Researchers demonstrated that it is feasible to encode executable payloads into synthetic DNA that, once sequenced and ...
Abstract: The rapid growth of malware and cyber threats demands intelligent methods for network traffic analysis. While machine learning (ML) techniques have shown high potential, their success is ...
Researchers at Google’s Threat Intelligence Group (GTIG) have discovered that hackers are creating malware that can harness the power of large language models (LLMs) to rewrite itself on the fly. An ...
A new strain of malware purpose-built to steal crypto wallet data is slipping past every major antivirus engine, according to Apple device security firm Mosyle. Dubbed ModStealer, the infostealer has ...
APT28, the state-sponsored threat group tied to Russian intelligence, is weaponizing Microsoft Outlook through a new backdoor researchers call "NotDoor." The backdoor malware was first identified by ...
Threat actors continue to exploit ToolShell to gain unauthorized access to on-premises SharePoint servers. On August 6, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a ...
Researchers from Cisco’s Talos security team have uncovered a malware-as-a-service operator that used public GitHub accounts as a channel for distributing an assortment of malicious software to ...
A novel malware family named LameHug is using a large language model (LLM) to generate commands to be executed on compromised Windows systems. LameHug was discovered by Ukraine’s national cyber ...
As the proportion of encrypted traffic increases, it becomes increasingly challenging for network attacks to be discovered. Although existing methods combine unencrypted statistical features, e.g., ...
Security researchers say Chinese authorities are using a new type of malware to extract data from seized phones, allowing them to obtain text messages — including from chat apps such as Signal — ...
A new variant of the Konfety Android malware emerged with a malformed ZIP structure along with other obfuscation methods that allow it to evade analysis and detection. Konfety poses as a legitimate ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results