Google says attackers are using AI for zero-day research, malware development, reconnaissance, and access to premium AI tools ...
Google identified the first malicious AI use for a zero-day 2FA bypass in an open-source admin tool, accelerating threat ...
Security researchers have uncovered covert infostealer malware hidden in one of the top-ranking repositories on Hugging Face, ...
Exploitation of open-source tools allows attackers to maintain persistent access after initial social engineering, warn ...
The repository reached the #1 trending position on Hugging Face within 18 hours, highlighting how public AI repositories are ...
Fake OpenAI Privacy Filter hit #1 on Hugging Face with 244,000 downloads, spreading infostealer malware to Windows users.
PCPJack makes innovative use of parquet files for stealthy, pre-validated target discovery as it canvasses multiple cloud ...
For the first time, Google has identified a zero-day exploit believed to have been developed using artificial intelligence.
Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate ...
A new malware framework called PCPJack is stealing credentials from exposed cloud infrastructure while actively removing ...
First AI zero-day: Google detected a Python-script exploit, likely AI-generated, to bypass 2FA on a widely used open-source admin tool. Attack thwarted: The planned mass exploitation was disrupted ...
The PCPJack worm targets cloud environments and vulnerable web applications to remove TeamPCP infections and steal ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results