Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » V0 AI Vercel tool, armed with cybercrime for quick creation pages to enter scale
Global Security

V0 AI Vercel tool, armed with cybercrime for quick creation pages to enter scale

AdminBy AdminJuly 2, 2025No Comments3 Mins Read
Vercel v0 AI Tool
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


02 July 2025Red LakshmananAI Security / Phishing

Vercel v0 AI instrument

Unknown threaten subjects were observed for weapons v0The General Artificial Intelligence Tool (AI) from Vercel to develop fake entry pages that represent their legal counterpart.

“This observation signals a new evolution in weapons of generative II through threatening subjects that have demonstrated the ability to create functional phishing from simple text clues,” exploration researchers at the threatening Okta Houssem Eddine Bordjiba and Paula de La Hoz – Note.

V0 – this AI’s proposal from Vercel that allows users to create Basic Target Pages and Full applications Use of a natural tongue clue.

Cybersecurity

Identity Services Services said she watched the scammers who use technology to develop convincing pages to enter several brands, including unnamed own customers. After the responsible disclosure of Vercel’s information, he blocked access to these phishing sites.

It was also found that the subjects of the company’s threats that take other resources, such as the detected logos of the Vercel infrastructure, probably seeking to abuse the confidence associated with the developer platform and detection of evasion, were found.

Unlike traditional phishing kits This requires a certain amount of effort to set, tools such as the V0 and its open source clones on GitHub-vomiting the attacker to promote the fake pages only by typing the hint. Rather, it is easier and does not require coding skills. This makes it easy for even low -skilled threatening subjects to build convincing phishing sites on a scale.

“The observed activity confirms that today’s threat actors are actively experimenting and armed leading Genai instruments to streamline and expand their phishing capabilities,” the researchers said.

“The use of a platform such as v0cel’s v0.dev allows you to strengthen the threat to the quickly produce quality, deceptive phishing pages, increasing the speed and scale of its activities.”

Cybersecurity

Development comes when bad actors continue to use large language models (LLM) to help their criminal activity by creating obscene versions of these models that are clearly designed for illegal purposes. One of these LLM, which has gained popularity in cybercrime landscape, is Whiterabbitneowhich advertises itself as “Without Censorship AI for (Dev) SECOPS teams”.

“Cybercrimations are increasingly striving for obscene LLM, LLMS, appointed cybercrime, and legal LLM,” Cisco Talos Jaeson Schultz researcher – Note.

“Excellent LLM is non -standard models that work without restrictions on the fence. These systems are happy to create sensitive, contradictory or potentially harmful output in response to users’ clues. As a result of obscene LLM is great for using cybercrime.”

This corresponds to the greater change we see: Phishing works on AI more than before. Fake electronic letters, cloned voices, even videos with depths appeared in social engineering attacks. These tools help the attackers rapidly scale, turning small scores into large, automated companies. It is not just about fooling users – it is about creating whole fraud systems.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025

V0 AI Vercel tool, armed with cybercrime for quick creation pages to enter scale

July 2, 2025

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.