Home Tags Posts tagged with "cybersecuity"
Tag:

cybersecuity

Meta

Meta has announced that the end-to-end encryption feature for messages on Instagram will stop functioning after May 8, 2026. The change means that messages exchanged on the platform will no longer be protected by this form of encryption.

End-to-end encryption is designed to ensure that only the sender and recipient can read the contents of a message. When this protection is removed, platform operators may be able to access or analyse the content of communications under certain circumstances.

Meta confirmed the upcoming change through a blog post explaining that some existing chats may be affected once the feature is discontinued. Users who wish to keep messages or media stored in encrypted chats have been advised to download their data before the change takes effect.

According to the company, users will receive instructions inside the app on how to download messages and media files that they want to retain. The company also advised people using older versions of the application to update to the latest version so they can access the download tools before the feature is removed.

The decision comes amid increasing global concerns about harmful online content, particularly material related to child exploitation. Removing end-to-end encryption could allow platforms to scan messages and calls for content linked to child sexual abuse material, grooming, or harassment.

Social media platforms have faced growing pressure from governments and regulators to strengthen protections for younger users online. Several countries have proposed or introduced regulations aimed at requiring technology companies to detect harmful content even within private communications.

In recent years, governments in regions such as Europe and Australia have discussed policies aimed at limiting social media access for children under certain age thresholds. Some proposed laws would also give authorities greater powers to require platforms to identify illegal content online.

Instagram remains one of the most widely used social media platforms among younger audiences worldwide. The platform’s messaging system is frequently used for private communication between users, making privacy protections a key area of debate.

Encrypted messaging on Instagram was introduced in late 2023 as part of Meta’s broader efforts to strengthen privacy features across its platforms. However, the upcoming change signals a shift in the company’s approach as it balances privacy protections with efforts to detect and prevent harmful content.

The move has generated discussion among technology experts and privacy advocates. Many security specialists consider end-to-end encryption one of the most effective ways to protect digital communications from hackers or unauthorised surveillance.

At the same time, some policymakers argue that strong encryption can make it more difficult to identify illegal activities occurring within private messaging systems.

As the May 2026 deadline approaches, users and technology analysts will be watching how the change affects communication privacy on Instagram and whether similar policy discussions extend to other platforms owned by Meta.

0 comment
0 FacebookTwitterPinterestEmail
prompt flux malware

Google’s Threat Intelligence Group (GTIG) has identified an experimental malware family known as PROMPTFLUX — a strain that doesn’t just execute malicious code, but rewrites itself using artificial intelligence.

Unlike traditional malware that depends on static commands or fixed scripts, PROMPTFLUX interacts directly with Google Gemini’s API to generate new behaviours on demand, effectively creating a shape-shifting digital predator capable of evading conventional detection methods.

A Glimpse into Adaptive Malware

PROMPTFLUX represents a major shift in how attackers use technology. Instead of pre-coded evasion routines, this malware dynamically queries AI models like Gemini for what GTIG calls “just-in-time obfuscation.” In simpler terms, it asks the AI to rewrite parts of its own code whenever needed — ensuring no two executions look alike.

This makes traditional, signature-based antivirus systems nearly powerless, as the malware continuously changes its fingerprint, adapting in real time to avoid detection.

How PROMPTFLUX Operates

The malware reportedly uses Gemini’s capabilities to generate new scripts or modify existing ones mid-operation. These scripts can alter function names, encrypt variables, or disguise malicious payloads — all without human intervention.

GTIG researchers observed that PROMPTFLUX’s architecture allows it to:

  • Request on-demand functions through AI queries
  • Generate obfuscated versions of itself in real time
  • Adapt its attack vectors based on environmental responses

While still in developmental stages with limited API access, the discovery underscores how AI can be weaponised in cybercrime ecosystems.

Google’s Containment and Response

Google has moved swiftly to disable the assets and API keys associated with the PROMPTFLUX operation. According to GTIG, there is no evidence of successful attacks or widespread compromise yet. However, the incident stands as a stark warning — attackers are now experimenting with semi-autonomous, AI-driven code.

The investigation revealed that the PROMPTFLUX samples found so far contain incomplete functions, hinting that hackers are still refining the approach. But even as a prototype, it highlights the growing intersection of machine learning and malicious automation.

A Growing Underground AI Market

Experts warn that PROMPTFLUX is just the beginning. A shadow economy of illicit AI tools is emerging, allowing less-skilled cybercriminals to leverage AI for advanced attacks. Underground forums are now offering AI-powered reconnaissance scripts, phishing generators, and payload enhancers.

State-linked groups from North Korea, Iran, and China have reportedly begun experimenting with similar techniques — using AI to streamline reconnaissance, automate social engineering, and even mimic human operators in digital intrusions.

Defenders Turn to AI Too

The cybersecurity battle is no longer human versus human — it’s AI versus AI. Defenders are now deploying machine learning frameworks like “Big Sleep” to identify anomalies, reverse-engineer adaptive code, and trace AI-generated obfuscation patterns.

Security teams are being urged to:

  • Prioritize behaviour-based detection over static signature scans
  • Monitor API usage patterns for suspicious model interactions
  • Secure developer credentials and automation pipelines against misuse
  • Invest in AI-driven defensive frameworks that can predict evasive tactics

The Future: Cybersecurity in the Age of Adaptive Intelligence

PROMPTFLUX marks the early stage of a new class of cyber threats — self-evolving malware. As AI becomes more integrated into both legitimate development and malicious innovation, defenders must evolve just as quickly.

The next generation of cybersecurity will depend not only on firewalls and encryption but on the ability to detect intent — to distinguish between machine creativity and machine deception.

0 comment
0 FacebookTwitterPinterestEmail

Our News Portal

We provide accurate, balanced, and impartial coverage of national and international affairs, focusing on the activities and developments within the parliament and its surrounding political landscape. We aim to foster informed public discourse and promote transparency in governance through our news articles, features, and opinion pieces.

Newsletter

Laest News

@2023 – All Right Reserved. Designed and Developed by The Parliament News

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00
Update Required Flash plugin
-
00:00
00:00