The Shai-Hulud malware leaked last week is now used in new attacks on the Node Package Manager (npm) index, as infected ...
Google's GTIG identified the first zero-day exploit developed with AI and stopped a mass exploitation event. The report documents state actors using AI for vulnerability research and autonomous ...
Google reported the first confirmed AI-assisted zero-day exploit, raising new concerns about logic flaws, supply chain risk, ...
Microsoft Threat Intelligence said attackers placed malicious code inside a Mistral AI download distributed through a Python ...
Google says attackers are using AI for zero-day research, malware development, reconnaissance, and access to premium AI tools ...
The flaw allowed two-factor authentication to be bypassed if valid credentials were obtained, exploiting a hardcoded trust assumption. Google worked with the vendor to patch the issue before mass ...
A fake Claude code installer can successfully exfiltrate decrypted cookies, passwords and payment methods from Chromium ...
Tracking hate speech online is challenging even when terms are explicit. Coded speech is harder to detect – but pairing AI ...
ReliaQuest observed attackers pairing ClickFix with the PySoxy proxy tool to establish redundant encrypted access paths and ...
For protocol founders and security researchers, the incident reinforced a broader shift underway across crypto: DeFi is no longer primarily battling coding bugs. It’s battling complexity.
OpenAI has just launched Daybreak, a cybersecurity initiative that's clearly the company's competitor to Anthropic's Project ...
Jailbreaking went from cracking iPhones to liberating LLMs. Here's how it works, who's doing it, and why every AI lab is ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results