Darktrace researchers say hackers used AI and LLMs to create malware to exploit the React2Shell vulnerability to mine ...
KONNI is using AI-generated backdoors to target crypto bros ...
Google’s Gemini AI is being used by state-backed hackers for phishing, malware development, and large-scale model extraction attempts.
Findings show that the underground marketplace for illicit AI tools has matured, lowering the barrier for less sophisticated actors ...
A new malware strain which shows evidence of being largely developed using AI has been discovered, potentially ushering in a worrying new era of cybercrime. Check Point Research spotted and ...
Just a few years ago, several cybersecurity reports proclaimed that there was minimal evidence that bad actors were using generative AI tools to launch new or more sophisticated cyber attacks. Indeed, ...
Open source malware surged 73% in 2025, with npm as a key target with rising risks in software supply chains and developer environments.
VoidLink, the recently discovered Linux malware which targets Linux-based cloud servers, was likely almost entirely generated by AI, researchers have said. First detailed by cybersecurity analysts at ...
Russia's APT28 is actively deploying LLM-powered malware against Ukraine, while underground platforms are selling the same capabilities to anyone for $250 per month. Last month, Ukraine's CERT-UA ...
The North Korean hacker group Konni (Opal Sleet, TA406) is using AI-generated PowerShell malware to target developers and engineers in the blockchain sector. Based on samples analyzed by Check Point ...
A soon-to-be-released security evasion tool will help red teamers and hackers consistently bypass Microsoft Defender for Endpoint. But at this year's Black Hat conference in Las Vegas, Kyle Avery, ...
The industry-wide effort to AI all the things isn't without its seedy side. Namely, we're quickly entering an era of more sophisticated malware strains evading common antivirus protections, with ...