A max-severity vulnerability in the latest Python FastAPI version of the ChromaDB project allows unauthenticated attackers to ...
The Shai-Hulud malware leaked last week is now used in new attacks on the Node Package Manager (npm) index, as infected ...
Google reported the first confirmed AI-assisted zero-day exploit, raising new concerns about logic flaws, supply chain risk, ...
ReliaQuest observed attackers pairing ClickFix with the PySoxy proxy tool to establish redundant encrypted access paths and ...
The flaw allowed two-factor authentication to be bypassed if valid credentials were obtained, exploiting a hardcoded trust assumption. Google worked with the vendor to patch the issue before mass ...
Google's GTIG identified the first zero-day exploit developed with AI and stopped a mass exploitation event. The report documents state actors using AI for vulnerability research and autonomous ...
Google says attackers are using AI for zero-day research, malware development, reconnaissance, and access to premium AI tools ...
Historic AI exploit: Google says hackers used AI to create a zero-day 2FA bypass, marking the first recorded case of AI-built exploit generation in the wild. Attack stopped early: The planned mass ...
The repository reached the #1 trending position on Hugging Face within 18 hours, highlighting how public AI repositories are ...
A North Korean APT has crafted malicious software packages to appeal to AI coding agents, while ‘slopsquatting’ shows the security risks of hallucinated dependencies.