Cybercriminals created a zero-day exploit with AI, the first example of artificial intelligence finding and hacking software ...
The company said that it had identified, for the first time, hackers using artificial intelligence to discover an unknown bug ...
The website for the popular JDownloader download manager was compromised earlier this week to distribute malicious Windows ...
Google Threat Intelligence Group details how cybercriminals attempted to launch a campaign based around an AI-developed ...
U.S. cybersecurity agency CISA says the CopyFail bug is being actively used in hacking campaigns, and poses a major risk to servers and datacenters that rely on Linux.
Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate ...
Fake OpenAI Privacy Filter hit #1 on Hugging Face with 244,000 downloads, spreading infostealer malware to Windows users.
ZiChatBot malware spread via 3 PyPI packages in July 2025 uses Zulip APIs as C2, enabling stealthy attacks across systems ...
As AI systems like Anthropic’s Mythos expose hidden security flaws, Trump officials are starting to rethink their hands-off ...
The PCPJack worm targets cloud environments and vulnerable web applications to remove TeamPCP infections and steal ...
After the CopyFail vulnerability gave root access from any user on almost all distributions last week, this week we’ve got DirtyFrag. This chains the vulnerability in CopyFail (xfrm-ESP) and ...
The 2026 picoCTF competition has officially expanded with more challenges than ever before, yet the transition from the block-based logic of Karel to the raw Python scripting required for CTFs remains ...