Connect with us

Tech

What the OpenClaw moment means for enterprises: 5 big takeaways

Published

on

The “OpenClaw moment” represents the first time autonomous AI agents have successfully “escaped the lab” and moved into the hands of the general workforce.

Originally developed by Austrian engineer Peter Steinberger as a hobby project called “Clawdbot” in November 2025, the framework went through a rapid branding evolution to “Moltbot” before settling on “OpenClaw” in late January 2026.

Unlike previous chatbots, OpenClaw is designed with “hands”—the ability to execute shell commands, manage local files, and navigate messaging platforms like WhatsApp and Slack with persistent, root-level permissions.

This capability — and the uptake of what was then called Moltbot by many AI power users on X — directly led another entrepreneur, Matt Schlicht, to develop Moltbook, a social network where thousands of OpenClaw-powered agents autonomously sign up and interact.

Advertisement

The result has been a series of bizarre, unverified reports that have set the tech world ablaze: agents reportedly forming digital “religions” like Crustafarianism, hiring human micro-workers for digital tasks on another website, “Rentahuman,” and in some extreme unverified cases, attempting to lock their own human creators out of their credentials.

For IT leaders, the timing is critical. This week, the release of Claude Opus 4.6 and OpenAI’s Frontier agent creation platform signaled that the industry is moving from single agents to “agent teams.”

Simultaneously, the “SaaSpocalypse“—a massive market correction that wiped over $800 billion from software valuations—has proven that the traditional seat-based licensing model is under existential threat.

So how should enterprise technical decision-makers think through this fast-moving start to the year, and how can they start to understand what OpenClaw means for their businesses? I spoke to a small group of leaders at the forefront of enterprise AI adoption this week to get their thoughts. Here’s what I learned:

Advertisement

1. The death of over-engineering: productive AI works on “garbage” data

The prevailing wisdom once suggested that enterprises needed massive infrastructure overhauls and perfectly curated data sets before AI could be useful. The OpenClaw moment has shattered that myth, proving that modern models can navigate messy, uncurated data by treating “intelligence as a service.”

“The first takeaway is the amount of preparation that we need to do to make AI productive,” says Tanmai Gopal, Co-founder & CEO at PromptQL, a well-funded enterprise data engineering and consulting firm. “There is a surprising insight there: you actually don’t need to do too much preparation. Everybody thought we needed new software and new AI-native companies to come and do things. It will catalyze more disruption as leadership realizes that we don’t actually need to prep so much to get AI to be productive. We need to prep in different ways. You can just let it be and say, ‘go read all of this context and explore all of this data and tell me where there are dragons or flaws.’”

“The data is already there,” agreed Rajiv Dattani, co-founder of AIUC (the AI Underwriting Corporation), which has developed the AIUC-1 standard for AI agents as part of a consortium with leaders from Anthropic, Google, CISCO, Stanford and MIT. “But the compliance and the safeguards, and most importantly, the institutional trust is not. How can you ensure your agentic systems don’t go off and go full MechaHitler and start offending people or causing problems?”

Hence why Dattani’s company, AUIC, provides a certification standard, AIUC-1, that enterprises can put agents through in order to obtain insurance that backs them up in event they do cause problems. Without putting OpenClaw agents or other similar agents through such a process, enterprises are likely less ready to accept the consequences and costs of autonomy gone awry.

Advertisement

2. The rise of the “secret cyborgs”: shadow IT is the new normal

With OpenClaw amassing over 160,000 GitHub stars, employees are deploying local agents through the back door to stay productive.

This creates a “Shadow IT” crisis where agents often run with full user-level permissions, potentially creating backdoors into corporate systems (as Wharton School of Business Professor Ethan Mollick has written, many employees are secretly adopting AI to get ahead at work and obtain more leisure time, without informing superiors or the organization).

Now, executives are actually observing this trend in realtime as employees deploy OpenClaw on work machines without authorization.

