During a recent penetration test, we came across an AI-powered desktop application that acted as a bridge between Claude ...
The Cybersecurity and Infrastructure Security Agency (CISA) is warning that hackers are actively exploiting a critical ...
Attackers weaponized critical RCE within hours, prompting CISA to add the flaw to its KEV catalog and set an urgent patch ...
A new info-stealing malware named Infinity Stealer is targeting macOS systems with a Python payload packaged as an executable using the open-source Nuitka compiler.
AI agents can provide enormous benefits, but they can also behave a lot like malware, acting autonomously and causing harm if ...
From the outside, it looks like an AI success story. Days later, a different picture emerges. The initial activity was only one part of a broader intrusion moving through an unknown third-party ...
A cyber attack hit LiteLLM, an open-source library used in many AI systems, carrying malicious code that stole credentials ...
Threat actors abused trusted Trivy distribution channels to inject credential‑stealing malware into CI/CD pipelines worldwide ...
A new hacking group has been rampaging the Internet in a persistent campaign that spreads a self-propagating and never-before ...