#ai-powered-malware

[ follow ]
Information security
fromThe Hacker News
1 week ago

Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India

Transparent Tribe uses AI-powered tools to generate high-volume, disposable malware in obscure programming languages, leveraging legitimate services for command and control to evade detection.
Information security
fromArs Technica
3 weeks ago

OpenClaw security fears lead Meta, other AI firms to restrict its use

OpenClaw poses significant security risks; organizations must restrict access, mitigate exposures immediately, and test in controlled environments to identify vulnerabilities.
Artificial intelligence
fromIT Pro
4 months ago

Google says leading AI malware strains are nowhere near good enough yet - but that won't last long as hackers refine techniques

Malware now uses AI during execution to adapt and regenerate code, enabling dynamic obfuscation and on-demand malicious functions.
fromAxios
4 months ago

Hackers are already using AI-enabled malware, Google says

Zoom in: Google's team found PromptFlux while scanning uploads to VirusTotal, a popular malware-scanning tool, for any code that called back to Gemini. The malware appears to be in active development: Researchers observed the author uploading updated versions to VirusTotal, likely to test how good it is at evading detection. It uses Gemini to rewrite its own source code, disguise activity and attempt to move laterally to other connected systems.
Information security
Information security
fromThe Hacker News
5 months ago

From Phishing to Malware: AI Becomes Russia's New Cyber Weapon in War on Ukraine

Russian-linked hackers increasingly use AI to create phishing messages and generate malware, raising incident counts and producing AI-developed stealers like WRECKSTEEL.
Information security
fromInfoWorld
6 months ago

Wave of npm supply chain attacks exposes thousands of enterprise developer credentials

A supply-chain attack on Nx and multiple malicious npm React packages used AI-powered post-install malware to steal developer credentials and enterprise secrets.
[ Load more ]