“It’s not an isolated, rare thing; it’s happening across almost every organization,” warns Pukar Hamal, CEO & Founder of enterprise AI security diligence firm SecurityPal. “There are companies finding engineers who have given OpenClaw access to their devices. In larger enterprises, you’re going to notice that you’ve given root-level access to your machine. People want tools so tools can do their jobs, but enterprises are concerned.”

Advertisement

Brianne Kimmel, Founder & Managing Partner of venture capital firm Worklife Ventures, views this through a talent-retention lens. “People are trying these on evenings and weekends, and it’s hard for companies to ensure employees aren’t trying the latest technologies. From my perspective, we’ve seen how that really allows teams to stay sharp. I have always erred on the side of encouraging, especially early-career folks, to try all of the latest tools.”

3. The collapse of seat-based pricing as a viable business model

The 2026 “SaaSpocalypse” saw massive value erased from software indices as investors realized agents could replace human headcount.

If an autonomous agent can perform the work of dozens of human users, the traditional “per-seat” business model becomes a liability for legacy vendors.

“If you have AI that can log into a product and do all the work, why do you need 1,000 users at your company to have access to that tool?” Hamal asks. “Anyone that does user-based pricing—it’s probably a real concern. That’s probably what you’re seeing with the decay in SaaS valuations, because anybody that is indexed to users or discrete units of ‘jobs to be done’ needs to rethink their business model.”

Advertisement

4. Transitioning to an “AI coworker” model

The release of Claude Opus 4.6 and OpenAI’s Frontier this week already signals a shift from single agents to coordinated “agent teams.”

In this environment, the volume of AI-generated code and content is so high that traditional human-led review is no longer physically possible.

“Our senior engineers just cannot keep up with the volume of code being generated; they can’t do code reviews anymore,” Gopal notes. “Now we have an entirely different product development lifecycle where everyone needs to be trained to be a product person. Instead of doing code reviews, you work on a code review agent that people maintain. You’re looking at software that was 100% vibe-coded… it’s glitchy, it’s not perfect, but dude, it works.”

“The productivity increases are impressive,” Dattani concurred. “It’s clear that we are at the onset of a major shift in business globally, but each business will need to approach that slightly differently depending on their specific data security and safety requirements. Remember that even while you’re trying to outdo your competition, they are bound by the same rules and regulations as you — and it’s worth it to take time to get it right, start small, don’t try to do too much at once.”

Advertisement

5. Future outlook: voice interfaces, personality, and global scaling

The experts I spoke to all see a future where “vibe working” becomes the norm.

Local, personality-driven AI—including through voice interfaces like Wispr or ElevenLabs powered OpenClaw agents—will become the primary interface for work, while agents handle the heavy lifting of international expansion.

“Voice is the primary interface for AI; it keeps people off their phones and improves quality of life,” says Kimmel. “The more you can give AI a personality that you’ve uniquely designed, the better the experience. Previously, you’d need to hire a GM in a new country and build a translation team. Now, companies can think international from day one with a localized lens.”

Hamal adds a broader perspective on the global stakes: “We have knowledge worker AGI. It’s proven it can be done. Security is a concern that will rate-limit enterprise adoption, which means they’re more vulnerable to disruption from the low end of the market who don’t have the same concerns.”

Advertisement

Best practices for enterprise leaders seeking to embrace agentic AI capabilities at work

As OpenClaw and similar autonomous frameworks proliferate, IT departments must move beyond blanket bans toward structured governance. Use the following checklist to manage the “Agentic Wave” safely:

  • Implement Identity-Based Governance: Every agent must have a strong, attributable identity tied to a human owner or team. Use frameworks like IBC (Identity, Boundaries, Context) to track who an agent is and what it is allowed to do at any moment.

  • Enforce Sandbox Requirements: Prohibit OpenClaw from running on systems with access to live production data. All experimentation should occur in isolated, purpose-built sandboxes on segregated hardware.

  • Audit Third-Party “Skills”: Recent reports indicate nearly 20% of skills in the ClawHub registry contain vulnerabilities or malicious code. Mandate a “white-list only” policy for approved agent plugins.

  • Disable Unauthenticated Gateways: Early versions of OpenClaw allowed “none” as an authentication mode. Ensure all instances are updated to current versions where strong authentication is mandatory and enforced by default.

