Technology

Why language models are “lost” in conversation

A new paper from Microsoft Research and Salesforce found that even the…

22 Min Read

Zero-Day Exploits, Developer Malware, IoT Botnets, AI-powered scams

What do the source code editor, smart billboard, and web servers have…

27 Min Read

Beyond Benchmarks: Why AI ratings require reality checks

If you've been following AI recently, you may see headlines reporting the…

11 Min Read

Fake AI tool used to spread noodle malware targeting 62,000+ via Facebook lure

Threat actors are observed as lures to leverage fake artificial intelligence (AI)-equipped…

4 Min Read

Mirrorface targets Japan and Taiwan with RoamingMouse and upgraded Anel malware

The threat actor of the nation-state known as Mirror face It has…

4 Min Read

Qilin ransomware ranked best in April 2025 with 72 data leak disclosures

Threat actors with connections do The Ransomware family leverages the previously undocumented…

4 Min Read

Chinese hackers exploit SAP RCE Flaw CVE-2025-31324 to deploy Golang-based SuperShell

Unknown threat actor linked to China has been dubbed Chaya_004 It has…

3 Min Read

Dream 7B: How diffusion-based inference models reshape AI

Artificial intelligence (AI) has grown significantly, moving beyond basic tasks such as…

11 Min Read

Malicious NPM packages use backdoors to infect over 3,200 cursor users and steal qualifications

Cybersecurity researchers have flagged three malicious NPM packages designed to target the…

6 Min Read