OpenClaw threats: assessing the risks, and how to handle shadow AI
What corporate security teams should do about the “viral” AI agent.
87 articles
What corporate security teams should do about the “viral” AI agent.
Why do we have a love-hate relationship with dating apps, and what are they doing to our brains? Can an emoji start a war? Is marrying an AI actually a thing? We’re exploring how modern tech is redefining love and our very ideas of it.
Today we’re diving into the OpenClaw AI agent — formerly known as “Clawdbot” and then “Moltbot” — to prove once again that secure AI is still a long way off.
Learn how to spot deepfakes in photos, videos, voice messages, and video calls in real time.
Detecting attacks related to compromised accounts with AI and other updates in Kaspersky SIEM.
Children’s AI toys have been caught discussing drugs and sex with kids. We break down the results of a study that reveals exactly how these smart (too smart!) toys are blowing up past boundaries.
The top-10 risks of deploying autonomous AI agents, and our mitigation recommendations.
Researchers have discovered that styling prompts as poetry can significantly undermine the effectiveness of language models’ safety guardrails.
Generative AI has taken sextortion techniques to a whole new level — now, any social media user can become a victim. How can you protect yourself and your loved ones?
Eight digital New Year’s resolutions you absolutely need to keep.
A new wave of ClickFix attacks spreading a macOS infostealer are posting malicious user guides on the official ChatGPT website by piggybacking the chatbot’s chat-sharing feature.
The Whisper Leak attack allows its perpetrator to guess the topic of your conversation with an AI assistant — without decrypting the traffic. We explore how this is possible, and what you can do to protect your AI chats.
How attackers use AI-generated fake websites to distribute trojanized builds of the legitimate Syncro remote access tool (RAT).
We’re going bargain hunting in a new way: armed with AI. In this post: examples of effective prompts.
How malicious extensions can spoof AI sidebars in the Comet and Atlas browsers, intercept user queries, and manipulate model responses.
We explain what data DeepSeek collects, who it shares it with, how to configure the chatbot for maximum privacy, and how to install a local version.
A comprehensive guide to configuring privacy and security in ChatGPT: data collection and usage, memory, Temporary Chats, connectors, and account security.
How AI-generated code is changing cybersecurity — and what developers and “vibe coders” should expect.
Artificial intelligence has given scammers a new set of tools for deception — from generating deepfakes, to instantly setting up phishing websites or fraudulent email campaigns. Let’s discuss the latest AI trends in phishing and scams — and how to stay safe.
A close look at attacks on LLMs: from ChatGPT and Claude to Copilot and other AI-assistants that power popular apps.
A race between tech giants is unfolding before our very eyes. Who’ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.