IntroductionIn February 2022, BlackBasta emerged as a successor to Conti ransomware and quickly rose to prominence. BlackBasta was operational for three years until February 2025 when their internal ...
Android Package (APK) malformation has emerged as a standard Android malware evasion tactic, with the technique identified in more than 3000 malicious samples across families including Teabot, TrickMo ...
A design flaw – or expected behavior based on a bad design choice, depending on who is telling the story – baked into ...
Described by OpenAI as a new model tuned for defensive cybersecurity tasks, GPT-5.4-Cyber is being offered first to vetted ...
Hackers are exploiting a critical vulnerability in Marimo reactive Python notebook to deploy a new variant of NKAbuse malware ...
They may look complex, but AI-generated passwords often follow predictable patterns that hackers can exploit. I'll show you what to use instead.
PowMix targets Czech workforce since Dec 2025 using jittered C2 and ZIP phishing, enabling stealthy remote access and ...
Live Science on MSN
Hackers used Claude and ChatGPT to steal hundreds of millions of Mexican government records
A group of hackers used both Claude Code and ChatGPT in a cybersecurity hack that lasted two and a half months.
After Anthropic unveiled its Claude Mythos AI model, OpenAI introduced its own cybersecurity-focused model, GPT-5.4-Cyber.
The Microsoft Defender Security Research Team uncovered a sophisticated macOS intrusion campaign attributed to the North ...
A newly-designed AI-powered tool is effective in developing treatments to attack antibiotic-resistant bacteria by breaking ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results