Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google's Gemini ...
PromptSpy Android malware abuses Google Gemini to analyze screens, automate persistence, block removal, and enable VNC-based ...
AI assistants like Grok and Microsoft Copilot with web browsing and URL-fetching capabilities can be abused to intermediate command-and-control (C2) activity.
Malware can blend in with legitimate AI traffic, using popular AI tools as C2 infrastructure.
Is that CAPTCHA you just encountered real? Find out how fake CAPTCHAs are installing hidden malware and how to stay safe.
APT stands for Advanced Persistent Threat. But what does that actually mean, and how does it translate into the kind of threat you’re facing?
ESET researchers have discovered PromptSpy, the first known Android malware to abuse generative AI in its execution flow to achieve persistence. It is the first time generative AI has been deployed in ...
GTIG finds threat actors are cloning mature AI models using distillation attacks Sophisticated malware can use AI to manipulate code in real time to avoid detection State-sponsored groups are creating ...
North Korea-linked ScarCruft’s Ruby Jumper uses Zoho WorkDrive C2 and USB malware to breach air-gapped systems for ...
There have been at least 1,900 ATM jackpotting incidents reported over the past six years, the Federal Bureau of Investigation said.
The hackers build fake personas to infiltrate companies as contractors and employees, relying on an organized pipeline to ...
A newly-uncovered malware targeting the Android operating system seems to exploit Google’s Gemini GenAI tool to help it maintain persistence.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results