Fake OpenAI Privacy Filter hit #1 on Hugging Face with 244,000 downloads, spreading infostealer malware to Windows users.
Stolen credentials produced valid Sigstore certificates, clearing 633 malicious npm packages — one of seven developer tool ...
Four research teams found the same confused deputy failure in Claude across three surfaces in 48 hours. This audit matrix ...
A multi-stage attack on Linux devices began with an exposed F5 BIG-IP edge appliance and pivoted to an internal Confluence ...
Attackers are increasingly abusing Microsoft’s legacy MSHTA utility to silently deliver malware, stealers, and persistent ...
Storm-2949 turned stolen credentials into a cloud-wide breach, moving from identity compromise to large-scale data theft ...
The 2FA bypass exploit stemmed from a faulty trust assumption, providing evidence of AI reasoning that can discover ...
Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate ...
Google claims to have thwarted a significant cyberattack by state-sponsored hackers using an AI-developed zero-day exploit.
Gemini’s performance signals a maturation in AI-assisted debugging, showing it can go beyond surface-level fixes to implement industry best practices. For developers, this means AI tools are becoming ...
Google caught the first zero-day exploit built with AI assistance. Criminal and state backed hackers are using AI models to ...
TeamPCP’s Mini Shai-Hulud campaign used hijacked GitHub OIDC tokens to spread a credential-stealing worm through TanStack npm ...