News

The incident highlights rising AI risks as malicious actors exploit powerful tools amid weak safeguards and oversight.
A hacker planted data wiping code in a version of Amazon's generative AI-powered assistant, the Q Developer Extension for ...
The Linux malware campaign leverages AI-generated code and weaponized panda JPEGs to deploy stealthy and persistent ...
The Koske Linux malware shows how cybercriminals can use AI for payload development, persistence, and adaptivity.
It has been a busy week for supply-chain attacks targeting open source software available in public repositories, with ...
A new Linux malware named Koske may have been developed with artificial intelligence and is using seemingly benign JPEG ...
Microsoft has pointed the finger at three Chinese nation-state actors for exploiting the SharePoint vulnerabilities. Here's what we know about the security flaws and how to guard against future ...
The name was coined by Dinh Ho Anh, a researcher from Khoa of Viettel Cyber Security, who developed the exploit. The ...
An urgent warning has been issued to Android users that millions of devices have been infected with the 'BadBox malware' ...