While previous assessments categorized AI-assisted cyberattacks as experimental, current data suggests generative AI is now a mature, industrialized component of offensive operations.
Google says attackers are using AI for zero-day research, malware development, reconnaissance, and access to premium AI tools ...
Criminal hackers have used artificial intelligence to develop a working zero-day exploit, the first confirmed case of its ...
The repository reached the #1 trending position on Hugging Face within 18 hours, highlighting how public AI repositories are ...
Hugging Face hosts 352,000 unsafe model issues. ClawHub's registry contains 341 malicious AI agent skills. The AI supply chain is now the most attractive target in software security.
Quasar Linux (QLNX) is not an operating system, but a supply chain attack tool that is difficult to detect and remove.
ZiChatBot malware spread via 3 PyPI packages in July 2025 uses Zulip APIs as C2, enabling stealthy attacks across systems ...
A North Korean APT has crafted malicious software packages to appeal to AI coding agents, while ‘slopsquatting’ shows the ...
AI developer cloud company Runpod has announced Flash, an open source Python software development kit (SDK) designed to ...
Morning Overview on MSN
PyTorch Lightning versions 2.6.2 and 2.6.3 were compromised on April 30 — check your installs
On April 30, 2026, someone slipped credential-stealing malware into two freshly published versions of PyTorch Lightning, one ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results