Hackers behind a phishing campaign appear to have used artificial intelligence-generated code to hide malware behind a wall ...
A newly-discovered malicious package with layers of obfuscation is disguised as a utility library, with malware essentially ...
Newly discovered npm package 'fezbox' employs QR codes to hide a second-stage payload to steal cookies from a user's web ...
"Appearing to be aided by a large language model (LLM), the activity obfuscated its behavior within an SVG file, leveraging ...
Microsoft Threat Intelligence stopped an AI-driven credential phishing campaign using SVG files disguised as PDFs ...
Microsoft used AI-based tools in Defender for Office 365 to detect and block a phishing campaign in which Security Copilot determined the malicious code was likely written by a LLM, marking the latest ...
GitHub enforces FIDO 2FA and seven-day token limits after Shai-Hulud npm attack to boost supply chain security.
A malicious npm package named Fezbox has been found using an unusual technique to conceal harmful code. The package employs a ...
An infostealer particularly focused on stealing cryptocurrency wallet data from macOS, Windows and Linux users has been ...
ESET researchers reveal how malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers.
North Korean-linked crews connected to the pervasive IT worker scams have upped their malware game, using more advanced tools ...
We’ve all heard of Gen AI being used to craft bodies of convincing phishing emails, however Microsoft researchers have now discovered a campaign in which threat actors took AI use in phishing a step ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results