Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate ...
The attacks compromise aerospace and drone firms' systems to exfiltrate GIS files, terrain models, and GPS data to gain a clear picture of analysts' intel.
The “Copy Fail” Linux bug could impact crypto infrastructure that relies on Linux servers, highlighting growing cybersecurity ...
Google claims to have thwarted a significant cyberattack by state-sponsored hackers using an AI-developed zero-day exploit.
GPT‑5.5‑Cyber, as the model is called, made its debut on Thursday. It’s available in limited preview through a program called ...
Google identified the first malicious AI use for a zero-day 2FA bypass in an open-source admin tool, accelerating threat ...
Google says hackers have used AI to discover and exploit a previously unknown software vulnerability for the first time.
Google says attackers are using AI for zero-day research, malware development, reconnaissance, and access to premium AI tools ...
While previous assessments categorized AI-assisted cyberattacks as experimental, current data suggests generative AI is now a mature, industrialized component of offensive operations.
A North Korean APT has crafted malicious software packages to appeal to AI coding agents, while ‘slopsquatting’ shows the ...
When it comes to Mythos, don’t hate the player. Hate the game. The cybersecurity community went on alert when Anthropic ...
Critical out-of-bounds read in Ollama before 0.17.1 leaks process memory including API keys from over 300000 servers via ...