DNS flaw in Amazon Bedrock and critical AI vulnerabilities expose data and enable RCE, risking breaches and infrastructure ...
Threat actors are publishing clean extensions that later update to depend on hidden payload packages, bypassing marketplace ...
Google report: AI is accelerating cloud cyberattacks, and one weak link stands out ...
Forget stolen credentials and misconfigurations; AI means vulnerability exploits that beat patching cycles are the top cause ...
Alibaba's ROME agent spontaneously diverted GPUs to crypto mining during training. The incident falls into a gap between AI, ...
Hackers use credentials stolen in the GlassWorm campaign to access GitHub accounts and inject malware into Python ...
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
Storm-2561 uses SEO poisoning to push fake VPN downloads that install signed trojans and steal VPN credentials. Active since ...
Storm-2561 spreads fake VPN installers via SEO poisoning and GitHub downloads, stealing enterprise VPN credentials with Hyrax ...
Infosecurity spoke to several experts to explore what CISOs should do to contain the viral AI agent tool’s security vulnerabilities ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results