Researchers show AI assistants can act as stealth C2 proxies, enabling malware communication, evasion, and runtime attack ...
AI assistants like Grok and Microsoft Copilot with web browsing and URL-fetching capabilities can be abused to intermediate command-and-control (C2) activity.
Malware can blend in with legitimate AI traffic, using popular AI tools as C2 infrastructure.
Check Point Research shows browsing-enabled AI chat can act as a malware relay, moving commands and data through normal-looking traffic. Microsoft urges defense-in-depth, while defenders may need ...
Cofense Intelligence exposes how threat actors abuse Windows File Explorer and WebDAV servers to bypass browser security and ...
Fake antivirus app TrustBastion uses Hugging Face to deliver Android malware that captures screenshots, steals PINs and shows fake login screens, according to Bitdefender.
Kaspersky has detected a new malware for Android devices that it dubbed Keenadu. This malware is distributed in multiple ...
For now, it might not function outside of a lab Cybersecurity researchers say they've spotted the first Android malware strain that uses generative AI to improve performance once installed. But it may ...
Cisco Talos links UAT-9921 to VoidLink, a modular Zig-based malware targeting Linux cloud systems with stealth plugins and C2 control.
A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more.