North Korean hacking group Konni is now targeting blockchain engineers with artificial intelligence-generated malware.
The North Korean hacker group Konni (Opal Sleet, TA406) is using AI-generated PowerShell malware to target developers and engineers in the blockchain sector.
A massive unsecured database exposed 149 million logins, raising concerns over infostealer malware and credential theft.
In a ‘Reverse Uno’ move, security researchers at CyberArk exploited a flaw in the backend of a cookie-stealing malware ...
Malwarebytes, which specializes in online protection, has launched a new enhanced scan engine for Mac users that the company says provides deeper coverage to hunt for threats anywhere on the hard ...
We are either at the dawn of AI-driven malware that rewrites itself on the fly, or we are seeing vendors and threat actors exaggerate its capabilities. Recent Google and MIT Sloan reports reignited ...
A new Android malware family, promoted as a Malware-as-a-Service (MaaS), has surfaced on Russian-speaking cybercrime forums, offering full device takeover and real-time fraud capabilities. Known as ...
Threat actors are testing malware that incorporates large language models (LLMs) to create malware that can evade detection by security tools. In an analysis published earlier this month, Google's ...
Researchers at Google’s Threat Intelligence Group (GTIG) have discovered that hackers are creating malware that can harness the power of large language models (LLMs) to rewrite itself on the fly. An ...
AI Microsoft CEO warns that we must 'do something useful' with AI or they'll lose 'social permission' to burn electricity on it AI Steam updates AI disclosure form to specify that it's focused on ...
Add Yahoo as a preferred source to see more of our stories on Google. This story was originally published on Cybersecurity Dive. To receive daily news and insights, subscribe to our free daily ...
A new Android banking Trojan called Herodotus mimics human behavior, such as random keystroke delays, to evade detection tools. The malware employs device-takeover tactics, including the abuse of ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results