More

    Exploits

    Coinbase’s preferred AI coding tool can be hijacked by new virus

    Cybersecurity firm HiddenLayer has warned of a new virus that can inject malicious prompts into Cursor — an AI coding tool developers use...

    Hackers Trick AI Into Spreading Malware Through License Files

    Hackers Trick AI Into Spreading Malware Through License Files 

    Unknown miscreants snooping around Sitecore via sample keys

    Unknown miscreants are exploiting a configuration vulnerability in multiple Sitecore products to achieve remote code execution via a publicly exposed key and deploy snooping...

    PromptLock Ransomware Is Just a Research Project, But It’s Still Disturbing

    Don't miss out on our latest stories. Add PCMag as a preferred source on Google. It turns out that an AI-powered ransomware discovered last week...

    Mobile users face growing dangers as Hook v3 evolves into a ransomware, spyware, and trojan hybrid with unstoppable intrusion tactics

    (Image credit: Shutterstock / Who is Danny) Hook v3 uses fake Google Pay overlays to trick victims into surrendering sensitive card data Real-time screen streaming allows...

    Hackers Use Ethereum Smart Contracts to Hide Malware in npm Packages

    Hackers use Ethereum smart contracts to hide malware in npm packages, bypassing detection and spreading malicious code through open-source tools. 

    GhostRedirector Emerges as New China-Aligned Threat Actor

    A newly identified hacking group has compromised at least 65 Windows servers worldwide, primarily in Brazil, Thailand and Vietnam. According to ESET researchers, the group,...

    Hackers Using Ethereum Smart Contracts to Deliver Malware: Report

    In brief Public code libraries are being poisoned with malware that is being downloaded via Ethereum smart contracts. Software security firm ReversingLabs identified a sophisticated network...

    NYU Scientists Develop, ESET Detects First AI-Powered Ransomware

    Scientists at NYU developed a ransomware prototype that uses LLMs to autonomously to plan, adapt, and execute ransomware attacks. ESET researchers, not knowing about...

    Latest articles