OpenAI says malware tied to the Shai-Hulud supply chain attack accessed internal repositories after infecting two employee ...
The exploit code was almost too neat. When Google’s Threat Intelligence Group flagged a previously unknown software ...
ReliaQuest observed attackers pairing ClickFix with the PySoxy proxy tool to establish redundant encrypted access paths and ...
Microsoft Threat Intelligence said attackers placed malicious code inside a Mistral AI download distributed through a Python ...
A fake repository mimicking OpenAI’s Privacy Filter on Hugging Face accumulated ~244,000 downloads before being removed. It delivered a multi-stage Rust infostealer ...
Google's GTIG identified the first zero-day exploit developed with AI and stopped a mass exploitation event. The report documents state actors using AI for vulnerability research and autonomous ...
Google's Threat Intelligence Group intercepted the first known AI-generated zero-day exploit targeting two-factor ...
Google's threat team caught the first live AI-built zero-day exploit, escalating the attacker-defender AI arms race.
CRPx0 is a complex, stealthy malware campaign that targets macOS and Windows systems, and appears to have Linux capabilities ...
Exploitation of open-source tools allows attackers to maintain persistent access after initial social engineering, warn ...
Google says attackers are using AI for zero-day research, malware development, reconnaissance, and access to premium AI tools ...
Security researchers have uncovered covert infostealer malware hidden in one of the top-ranking repositories on Hugging Face, ...