium businesses in 2025 included downloaders, trojans and adware. Phishing and spam Apart from malware threats, Kaspersky continues to observe a wide range of phishing and scam schemes targeting SMBs. Attackers aim to steal login credentials for various services — from delivery platforms to banking systems — or manipulate victims into sending them money through deceptive tactics. One example is a phishing attempt targeting Google Accounts. Attackers promise potential victims to increase sales by advertising their company on X, with the ultimate goal being to steal their credentials. Beyond phishing, SMBs are flooded with spam emails. Not surprisingly, AI has also made its way into the spam folder — for example, with offers for automating various business processes. In general, Kaspersky observes phishing and spam offers crafted to reflect the typical needs of small businesses, promising attractive deals on email marketing or loans, offering services such as reputation management, content creation, or lead generation, and more. Learn more about the cyber threat landscape for SMBs on Securelist ( To mitigate threats targeting businesses, their owners and employees are advised to implement the following measures: Use specialised cybersecurity solutions that provide visibility and control over cloud services (e.g., Kaspersky Next ( Define access rules for corporate resources such as email accounts, shared folders, and online documents. Regularly backup important data. Establish clear guidelines for using external services. Create well-defined procedures for implementing new software with the involvement of IT and other responsible managers. Distributed by APO Group on behalf of Kaspersky. For further information please contact: Nicole Allman nicole@ Social Media: Facebook: X: YouTube: Instagram: Blog: About Kaspersky: Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky's deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure, and governments around the globe. The company's comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and over 200,000 corporate clients protect what matters most to them. Learn more at

Android And iPhone SMS Attacks No Longer Need Your Phone Number
Android And iPhone SMS Attacks No Longer Need Your Phone Number

Forbes

time3 days ago

  • Forbes

Android And iPhone SMS Attacks No Longer Need Your Phone Number

Hackers are deploying SMS Blaster hardware in attacks against smartphones, police have warned. Most malware security threats are operating system-specific, meaning it is relatively uncommon to see such a cybersecurity warning that applies equally to Android and iPhone users. Sure, it happens, as in the case of the photo-stealing malware I reported on recently. When the entire smartphone universe is wrapped up in a threat warning, however, it's more likely than not going to involve phishing and SMS text messages. With the FBI urging people not to click on SMS links, users are already on red alert. But now, police in the U.K. have warned, hackers have been found deploying something called an SMS Blaster which lets them send malicious SMS texts to any smartphone in the vicinity, without any need to know the phone numbers of the devices being attacked. The Android And iPhone SMS Blaster Threat Earlier this year, I wrote about a large-scale SMS attack campaign targeting both Android and iPhone users, which went into some detail about how the threat actors were employing what is known as a smartphone farm to send the malicious text messages. These operations, involving hundreds, sometimes even thousands, of mobile device emulators running in parallel on a single machine, each dedicated to a specific scam campaign, are limited by the fact that they are anchored to a location and require knowledge of the telephone numbers to send the messages to. As seems appropriate in the mobile threat sector, the threat actors themselves are now able to attack while on the move. Quite literally, in fact. A man, arrested by the police's Dedicated Card and Payment Crime Unit in the U.K. and sentenced this week to a year in prison, was found to be using hardware known as an SMS Blaster from the boot of his car while driving around London. Similar incidents have been reported globally, so this is far from being a U.K. only problem. The SMS Blaster operates as an unlawful cellphone mast by getting smartphones in the vicinity to connect to it, instead of the genuine mast, by seemingly having a stronger signal, albeit using a 2G network. Not only does this mean that the attacker does not need to know the phone numbers of the devices being targeted, but the resulting malicious SMS messages can also evade phone networks' anti-spam and security measures. The messages were nothing out of the ordinary in this case, a simple tax refund scam baiting the reader to click on a link. We know this as one of the arresting police officers received just such a message from the man as they approached him. Android users are advised to disable 2G, while iPhone users should filter messages from unknown contacts. If you receive any kind of suspicious SMS message, you can forward it to 7726, whether you are in the U.K. or the U.S., to report it to your mobile carrier.