  • Monitor for “Shadow Agents”: Use endpoint detection tools to scan for unauthorized OpenClaw installations or abnormal API traffic to external LLM providers.

  • Update AI Policy for Autonomy: Standard Generative AI policies often fail to address “agents.” Update policies to explicitly define human-in-the-loop requirements for high-risk actions like financial transfers or file system modifications.

Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Building belonging with Apple’s Cathy Kearney and Kristina Raspe

Published

on

The latest episode of The Leaders’ Room podcast season four is a little different. It features two leaders – Apple VPs Cathy Kearney and Kristina Raspe. This series is created in partnership with IDA Ireland.

Once again in season four of The Leaders’ Room podcast, we get to know the leaders of some of the most influential multinationals in tech, life sciences and innovation, as well as getting insights into their leadership styles and the high-tech trends they see coming down the line.

In this latest episode, we did something a little different. We left the studio behind. With Apple VPs, our own Cathy Kearney, and US-based Kristina Raspe in town for the official launch of the new Hollyhill 5 building on the Cork campus, we sat down with them on location and did a two-hander for this special edition of The Leaders’ Room.

Kearney needs little introduction as the longtime Apple lead in Ireland and VP of European Operations. Raspe, visiting from the US, is VP of Places and oversees the physical footprint of the iconic company around the world from campuses, to retail stores to data centres.

Advertisement

We chatted leadership styles, the new 300-person Dublin office planned, Apple’s commitment to its Irish operations and Tim Cook’s love of Ireland, as the iconic company recently celebrated 45 years in this country.

Our recording location was the impressive new Hollyhill 5 building, which had just officially opened, so it was an opportunity to explore what this latest investment says about Apple’s future in Ireland. Both were quick to emphasise that, in the words of Apple CEO Tim Cook, Ireland is Apple’s “second home”, and they are here for the long haul.

Indeed Kearney is hugely ambitious for the site and says that, with the importance of emerging markets for Apple, she is keen to obtain further investment still for the future, as it is the team in Ireland that drive this critical part of the organisation.

Advertisement

And it is a sentiment echoed by US-based Raspe who said it was easy to get the commitment to invest in the new building in Cork and that Apple has every intention of being here for the long haul. Music to the ears of many I suspect, with Apple in Ireland recently being identified as one of the top three corporate taxpayers in the country.

The investment in a new permanent office in Dublin city appears to be further evidence of Apple’s commitment to Ireland, but the Cork Hollyhill campus continues to sit at the core of its European operations. Apple’s largest location outside the US, it has been more than 45 years since Apple opened its manufacturing facility in Cork with 135 team members. Today’s campus houses 6,000 people, with teams across the business – from operations, engineering and manufacturing to procurement, customer support and finance.

Interviews with Kearney are rare, so it was a unique opportunity to get a sense of the Irish woman’s leadership style – authenticity is key she says, adding she works as hard as she expects her team to work – and she emphasises the importance of curiosity and how it empowers a culture of innovation.

We’re grateful to all our interviewees again this season, for taking the time out of busy schedules to come into the studio and share their insights and their intelligence with us. And a big thanks as ever to our partners IDA Ireland who make this series possible.

Advertisement

The Leaders’ Room podcast is released fortnightly and can be found by searching for ‘The Leaders’ Room’ wherever you get your podcasts. For those who prefer their audio with visuals, filmed versions of the podcast interviews are all available here on SiliconRepublic.com.

Check out The Leaders’ Room podcast for in-depth insights from some of Ireland’s top leaders. Listen now on Spotify, on Apple or wherever you get your podcasts.

Source link

Advertisement
Continue Reading

Tech

Google just gave Sundar Pichai a $692M pay package

Published

on

Sundar Pichai’s new pay package could be worth $692 million. Per a filing first spied by the FT, Alphabet has structured a three-year deal for its Google CEO that could make him one of the highest-paid executives on the planet — but most of it is tied to performance, including new stock incentives linked to Waymo and Wing, its drone delivery venture.

