"Appearing to be aided by a large language model (LLM), the activity obfuscated its behavior within an SVG file, leveraging ...
We’ve all heard of Gen AI being used to craft bodies of convincing phishing emails, however Microsoft researchers have now discovered a campaign in which threat actors took AI use in phishing a step ...
Microsoft used AI-based tools in Defender for Office 365 to detect and block a phishing campaign in which Security Copilot determined the malicious code was likely written by a LLM, marking the latest ...
FileFix phishing attack in June 2025 delivers StealC malware via Bitbucket images, bypassing detection with obfuscation.
A new AsyncRAT malware campaign from threat actor TA558 is targeting the South American hospitality industry, demanding the ...
Microsoft Threat Intelligence stopped an AI-driven credential phishing campaign using SVG files disguised as PDFs ...
Hackers behind a phishing campaign appear to have used artificial intelligence-generated code to hide malware behind a wall ...
A malicious npm package named Fezbox has been found using an unusual technique to conceal harmful code. The package employs a ...
ESET researchers reveal how malware operators collaborate with covert North Korean IT workers, posing a threat to both headhunters and job seekers.
The code includes pre-loaded instructions to target 56 browser wallet extensions and is designed to extract private keys, credentials, and certificates.
IntroductionZloader (a.k.a. Terdot, DELoader, or Silent Night) is a Zeus-based modular trojan that emerged in 2015. Zloader was originally designed to facilitate banking, but has since been repurposed ...
Mandiant said it has tracked a Chinese-linked espionage campaign using BRICKSTORM malware to quietly embed within U.S.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results