Come for the coding test, stay for the C2 traffic Next.js developers are once again in the crosshairs as hackers seed ...
PromptSpy, discovered by ESET, is the first known Android malware to integrate generative AI into its execution flow.
A developer-targeting campaign leveraged malicious Next.js repositories to trigger a covert RCE-to-C2 chain through standard ...
Researchers warn malicious packages can harvest secrets, weaponize CI systems, and spread across projects while carrying a dormant wipe mechanism.
Open source has always had issues, but the benefits outweighed the costs/risks. AI is not merely exponentially accelerating tasks, it is disproportionately increasing risks.
LayerX, a security company based in Tel Aviv, says it has identified a zero-click remote code execution vulnerability in Claude Desktop Extensions that can be triggered by processing a Google Calendar ...
A malware sample recently caught in security vendor Darktrace’s CloudyPots honeypot network was entirely generated by AI and built to exploit the widespread and maximum-security React2Shell ...
A Linux-based command-and-control (C2) framework capable of long-term intrusion across cloud and enterprise environments has been further analyzed in new research. Known as VoidLink, the malware ...
claude-code-skills-factory/ ├── README.md # This file ├── CLAUDE.md # Repository guidance ├── AGENTS.md # Codex CLI documentation (auto-generated) ├── CHANGELOG.md # Version history ├── .claude/ │ ├── ...
The complete collection of Claude Code configs from an Anthropic hackathon winner. Production-ready agents, skills, hooks, commands, rules, and MCP configurations evolved over 10+ months of intensive ...
Threat hunters have disclosed details of a new, stealthy malware campaign dubbed DEAD#VAX that employs a mix of "disciplined tradecraft and clever abuse of legitimate system features" to bypass ...
More than 230 malicious packages for the personal AI assistant OpenClaw (formerly known as Moltbot and ClawdBot) have been published in less than a week on the tool’s official registry and on GitHub.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results