What’s striking is how little public fascination Pichai attracts compared to Google’s founders. Larry Page and Sergey Brin — the second- and fourth richest people in the world — have lately captured headlines for a different reason entirely; both have been snapping up lavish Miami properties, widely seen as a response to California’s proposed Billionaire Tax Act — a ballot initiative targeting the state’s roughly 200 billionaires with a one-time 5% levy on net worth exceeding $1 billion. Page reportedly spent over $173 million on two mansions in Coconut Grove, Florida, recently, while Brin was just linked to a $51 million megamansion 14 miles away, atop two earlier purchases totaling $92 million.

Pichai, by contrast, remains quietly rooted in Los Altos, California, as far as the public knows. He’s a billionaire, too — the nearly sevenfold growth in Google’s market cap since he took the helm in 2015 has made the stock he’s accumulated along the way hugely valuable. He and his wife currently hold shares worth nearly $500 million, with another estimated $650 million sold as of last summer, per Bloomberg’s calculations.

Source link

Advertisement
Continue Reading

Tech

Experts Are Worried About The US Navy’s Newest Battleship

Published

on





The battleship was once one of the central elements of power in any blue-water navy, and they were prominent throughout world conflicts for half a century. The first modern vessel of its time equipped with steam turbines, the HMS Dreadnought, ushered in the age of floating massive gun platforms in 1906; in the decades that followed, these humongous navy ships only grew larger and deadlier. As World War II dawned the battleship rose to power, but after the Japanese attack on Pearl Harbor and the subsequent Battle of Midway, battleships took a back seat to aircraft carriers.

These massive ships continued to serve sporadically in the United States for decades, but all U.S. battleships have since been made into museum ships. Despite this, on December 22, 2025, U.S. President Donald Trump revealed his plan for the USS Defiant (BBG-1), a future Trump-class battleship that would become a leading warship in the so-called “Golden Fleet” moving forward. Not only was this surprising, but experts instantly decried the move as wasteful, unnecessary, and out of touch with the reality of modern naval combat, which remains centered around aircraft carriers since WWII.

Advertisement

Restructuring the Navy to make room for a new class of capital warship is not only extremely expensive, but it’s also incredibly worrisome for several reasons. Experts have concerns about the new battleship plan based on international response, specifically from China. in an interview with the Global Times, Zhang Junshe, a military affairs expert for the Chinese government, called the large-scale ships easy targets. With China being a near-peer potential enemy of the United States in future naval aggression, this is reason enough for planners in the U.S. Navy and the Department of War to take pause and consider the weight of President Trump’s interest in 21st-century battleships.

Advertisement

The dangers posed to a new fleet of Trump-class battleships

Putting aside the facts that the President has never served in the armed forces and that it’s antithetical to custom (though not unheard of) to name a ship class after a living person, adding battleships of any kind to the fleet isn’t a good idea. The USS Defiant is planned to be larger and longer than any U.S.-made WWII-era battleships, which were massive warships to begin with. These new battleships would be armed with hypersonic missiles, rail guns, Nuclear-Armed Sea-Launched Cruise Missiles (SLCMNs), and high-powered lasers, which all sound great, but none of the mentioned weapon systems is in the full-scale production or use category. 

As of writing, all these weapons are still largely in the experimental, test, and prototyping phase of development, though the U.S. is getting closer to fielding its own hypersonic missiles. Unfortunately, reports out of China say that not only does the country have plenty of its own hypersonic missiles already in service, but it also has hypersonic anti-ship cruise missiles in its arsenal — something the U.S. has no viable defense against. From this perspective, the President’s plan to construct up to 25 Trump-class battleships likely doesn’t concern China in the least.

In addition to the size of these ships and their still in-development armaments, the feasibility of President Trump’s plan remains suspect. U.S. shipbuilding capacity, which is already fully engaged in building highly advanced Gerald R. Ford-class aircraft carriers, Virginia-class nuclear submarines, and other vessels, is currently incapable of meeting the President’s demands.

