Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations

Google: Over 57 Nation-State Threat Groups Using AI for Cyber Operations

Over 57 distinct threat actors with ties to China, Iran, North Korea, and Russia have been observed using artificial intelligence (AI) technology powered by Google to further enable their malicious cyber and information operations. “Threat actors are experimenting with Gemini to enable their operations, finding productivity gains but not yet developing novel capabilities,” Google Threat…

Google Says “Links Matter Less”—We Looked at 1,000,000 SERPs to See if It’s True
|

Google Says “Links Matter Less”—We Looked at 1,000,000 SERPs to See if It’s True

Google has said links are less important than they used to be, and most SEOs have come to accept that as true. Our findings indicate that this is true overall, but for certain types of queries, links matter more. I still believe that links should be a part of your SEO strategy, but they shouldn’t…

Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks

Lazarus Group Uses React-Based Admin Panel to Control Global Cyber Attacks

The North Korean threat actor known as the Lazarus Group has been observed leveraging a “web-based administrative platform” to oversee its command-and-control (C2) infrastructure, giving the adversary the ability to centrally supervise all aspects of their campaigns. “Each C2 server hosted a web-based administrative platform, built with a React application and a Node.js API,” SecurityScorecard’s…

How to Measure Brand Awareness in 2025 (AKA the Year of the Brand)
|

How to Measure Brand Awareness in 2025 (AKA the Year of the Brand)

Brand awareness is one of the “fuzziest” growth channels. And when things get fuzzy, you need concrete ways to prove your time and investment is paying off. Below I’ve laid out 11 workflows you can follow to measure the success of your brand awareness—including some little-known Ahrefs use cases. Tim Soulo on LinkedIn There’s no right…

PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks

PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks

A financially motivated threat actor has been linked to an ongoing phishing email campaign that has been ongoing since at least July 2024 specifically targeting users in Poland and Germany. The attacks have led to the deployment of various payloads, such as Agent Tesla, Snake Keylogger, and a previously undocumented backdoor dubbed TorNet that’s delivered…

GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs

GitHub Desktop Vulnerability Risks Credential Leaks via Malicious Remote URLs

Multiple security vulnerabilities have been disclosed in GitHub Desktop as well as other Git-related projects that, if successfully exploited, could permit an attacker to gain unauthorized access to a user’s Git credentials. “Git implements a protocol called Git Credential Protocol to retrieve credentials from the credential helper,” GMO Flatt Security researcher Ry0taK, who discovered the…

Bidding on Branded Terms Increases Clicks by 18.3%
|

Bidding on Branded Terms Increases Clicks by 18.3%

Get the week’s best marketing content We ran this study to find out if running paid ads cannibalize organic traffic or not. Most SEOs are against bidding on branded terms because it is believed that buying paid ads cannibalizes organic traffic and it can also impact attribution for conversions and revenue. Paid advertisers believe there is…

Meta's Llama Framework Flaw Exposes AI Systems to Remote Code Execution Risks

Meta’s Llama Framework Flaw Exposes AI Systems to Remote Code Execution Risks

A high-severity security flaw has been disclosed in Meta’s Llama large language model (LLM) framework that, if successfully exploited, could allow an attacker to execute arbitrary code on the llama-stack inference server. The vulnerability, tracked as CVE-2024-50050, has been assigned a CVSS score of 6.3 out of 10.0. Supply chain security firm Snyk, on the…

RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations

RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations

A group of academics has disclosed details of over 100 security vulnerabilities impacting LTE and 5G implementations that could be exploited by an attacker to disrupt access to service and even gain a foothold into the cellular core network. The 119 vulnerabilities, assigned 97 unique CVE identifiers, span seven LTE implementations – Open5GS, Magma, OpenAirInterface,…

DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations

DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations

The U.S. Department of Justice (DoJ) on Thursday indicted two North Korean nationals, a Mexican national, and two of its own citizens for their alleged involvement in the ongoing fraudulent information technology (IT) worker scheme that seeks to generate revenue for the Democratic People’s Republic of Korea (DPRK) in violation of international sanctions. The action…