News

APT28 targets Ukrainian government officials with a phishing campaign delivering LAMEHUG malware, utilizing Alibaba Cloud’s ...
North Korean hackers continue attacking open-source software via npm packages. 67 new malicious packages with XORIndex Loader ...
Nearly 900,000 passwords exposed through data breaches include "Florida," a common name that makes them easier to guess or hack. Here's what not to use.
Funded by a grant from the Department of Defense, a cybersecurity camp in Texas allows students to take part in exercises ...
Pop culture has embraced hackers with hit TV shows like Mr. Robot, and movies like Leave The World Behind. But perhaps the ...
The use of GitHub gave the malware-as-a-service (MaaS) a reliable and easy-to-use platform that’s greenlit in many enterprise ...
A novel malware family named LameHug is using a large language model (LLM) to generate commands to be executed on compromised ...
Ukraine’s CERT-UA has identified a new AI-powered malware, dubbed “LameHug,” which executes commands on compromised Windows ...
Newly published research shows that the domain name system—a fundamental part of the web—can be exploited to hide malicious ...
Recent attacks by the state-run cyberespionage group against Ukrainian government targets included malware capable of ...
OpenAI launched ChatGPT Agent, a new feature that lets the company's AI assistant complete multi-step tasks by controlling ...
Valuable tools for experienced attackers and researchers, LLMs are not yet capable of creating exploits at a prompt, ...