У нас вы можете посмотреть бесплатно Release 1.3: AI-Driven Workflows, Marketplace Integrations, Mobile Spyware или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
This week’s headlines reinforce a few consistent patterns. Attackers are manipulating AI-driven workflows to trigger actions across SaaS platforms. Trusted marketplace integrations are becoming long-term attack paths. Advanced mobile spyware is becoming more accessible. And AI-assisted reconnaissance is shrinking the window between exposure and exploitation. None of this represents a brand-new exploit class. What’s changing is where risk concentrates: in automation, third-party integrations, mobile endpoints, and response speed. Chapters: 00:00 - Introduction 00:26 - Exploiting Google Calendar Invites 01:38 - Malicious Outlook Add-In Attack 3:29 - Emergence of Mobile Spyware Kits 7:58 - AI-Driven Deep Fake Scams 10:29 - Cyberattack on Poland's Energy Grid 12:53 - Nation-State Hackers Utilizing AI Tools Key Takeaways: Promptware Leveraging Google Calendar Invites, Cyber Security News Calendar invites aren’t new, but integrating AI assistants into systems that can take action introduces risk. Prompt injection exposure depends on the quality of the model and the surrounding software, and weaknesses in one implementation likely indicate weaknesses elsewhere. https://cybersecuritynews.com/promptw... First Malicious Outlook Add-In Stealing Credentials, The Hacker News Domain takeovers can occur in places people don’t typically look, including multi-tenant Microsoft applications. In this case, the abandoned domain was tied to an Outlook add-in that applied across tenants and had permissions to read and write mail. The combination of multi-tenant exposure and privileged permissions increases impact. Third-party applications and add-ins require active review as part of risk management. https://thehackernews.com/2026/02/fir... ZeroDayRAT Mobile Spyware Kit, SecurityWeek Mobile exploitation typically requires user interaction, such as installing an application, but this toolkit appears to leverage a browser-based vulnerability where simply visiting a webpage can establish access. The tooling is packaged as an all-in-one system with a dashboard for operators, enabling payload customization and deployment through phishing or coercion. It can escalate privileges, access sensors, GPS, camera, microphone, and other device data. More broadly, capabilities traditionally associated with nation-state actors are being packaged and commoditized for broader use, lowering the barrier to entry. https://www.securityweek.com/new-zero... AI-Assisted Deepfake CEO + Zoom Scam, PC Gamer Deepfake technology is being used not just for fraud, but to gain initial access into environments. The attack chain is consistent: fake calendar invite, Zoom call with real-time video or voice impersonation, and instructions delivered under the authority of executive leadership. In this case, the impersonation was used in a “ClickFix” scenario to persuade the victim to run commands, establish a foothold, and then pivot within the environment. The targeting focus remains cryptocurrency and finance-related organizations. https://www.pcgamer.com/software/ai/a... Poland Energy Grid Cyberattack & CISA Warning, Cyber Scoop The core issue is segmentation between corporate IT environments and operational technology environments. In this case, an exposed edge device connected to the internet lacked proper segmentation from the internal network, enabling lateral movement. As IT and OT systems converge, including cloud-managed device updates delivered over the air, historical separation weakens, increasing pivot risk. https://cyberscoop.com/cisa-warning-r... Nation-State Hackers Using Gemini, The Record LLMs are being used by threat actors to automate reconnaissance, exploitation, and post-exploitation activities, including gaining situational awareness and pivoting laterally. Prior incidents have shown LLMs conducting these tasks across multiple organizations. Commercial frontier models provide some monitoring through API usage, but open-source and locally run models remove that oversight. The result is increased automation and operational efficiency for attackers. https://therecord.media/nation-state-...