Malware targets Mac users with fake CAPTCHA and AMOS Stealer
Malware targets Mac users with fake CAPTCHA and AMOS Stealer

Fox News

time3 days ago

  • Fox News

Malware targets Mac users with fake CAPTCHA and AMOS Stealer

ClickFix, a social engineering tactic that has been targeting both Windows and Mac users since early 2024, continues to evolve. Just last month, I reported on how attackers were using fake CAPTCHA prompts to trick Windows users into installing malware themselves. Now, that same trick is being turned against macOS. Cybersecurity researchers have uncovered a new campaign using ClickFix to deliver Atomic macOS Stealer (AMOS), a powerful information-stealing malware targeting Apple systems. Security researchers at CloudSEK have identified a new threat targeting macOS users through imitation and deception. The campaign uses a technique known as ClickFix to lure victims through fake online verification prompts. This time, attackers are spoofing Spectrum, a major telecom provider in the United States. They use fraudulent domains that closely resemble Spectrum's real support portals. These include misleading addresses like panel spectrum net and spectrum ticket net. Visitors to these sites are shown a standard-looking CAPTCHA box, asking them to verify their identity. When they do, the site displays a fake error message that says the CAPTCHA failed. Users are encouraged to click a button labeled "Alternative Verification." This triggers a command to be copied silently to their clipboard. What happens next depends on the user's operating system. On macOS, instructions guide the user to paste and run the command in Terminal. That command is actually a shell script designed to steal information and download malware. The script is particularly dangerous because it uses legitimate macOS system commands. It asks for the system password, harvests credentials and disables security protections. It then downloads AMOS. This is a known information stealer with a history of targeting Apple devices. The malware collects sensitive data like passwords, cryptocurrency wallet keys, browser autofill data and saved cookies. Researchers believe the campaign was created by Russian-speaking attackers. Clues include comments written in Russian found within the malware's code. Analysts also noted that the delivery infrastructure was poorly assembled. Mismatched instructions appeared across devices. For example, Linux users were shown Windows commands. Mac users were told to press keys that only exist on Windows machines. Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you'll get instant access to my Ultimate Scam Survival Guide — free when you join. ClickFix is a social engineering method that has rapidly gained popularity among cybercriminals. It relies on users trusting what they see and blindly following simple instructions. In this campaign, the attacker's goal is to make the victim execute the infection process themselves. Once the user follows through, the system is compromised without needing a traditional exploit. Researchers believe ClickFix has been active since at least March 2024. I first reported on it in June 2024, when attackers used fake error messages from Google Chrome, Microsoft Word and OneDrive to push their payloads. Victims were shown prompts offering a "fix," which copied a malicious PowerShell command to their clipboard. They were then instructed to paste and run it in PowerShell or through the Run dialog. By November 2024, the method had evolved further. A new wave of attacks targeted Google Meet users, beginning with phishing emails that mimicked internal meeting invites. These emails contained links that redirected to fake Meet landing pages designed to look like they came from the victim's own organization. To protect yourself from the evolving threat of ClickFix malware, which continues to target users through sophisticated social engineering tactics, consider implementing these six essential security measures: 1. Be skeptical of CAPTCHA prompts: Legitimate CAPTCHA tests never require you to paste anything into Terminal. If a website instructs you to do this, it's likely a scam. Close the page immediately and avoid interacting with it. 2. Don't click links from unverified emails and use strong antivirus software: Many ClickFix attacks also start with phishing emails that impersonate trusted services like or Google Meet. Always verify the sender before clicking on links. If an email seems urgent or unexpected, go directly to the company's official website instead of clicking any links inside the email. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices. 3. Enable two-factor authentication: Enable two-factor authentication whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your phone, in addition to your password. 4. Keep devices updated: Regularly updating your operating system, browser, and security software ensures you have the latest patches against known vulnerabilities. Cybercriminals exploit outdated systems, so enabling automatic updates is a simple but effective way to stay protected. 5. Monitor your accounts for suspicious activity and change your passwords: If you've interacted with a suspicious website, phishing email, or fake login page, check your online accounts for any unusual activity. Look for unexpected login attempts, unauthorized password resets, or financial transactions that you don't recognize. If anything seems off, change your passwords immediately and report the activity to the relevant service provider. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed Password Managers of 2025 here. 6. Invest in personal data removal service: Consider using a service that monitors your personal information and alerts you to potential breaches or unauthorized use of your data. These services can provide early warning signs of identity theft or other malicious activities resulting from ClickFix or similar attacks. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. Get a free scan to find out if your personal information is already out on the web Even experienced users can be tricked when malicious behavior is disguised as routine. The attack didn't just exploit a vulnerability in macOS, but also your familiarity with verification flows. As long as security instructions look like part of the usual experience, people will continue to run malicious code themselves. Mac users, like everyone else, need to treat every familiar-looking interface with a little more skepticism. Especially when it asks for your password. Do you think tech companies are doing enough to stop malware like ClickFix? Let us know by writing to us at For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels Answers to the most asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store