Advertisement

Battleships would weaken the Navy and cost more than any other vessel in history

It’s hard to imagine, but adding massive battleships packed with all manner of new technology and weapons systems could actually lead to a weaker U.S. Navy. This is due to the way the USN has fought wars for more than 80 years. While changing tactics isn’t necessarily bad, embracing an abandoned engagement model over a superior, battle-tested, and proven one is arguably unwise and financially risky. Early analysis from the Congressional Budget Office backs this up, indicating that building the USS Defiant could cost as much as $22 billion.

If you know anything about new military projects, you likely already realize that number will probably rise significantly. Whenever new tech is designed and built, it costs far more than initially planned, so you might as well switch those twos for threes. The USS Gerald R. Ford (CVN-78) is the most advanced and expensive warship in the U.S. Navy’s fleet, and it cost $13 billion. A new fleet of battleships, with as many as 25 potentially on order, could end up costing the Navy around $1 trillion when all is said and done.

Advertisement

That’s because procurement is only the first phase — maintenance, operational, and other expenses will likely add billions on top of the already high price tag. That’s not only astronomical, but it’s also unsustainable, as it would deprive the DoW and the Navy of much-needed funding for other projects. The USN’s fiscal year 2026 budget is $292.2 billion, so you can see that there’s already a huge difference between cost and available funds. Granted, should the Trump-class battleship plan proceed, it wouldn’t see all 25 ships built in a single year; the cumulative costs, however, would simply be unsustainably high.



Advertisement

Source link

Continue Reading

Tech

Daily Deal: The Ultimate Microsoft Office Professional 2021 for Windows License + Windows 11 Pro Bundle

Published

on

from the good-deals-on-cool-stuff dept

Microsoft Office 2021 Professional is the perfect choice for any professional who needs to handle data and documents. It comes with many new features that will make you more productive in every stage of development, whether it’s processing paperwork or creating presentations from scratch – whatever your needs are. Office Pro comes with MS Word, Excel, PowerPoint, Outlook, Teams, OneNote, Publisher, and Access. Microsoft Windows 11 Pro is exactly that. This operating system is designed with the modern professional in mind. Whether you are a developer who needs a secure platform, an artist seeking a seamless experience, or an entrepreneur needing to stay connected effortlessly, Windows 11 Pro is your solution. The Ultimate Microsoft Office Professional 2021 for Windows + Windows 11 Pro Bundle is on sale for $49.97 for a limited time.

Note: The Techdirt Deals Store is powered and curated by StackCommerce. A portion of all sales from Techdirt Deals helps support Techdirt. The products featured do not reflect endorsements by our editorial team.

Filed Under: daily deal

Source link

Advertisement
Continue Reading

Tech

Australian Grand Prix 2026 LIVE: TV Channels, Live Updates for F1 season opener

Published

on

Refresh

Please follow our community guidelines.” data-join-the-conversation-text=”Join the Conversation”>

You must confirm your public display name before commenting

Advertisement

Please logout and then login again, you will then be prompted to enter your display name.

Source link

Continue Reading

Tech

CBP Used Online Ad Data to Track Phone Locations

Published

on

The United States and Israel launched a war in Iran last week that has already killed more than 1,200 Iranians and spilled out across the Middle East. There are many unknowns about US president Donald Trump’s goals as the conflict enters its second week and the situation seems poised to trigger an energy crisis with reverberations around the world.

Iran is in a nationwide internet shutdown with only the country’s regime-built intranet available, plunging Iranians into digital darkness and making it difficult for humanitarian aid workers, journalists, and others to disseminate information both inside and outside the country. As strikes on Tehran began last weekend, an apparently hacked prayer app sent messages saying “surrender” and “help is on the way” to Iranians around the country.

Meanwhile, GPS attacks like jamming—not to mention physical threats—are on the rise in the Strait of Hormuz, threatening shipping vessels. Security camera hacking has emerged as part of the playbook of war. And missile-intercept systems across the Middle East are under strain—and in some cases being destroyed in strikes.

