PromptSpy, discovered by ESET, is the first known Android malware to integrate generative AI into its execution flow.
A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
Sample files for Azul are kept in a Simple Storage Service (S3) compatible binary large object (blob) store, and processed ...
Open source has always had issues, but the benefits outweighed the costs/risks. AI is not merely exponentially accelerating tasks, it is disproportionately increasing risks.
Threat actors compromised the Open VSX Registry on January 30, 2026, pushing malicious updates to four trusted VS Code extensions with over 22,000 combined downloads. The attack targeted macOS ...
Abstract: Java offers the Java Native Interface (JNI), which allows programs running in the Java Virtual Machine to invoke and be manipulated by native applications and libraries written in other ...
Typing a web address directly into your browser feels harmless. In fact, it feels normal. But new research shows that a simple habit is now one of the riskiest things you can do online. A recent study ...
A campaign involving 19 Visual Studio (VS) Code extensions that embed malware inside their dependency folders has been uncovered by cybersecurity researchers. Active since February 2025 but identified ...
What Happened: So, Google’s top security – Google’s Threat Intelligence Group, or GTIG – just found something that is frankly pretty terrifying. It’s a new type of malware they’re calling PROMPTFLUX.
Cybersecurity researchers have disclosed a new set of three extensions associated with the GlassWorm campaign, indicating continued attempts on part of threat actors to target the Visual Studio Code ...
AI malware may be in the early stages of development, but it’s already being detected in cyberattacks, according to new research published this week. Google researchers looked at five AI-enabled ...
Google’s Threat Intelligence Group reports that new malware strains use LLMs mid-execution to generate, rewrite, and obfuscate malicious code in real time. Threat actors are now actively deploying ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results