If you use an Android phone, this deserves your attention. Cybersecurity researchers warn that hackers are using Hugging Face, a popular platform for sharing artificial intelligence (AI) tools, to ...
The Australian Signals Directorate (ASD) has released a tool to store and analyse large amounts of malware samples, aimed at enterprise and government security teams looking to collaborate and speed ...
A China-linked advanced persistent threat actor tracked as UAT-9244 has been targeting telecommunication service providers in South America since 2024, compromising Windows, Linux, and network-edge ...
Fake OpenClaw installers hosted in GitHub repositories and promoted by Microsoft Bing's AI-enhanced search feature instructed users to run commands that deployed information stealers and proxy malware ...
As artificial intelligence reshapes how software is built and deployed, it’s also transforming how cyberattacks are launched. Attackers are increasingly using AI to generate malware that can change ...
If you’ve used any modern AI tools, you’ll know they can be a great help in reducing the tedium of mundane and burdensome tasks. Well, it turns out threat actors feel the same way, as the latest ...
Hudson Rock spots first infostealer attack stealing OpenClaw AI assistant configuration files Stolen secrets (API keys, tokens) could grant access to linked apps like Telegram or calendars Researchers ...
Last May, law enforcement authorities around the world scored a key win when they hobbled the infrastructure of Lumma, an infostealer that infected nearly 395,000 Windows computers over just a ...
Researchers found a firmware-level Android backdoor called Keenadu preinstalled on certain tablets before sale. The malware injects into Android’s Zygote process, giving attackers broad control over ...
Malwarebytes has published a warning about a 7-Zip impersonation campaign that blends a convincing fake download site with a trojanized installer designed for long-term monetization. The counterfeit ...
Now that Windows 10 has reached the end of support, it's increasingly appealing to cybercriminals. While upgrading is recommended, you don't have to switch immediately—here's how you can keep your ...
Dubbed InstallFix by Push Security, the scheme inserts instructions to download malware during the Claude Code install process on cloned websites.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results