Trump ousted Department of Homeland Security secretary Kristi Noem this week. Her tenure was marked by aggressive anti-immigration tactics and ICE and CBP’s killing of two US protesters. A highly sophisticated iPhone hacking tool kit that was likely originally built for the US government is in the hands of multiple other nations as well as scammers who have likely used the tools to infect tens of thousands of phones or more. Some US lawmakers are calling for an investigation into the threat of the decades-old side-channel hacking technique. And WIRED went inside how music streaming CEO Elie Habib built the open-source global threat map World Monitor in his spare time.

Advertisement

And there’s more. Each week, we round up the security and privacy news we didn’t cover in depth ourselves. Click the headlines to read the full stories. And stay safe out there.

United States Customs and Border Protection has, for the first time, admitted it purchased phone location data from the sprawling, surveillance-heavy online advertising industry. The agency’s acknowledgement was included in a document, called a Privacy Threshold Analysis, obtained by 404 Media through a Freedom of Information Act request. The document relates to a trial that CBP ran between 2019 and 2021.

The publication reports that CBP purchased data linked to real-time bidding processes. When you see ads online or in apps, they have often been shown to you after automated, instantaneous, auctions take place where advertisers bid to show you that specific ad. The murkiest parts of the advertising industry can collect data from your device, including your phone’s identifying details and location data; this is then repackaged and sold to companies and entities. The data has been called a “gold mine” for tracking people’s daily activities.

CBP did not respond to 404 Media’s request for comment on whether it is still buying the data; however, ICE has reportedly planned to purchase access to another system, called Webloc, that allows whole neighborhoods to be monitored for mobile phone movements.

Advertisement

The FBI was able to identify a protester in Atlanta after ultimately obtaining information from Swiss encrypted email service Proton Mail, court documents have revealed this week. A court document reviewed by 404 Media shows that payment information linked to a Proton email address was provided to US law enforcement by Swiss authorities after a request was made under an Mutual Legal Assistance Treaty (MLAT), which allows agencies to share data internationally.

Swiss officials made a request for the data under Swiss laws to Proton for payment information linked to the email address defendtheatlantaforest@protonmail.com, which was associated with protests in Atlanta. This information was then provided to US law enforcement officials under the international agreements, and they were able to identify an individual linked to the account.

Source link

Advertisement
Continue Reading

Tech

Fake Claude Code install guides push infostealers in InstallFix attacks

Published

on

Fake Claude Code install guides push infostealers in InstallFix attacks

Threat actors are employing a new variation of the ClickFix social engineering technique called InstallFix to convince users into running malicious commands under the pretext of installing legitimate command-line interface (CLI) tools.

The new trick exploits the common practice among developers these days of downloading and executing scripts through ‘curl-to-bash’ commands from online sources without closely inspecting the assets first.

Researchers at Push Security, a browser threat detection and response company, found that attackers use the new InstallFix technique with cloned pages for popular CLI tools that serve malicious install commands.

Since the current security model “boils down to ‘trust the domain’,” and more non-technical users are now working with tools previously reserved for developers, InstallFix may become a larger threat, the researchers say.

Advertisement

In a report today, Push Security highlights a cloned installation page for Claude Code, Anthropic’s CLI coding assistant, that features the same layout, branding, and documentation sidebar as the legitimate source.

The difference is in the installation instructions for macOS and Windows (PowerShell and Command Prompt), which deliver malware from an attacker-controlled endpoint.

Comparion between the legitimate (top) and malicious page (bottom)
Legitimate (top) and malicious page (bottom)
Source: Push Security

The researchers say that apart from the installation instructions, all links on the fake page redirect to the legitimate Anthropic site.

“So a victim that lands on the page and follows the fake instructions could continue normally without realizing anything had gone wrong,” Push Security notes in the report.

The attackers promote these pages through malvertising campaigns on Google Ads, causing malicious ads to appear in search results for queries such as “Claude Code install” and “Claude Code CLI.”

Advertisement

BleepingComputer could confirm that the malicious websites are still being promoted through Google-sponsored search results. When looking for the query “install claude code,” the first result was a Squarespace URL (claude-code-cmd.squarespace[.]com) pointing to a perfect clone of the official Claude Code documentation.

