Malefactors are actively attacking internet-facing Ray clusters and abusing the open source AI framework to spread a ...
A global campaign dubbed ShadowRay 2.0 hijacks exposed Ray Clusters by exploiting an old code execution flaw to turn them ...
The Google Threat Intelligence Group (GTIG) has released a report detailing a significant shift in cybersecurity, noting that hackers are no longer just using AI for assistance or writing code but are ...
North Korean state-sponsored threat actors, part of the infamous Lazarus Group, have been seen hosting malware and other ...
Chinese state-sponsored attackers used Anthropic’s Claude AI to automate 90% of an advanced cyber espionage campaign, ...
"The threat actors have recently resorted to utilizing JSON storage services like JSON Keeper, JSONsilo, and npoint.io to ...
Cybersecurity researchers have uncovered a chain of critical remote code execution (RCE) vulnerabilities in major AI ...
Huntress finds three GootLoader infections since Oct 27, 2025; two led to domain controller compromise within 17 hours.
Google has discovered a new breed of AI-powered malware that uses large language models (LLMs) during execution to ...
PROMPTFLUX: Experimental malware, a VBScript dropper with obfuscation, that abuses the Google Gemini API to dynamically rewrite its own source code. PROMPTLOCK: Another experimental strain of malware, ...
Researchers say the malware was in the repository for two weeks, advise precautions to defend against malicious packages.
The Gootloader malware loader operation has returned after a 7-month absence and is once again performing SEO poisoning to ...