The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations. Researchers at cybersecurity ...
An undefined Chinese-speaking actor wields a combo of custom malware, open source tools, and LOTL binaries against Windows ...
Distributed through over 100 GitHub repositories, the BoryptGrab stealer targets browser, wallet, system, and other user data ...
If you use an Android phone, this deserves your attention. Cybersecurity researchers warn that hackers are using Hugging Face, a popular platform for sharing artificial intelligence (AI) tools, to ...
As artificial intelligence reshapes how software is built and deployed, it’s also transforming how cyberattacks are launched. Attackers are increasingly using AI to generate malware that can change ...
Hugging Face is widely used by researchers and developers to host machine learning models, datasets, and tools. But researchers say attackers have found a way to exploit that trust. Cybersecurity ...
Jake Peterson is Lifehacker’s Tech Editor, and has been covering tech news and how-tos for nearly a decade. His team covers all things technology, including AI, smartphones, computers, game consoles, ...
Researchers on Friday said that Poland’s electric grid was targeted by wiper malware, likely unleashed by Russia state hackers in an attempt to disrupt electricity delivery operations. A cyberattack, ...
A newly identified malware strain built for covert, long-term access to compromised systems has been documented in recent security research. Dubbed PDFSIDER by Resecurity, the threat is delivered ...
Mustang Panda uses Venezuela-themed phishing emails for cyberespionage Acronis uncovers malware linked to Mustang Panda operations Malware targets US government, policy-related entities, researchers ...