ESET Research attributes DynoWiper to the Russia-aligned threat group Sandworm with medium confidence. The incident is a rare ...
The RedKitten campaign distributes lures designed to target people seeking information about missing persons or political dissidents in Iran ...
Artistic initiatives turn cybersecurity into immersive exhibits at the Museum of Malware Art, transforming cyber threats into thought-provoking experiences ...
The North Korean hacker group Konni (Opal Sleet, TA406) is using AI-generated PowerShell malware to target developers and engineers in the blockchain sector.
While not everyone can be conned into thinking Aquaman has fallen in love with them via Facebook, our research round-up this week highlights just how convincing some of these scams can be, thanks to ...
None ...
The US used a cyberattack to turn off power in Caracas during the raid to seize Maduro. The US grid is also vulnerable to ...
Check Point Research says the Linux malware framework was authored largely through AI-driven processes, lowering the barrier to producing complex threats.
Researchers say the advanced framework was built almost entirely by agents, marking a significant evolution in the use of AI ...
VoidLink was built almost entirely using an AI agent that split itself into three development teams doing the equivalent of ...
A single developer built a Linux malware framework in less than a week using artificial intelligence, said security ...
Websites that authenticate users through links and codes sent in text messages are imperiling the privacy of millions of ...