While previous assessments categorized AI-assisted cyberattacks as experimental, current data suggests generative AI is now a mature, industrialized component of offensive operations.
Google says attackers are using AI for zero-day research, malware development, reconnaissance, and access to premium AI tools ...
The repository reached the #1 trending position on Hugging Face within 18 hours, highlighting how public AI repositories are ...
A malicious repository on Hugging Face impersonated OpenAI’s “Privacy Filter” project and briefly reached the platform’s top trending position before removal ...
Hugging Face hosts 352,000 unsafe model issues. ClawHub's registry contains 341 malicious AI agent skills. The AI supply chain is now the most attractive target in software security.
ZiChatBot malware spread via 3 PyPI packages in July 2025 uses Zulip APIs as C2, enabling stealthy attacks across systems ...
On April 30, two releases of one of the most popular machine learning libraries on the Python Package Index were caught ...
A single line of Python code was all it took. Developers who ran import lightning after installing versions 2.6.2 or 2.6.3 of ...
TL;DR Two malicious versions of the popular PyTorch Lightning package have been uploaded to PyPI following the publisher account’s compromise. Lightning versions 2.6.2 and 2.6.3 (tracked as ...
Every data-stealing virus requires a unique approach, but these are the essential first steps for reclaiming an infected device. Dashia is the consumer insights editor for CNET. She specializes in ...
Hackers are using WhatsApp messages to deliver malware to Windows PCs, exploiting user trust and attachments to trigger stealthy, multi-stage attacks. A new wave of attacks is turning trusted WhatsApp ...