Generative AI tools analyzed target networks and wrote exploit code, enabling an opportunistic attacker to have an outsized ...
The report warns CSOs that while AI is helping unsophisticated threat actors, failure to implement cybersecurity basics is fatal regardless of the attacker's skill.
A low-skilled threat actor was able to do a lot with the help of AI, Amazon researchers warn.
A bad actor used AI tools to compromise more than 600 FortiGate appliances around the world in five weeks, Amazon says, the latest example of how hackers are increasing are using the technology to ...
A lone attacker, leveraging commercial AI tools, has breached over 600 organizations globally in just over a month. Exploiting common FortiGate firewall vulnerabilities, the hacker used AI for ...
The Arkanix Stealer malware can collect and exfiltrate system information, browser data, VPN information, and arbitrary files ...
A critical OpenClaw flaw allowed malicious websites to connect to locally running agents, brute-force passwords without ...
Researchers warn malicious packages can harvest secrets, weaponize CI systems, and spread across projects while carrying a dormant wipe mechanism.
A sophisticated Python-based malware deployment uncovered during a fraud investigation has revealed a layered attack involving obfuscation, disposable infrastructure and commercial offensive tools.
Orca has discovered a supply chain attack that abuses GitHub Issue to take over Copilot when launching a Codespace from that ...
The Microsoft Defender team has discovered a coordinated campaign targeting software developers through malicious repositories posing as legitimate Next.js projects and technical assessment materials, ...
The module targets Claude Code, Claude Desktop, Cursor, Microsoft Visual Studio Code (VS Code) Continue, and Windsurf. It also harvests API keys for nine large language models (LLM) providers: ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results