Offensive security solutions firm HackerOne Inc. today announced the expansion of its artificial intelligence-driven offensive security platform. The updates includes the evolution of its Hai AI ...
A hacker has pulled off one of the most alarming AI-powered cyberattacks ever documented. According to Anthropic, the company behind Claude, a hacker used its artificial intelligence chatbot to ...
At the beginning of the month, Tesla was found partly liable in a wrongful death lawsuit involving the death of a pedestrian in Florida in 2019. The automaker—which could have settled the case for far ...
A hacker has exploited a leading artificial intelligence chatbot to conduct the most comprehensive and lucrative AI cybercriminal operation known to date, using it to do everything from find targets ...
Generative AI virtual assistant Amazon Q was unveiled by AWS CEO Adam Selipsky in 2023. Image: AWS A threat actor managed to insert a data-wiping prompt into Amazon’s AI coding assistant Q in July, ...
This has sent shockwaves across developer circles. As details continue to emerge, both the tech industry and Amazon's user base have responded with criticism, concern, and calls for transparency. It ...
A hacker managed to insert destructive system commands into Amazon’s Visual Studio Code extension used for accessing its AI-powered coding assistant, Q, which was later distributed to users through an ...
What if you could build a fully customized, professional-grade dashboard for Airtable without writing a single line of code? Imagine transforming Airtable’s functional yet rigid interface into a sleek ...
A notorious drug cartel enlisted a hacker who was able to infiltrate phone data and Mexico City's surveillance cameras to help track and kill FBI informants, the U.S. Justice Department has revealed.
The pro-Israel hacker collective Gonjeshke Darande released the full source code of Iranian crypto exchange Nobitex, just a day after orchestrating a $100 million exploit across multiple blockchains ...
A hacker targets other hackers, gamers, and researchers with exploits, bots, and game cheats in source code hosted on GitHub that contain hidden backdoors to give the threat actor remote access to ...
In the near future one hacker may be able to unleash 20 zero-day attacks on different systems across the world all at once. Polymorphic malware could rampage across a codebase, using a bespoke ...