While previous assessments categorized AI-assisted cyberattacks as experimental, current data suggests generative AI is now a mature, industrialized component of offensive operations.
Hundreds of packages across npm and PyPI have been compromised in a new Shai-Hulud supply-chain campaign delivering ...
Google says attackers are using AI for zero-day research, malware development, reconnaissance, and access to premium AI tools ...
Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate ...
The repository reached the #1 trending position on Hugging Face within 18 hours, highlighting how public AI repositories are ...
A malicious repository on Hugging Face impersonated OpenAI’s “Privacy Filter” project and briefly reached the platform’s top trending position before removal ...
Hugging Face hosts 352,000 unsafe model issues. ClawHub's registry contains 341 malicious AI agent skills. The AI supply chain is now the most attractive target in software security.
ZiChatBot malware spread via 3 PyPI packages in July 2025 uses Zulip APIs as C2, enabling stealthy attacks across systems ...
On April 30, two releases of one of the most popular machine learning libraries on the Python Package Index were caught ...
A single line of Python code was all it took. Developers who ran import lightning after installing versions 2.6.2 or 2.6.3 of ...
TL;DR Two malicious versions of the popular PyTorch Lightning package have been uploaded to PyPI following the publisher account’s compromise. Lightning versions 2.6.2 and 2.6.3 (tracked as ...
The malware steals credentials, installs a malicious browser extension, and can spread via USB drives. A recently discovered malware family capable of stealing credentials and of intercepting browser ...