Sri Lanka continues to face significant cybersecurity challenges, with 30.4% of internet users experiencing web-borne cyberattacks in 2025, according to the latest Kaspersky Security Bulletin. The ...
Researchers have identified the first known Android malware to use generative AI during execution. The malware queries Google’s Gemini model to adapt its behavior across different Android devices. It ...
An Android-specific malware targeting mobile device takeover appears to use generative AI (GenAI) services in its execution flows to maintain persistence on the victim’s smartphone, researchers at ...
If you use an Android phone, this deserves your attention. Cybersecurity researchers warn that hackers are using Hugging Face, a popular platform for sharing artificial intelligence (AI) tools, to ...
VoidLink, the recently discovered Linux malware which targets Linux-based cloud servers, was likely almost entirely generated by AI, researchers have said. First detailed by cybersecurity analysts at ...
The recently discovered cloud-focused VoidLink malware framework is believed to have been developed by a single person with the help of an artificial intelligence model. Check Point Research published ...
Stay safe with practical tips on safe game downloads, gaming malware, cheats, phishing scams gamers face, and safe mod downloads to protect accounts, devices, and in‑game items. Pixabay, MIH83 Safe ...
The MacSync Stealer macOS malware can now infect victims’ computers using what appears to be a legitimate application with minimal user interaction, according to Apple device management and security ...
Cyber criminals would much rather log in than hack in. That’s why infostealer malware, designed to exfiltrate user credentials, browser data, messages, documents, images, and device information, is ...
A new report out today from endpoint security firm Morphisec Inc. details a previously undocumented malware family dubbed “PyStoreRAT” that abuses trusted open-source platforms and Windows scripting ...
We are either at the dawn of AI-driven malware that rewrites itself on the fly, or we are seeing vendors and threat actors exaggerate its capabilities. Recent Google and MIT Sloan reports reignited ...