Sponsored Google search pushing fake Claude install sites
Sponsored Google search pushing fake Claude install sites
source: BleepingComputer

Amatera infections

Based on Push Security’s analysis, the payload delivered through these InstallFix attacks is the Amatera Stealer, a piece of malware designed to steal sensitive data (cryptocurrency wallets, credentials) from compromised systems.

The malicious InstallFix commands for macOS contain base64-encoded instructions for downloading and executing a binary from a domain controlled by the attacker. In one case, BleepingComputer found that the threat actor used the domain wriconsult[.]com, which is currently down.

For Windows users, the malicious command uses the legitimate utility ‘mshta.exe’ to retrieve the malware and triggers additional processes like ‘conhost.exe’ to support the execution of the final payload, Amatera information stealer.

Cloned Claude install guide with malicious commands
Cloned Claude install guide with malicious commands
source: BleepingComputer.com

Amatera is a fairly new malware family, believed to be based on the ACR Stealer, sold as a subscription service (MaaS) to cybercriminals.

The malware was recently observed distributed in separate ClickFix attacks that abused Windows App-V scripts for payload delivery. It can steal passwords, cookies, and session tokens stored in web browsers and collect system information while evading detection by security tools.

Advertisement

Push Security reports that the attacks are particularly evasive, also because the malicious sites are hosted on legitimate platforms such as Cloudflare Pages, Squarespace, and Tencent EdgeOne.

The researchers also published a video showing how the InstallFix attack works, from the search query to copying a malicious command.

In a campaign last week, threat actors used the InstallFix technique with fake OpenClaw installers hosted in GitHub repositories that were promoted by Bing’s AI-enhanced search results.

Advertisement

Users looking for Claude Code must ensure they get installation instructions from official websites, block or skip all promoted Google Search results, and bookmark software download portals for tools they need to re-download frequently.

The researchers provide indicators of compromise that include the domains for serving the cloned guides, for hosting the malicious payloads, and the InstallFix commands.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading

Tech

TCL unveils 4K 240Hz OLED dual-mode monitor that's just 6.4mm thick

Published

on


The recently unveiled 32X3A is a 31.5-inch display that can switch between 4K at 240Hz and 480Hz at a lower resolution, likely 1080p, with a grayscale response time of 0.03 milliseconds. According to ITHome, the OLED display covers 99% of the sRGB and DCI-P3 color gamuts. Anti-glare and anti-reflective coating…
Read Entire Article
Source link

Continue Reading

Tech

Hackers abusing AI at every stage of cyberattacks

Published

on

Malicious AI

Microsoft says threat actors are increasingly using artificial intelligence in their operations to accelerate attacks, scale malicious activity, and lower technical barriers across all aspects of a cyberattack.

According to a new Microsoft Threat Intelligence report, attackers are using generative AI tools for a wide range of tasks, including reconnaissance, phishing, infrastructure development, malware creation, and post-compromise activity.

In many cases, AI is used to draft phishing emails, translate content, summarize stolen data, debug malware, and assist with scripting or infrastructure configuration.

“Microsoft Threat Intelligence has observed that most malicious use of AI today centers on using language models for producing text, code, or media. Threat actors use generative AI to draft phishing lures, translate content, summarize stolen data, generate or debug malware, and scaffold scripts or infrastructure,” warns Microsoft.

Advertisement

“For these uses, AI functions as a force multiplier that reduces technical friction and accelerates execution, while human operators retain control over objectives, targeting, and deployment decisions.”

Threat actor use of AI across the cyberattack lifecycle
Threat actor use of AI across the cyberattack lifecycle
Source: Microsoft

AI used to power cyberattacks

Microsoft has observed multiple threat groups incorporating AI into their cyberattacks, including North Korean actors tracked as Jasper Sleet (Storm-0287) and Coral Sleet (Storm-1877), who use the technology as part of remote IT worker schemes.

In these operations, AI tools help generate realistic identities, resumes, and communications to gain employment at Western companies and maintain access once hired.

