For the first time, Google has identified a zero-day exploit believed to have been developed using artificial intelligence.
The 2FA bypass exploit stemmed from a faulty trust assumption, providing evidence of AI reasoning that can discover ...
Criminal hackers have used artificial intelligence to develop a working zero-day exploit, the first confirmed case of its ...
Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate ...
Researchers at Google Threat Intelligence Group (GTIG) say that a zero-day exploit targeting a popular open-source web ...
Dive into The Register's online archive of incisive tech news reporting, features, and analysis dating back to 1998 ...
Chainalysis noted that on April 18, 2026, cybercriminals believed to be tied to North Korea’s Lazarus Group executed one of the largest DeFi heists of the year, siphoning approximately $292 million ...
Volo Protocol, a yield-generating platform built on the Sui blockchain, confirmed on Tuesday that it suffered an exploit that drained approximately $3.5 million in assets. The attack targeted specific ...
The $292 million exploit tied to KelpDAO is the latest in a long line of crypto bridge hacks, underscoring how the systems designed to connect blockchains have become some of the easiest ways to break ...
A roughly $292 million exploit over the weekend has rattled the crypto industry, exposing vulnerabilities in decentralized finance (DeFi) infrastructure and raising concerns about knock-on effects ...
Editor's take: Microsoft has increasingly turned Windows Update into a point of frustration for some users, all while cybercriminals continue to exploit weaknesses in the Windows platform to deploy ...