Categories

  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
  • Contact
  • Home
  • Contact
  • Our Mission
  • Top Ten Cyber Security Tips
  • Cyber Threat Maps
  • Online Streamers
#1 Source for Cyber Security News, Reports and Threat Intelligence
Categories
  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
  • Cyber Security Videos
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
Home /
Cyber Security /
Microsoft sues 'foreign-based' cyber-crooks, seizes sites used to abuse AI

Microsoft sues 'foreign-based' cyber-crooks, seizes sites used to abuse AI

Jan 13, 2025 08:00 pm Cyber Security 99

Scumbags stole API keys, then started a hacking-as-a-service biz, it is claimed

Microsoft has sued a group of unnamed cybercriminals who developed tools to bypass safety guardrails in its generative AI tools. The tools were used to create harmful content, and access to the tools were sold as a service to other miscreants.…



Support the originator by clicking the read the rest link below.
microsoft foreign based cyber crooks seizes sites abuse
  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Pinterest
  • VK
  • WhatsApp
Read The Rest from the original source
go.theregister.com
AI Won’t Take This Job: Microsoft Says Human Ingenuity Crucial to Red-Teaming
Prev
AI Won’t Take This Job: Microsoft Says Human...
Semler Scientific buys another $23M in Bitcoin
Next
Semler Scientific buys another $23M in Bitcoin

Related News

  • VC behemoth Insight Partners fears top-secret financial info swiped by cyber-miscreants
    VC behemoth Insight Partners fears top-secret...
  • Legacy Login in Microsoft Entra ID Exploited to Breach Cloud Accounts
    Legacy Login in Microsoft Entra ID Exploited to...
  • PowerSchool paid thieves to delete stolen student, teacher data. Crooks may have lied
    PowerSchool paid thieves to delete stolen...
  • U.S. Senate Probes $TRUMP Crypto Over Ethics, Foreign Deals, and Market Manipulation
    U.S. Senate Probes $TRUMP Crypto Over Ethics,...
  • Impact of AI on cyber threat from now to 2027
    Impact of AI on cyber threat from now to 2027
  • Passkeys Set to Protect GOV.UK Accounts Against Cyber-Attacks
    Passkeys Set to Protect GOV.UK Accounts Against...
  • 41 Countries Taking Part in NATO’s Locked Shields 2025 Cyber Defense Exercise
    41 Countries Taking Part in NATO’s Locked...
  • Two Hacks, One Empire: The Cyber Assaults Disney Didn’t See Coming
    Two Hacks, One Empire: The Cyber Assaults...
  • Microsoft on how custom AI offers your business better answers, lower costs, faster innovation
    Microsoft on how custom AI offers your business...
  • 200+ Fake Retail Sites Used in New Wave of Subscription Scams
    200+ Fake Retail Sites Used in New Wave of...
1 Feds disrupt proxy-for-hire botnet, indict four alleged net miscreants
Feds disrupt proxy-for-hire botnet, indict four alleged net miscreants
El Salvador stacks 7 Bitcoin in last week, despite IMF deal
2 El Salvador stacks 7 Bitcoin in last week, despite IMF deal
Bitcoin Advanced NVT Sits Above This Critical Threshold — What It Means For Price Action
3 Bitcoin Advanced NVT Sits Above This Critical Threshold —...
Coinbase considered Saylor-like Bitcoin strategy before opting out: Bloomberg
4 Coinbase considered Saylor-like Bitcoin strategy before...
Ex-UFC champ Conor McGregor touts Irish Bitcoin reserve in presidential bid
5 Ex-UFC champ Conor McGregor touts Irish Bitcoin reserve...

Newsletter

Be in Touch


Current News Sources: 60

Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!

If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.

  • Incident Response Tool List
  • Blue Team Tool List
  • Privacy Policy
All Rights Reserved #1 Source for Cyber Security News, Reports and Threat Intelligence
Powered By The Internet!!!!