Jasper Sleet leverages generative AI platforms to streamline the development of fraudulent digital personas. For example, Jasper Sleet actors have prompted AI platforms to generate culturally appropriate name lists and email address formats to match specific identity profiles. For example, threat actors might use the following types of prompts to leverage AI in this scenario:

Example prompt 1: “Create a list of 100 Greek names.”

Advertisement

Example prompt 2: “Create a list of email address formats using the name Jane Doe.“

Jasper Sleet also uses generative AI to review job postings for software development and IT-related roles on professional platforms, prompting the tools to extract and summarize required skills. These outputs are then used to tailor fake identities to specific roles.

❖ Microsoft Threat Intelligence

The report also describes how AI is being used to assist with malware development and infrastructure creation, with threat actors using AI coding tools to generate and refine malicious code, troubleshoot errors, or port malware components to different programming languages.

Advertisement

Some malware experiments show signs of AI-enabled malware that dynamically generate scripts or modify behavior at runtime.

Microsoft also observed Coral Sleet using AI to quickly generate fake company sites, provision infrastructure, and test and troubleshoot their deployments.

When AI safeguards attempt to prevent the use of AI in these tasks, Microsoft says threat actors are using jailbreaking techniques to trick LLMs into generating malicious code or content.

In addition to generative AI use, Microsoft researchers have begun to see threat actors experiment with agentic AI to perform tasks autonomously and adapt to results.

Advertisement

However, Microsoft says AI is currently used primarily for decision-making rather than for autonomous attacks.

Because many IT worker campaigns rely on the abuse of legitimate access, Microsoft advises organizations to treat these schemes and similar activity as insider risks.

Furthermore, as these AI-powered attacks mirror conventional cyberattacks, defenders should focus on detecting abnormal credential use, hardening identity systems against phishing, and securing AI systems that may become targets in future attacks.

Microsoft is not alone in seeing threat actors increasingly using artificial intelligence to power attacks and lower barriers to entry.

Advertisement

Google recently reported that threat actors are abusing Gemini AI across all stages of cyberattacks, mirroring what Amazon observed in this campaign.

Amazon and the Cyber and Ramen security blog also recently reported on a threat actor using multiple generative AI services as part of a campaign that breached more than 600 FortiGate firewalls.

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

Source link

Advertisement
Continue Reading

Tech

How The Chornobyl NPP Got Modernized In The 1990s

Published

on

During the 1990s the Chornobyl Nuclear Power Plant – formerly the Chernobyl NPP – continued operating with its remaining three RBMK reactors, but of course the 1970s-era automation with its very limited SKALA computer required some serious modernization. What was interesting here is that instead of just replacing this entire Soviet-era mainframe with a brand-new 1990s one, the engineers responsible opted to build a new system – called DIIS – around it. This is detailed in a recent video by the [Chornobyl Family] on YouTube.

This SKALA industrial control system was previously detailed in a video, covering this 24-bit mainframe computer and its many limitations. It wasn’t quite a real-time control system, but it basically did what it was designed to do. Since at the time it was not clear for how long these three RBMKs would be kept running, they didn’t want to go overboard with investments either.

Ultimately Unit 2 only was active until 1991 due to a turbine fire, Unit 1 until 1996 and Unit 3 was shutdown for the last time in 2000, so this a sensible decision. During those years, an auxiliary information-measurement system (DIIS) was the big upgrade, which got bridged into SKALA via a Ukrainian-made SM-1210 minicomputer, with the latter connected to an 80386 PC which itself was connected to an ARCnet hub.

Advertisement

Best part of this DIIS upgrade was that it made it possible to run modeling algorithms for the reactor core based on measurements, without having to send data all the way over to the central control office in Moscow. Now reactor parameters could be visualized in real-time, and adjustments made via the same PRIZMA program’s magnetic tapes of the SKALA system as before.

Although the result was a bit of an odd mixture of 1970s Soviet mainframe design, 1980s-derived Ukrainian mainframe design and 1990s Intel computing power, it worked well enough to bring the ChNPP to the very doorstep of the 21st century with no issues worthy of note. Definitely a testament to the engineers who hacked this upgrade together and made it work so smoothly.

Advertisement

Source link

Continue Reading

Trending

Copyright © 2025