Why language models are “lost” in conversation
A new paper from Microsoft Research and Salesforce found that even the…
22 Min Read
Zero-Day Exploits, Developer Malware, IoT Botnets, AI-powered scams
What do the source code editor, smart billboard, and web servers have…
27 Min Read
Beyond Benchmarks: Why AI ratings require reality checks
If you've been following AI recently, you may see headlines reporting the…
11 Min Read
Fake AI tool used to spread noodle malware targeting 62,000+ via Facebook lure
Threat actors are observed as lures to leverage fake artificial intelligence (AI)-equipped…
4 Min Read
Mirrorface targets Japan and Taiwan with RoamingMouse and upgraded Anel malware
The threat actor of the nation-state known as Mirror face It has…
4 Min Read
Qilin ransomware ranked best in April 2025 with 72 data leak disclosures
Threat actors with connections do The Ransomware family leverages the previously undocumented…
4 Min Read
Chinese hackers exploit SAP RCE Flaw CVE-2025-31324 to deploy Golang-based SuperShell
Unknown threat actor linked to China has been dubbed Chaya_004 It has…
3 Min Read
Dream 7B: How diffusion-based inference models reshape AI
Artificial intelligence (AI) has grown significantly, moving beyond basic tasks such as…
11 Min Read
Malicious NPM packages use backdoors to infect over 3,200 cursor users and steal qualifications
Cybersecurity researchers have flagged three malicious NPM packages designed to target the…
6 Min Read