Malicious web content can be used to manipulate, deceive, and exploit autonomous AI agents navigating the internet, Google DeepMind researchers…
Browsing: researchers
Attackers could chain vulnerabilities together, leading to configuration changes or remote code execution.
Ravie LakshmananApr 02, 2026Cryptomining / Malware A financially motivated operation codenamed REF1695 has been observed leveraging fake installers to deploy remote access trojans (RATs)…
Telecommunications providers around the world have been dealing with the burrowing efforts of the China-linked APTs for many years now.…
A powerful iPhone hacking toolkit dubbed “DarkSword” has been used since November 2025 to compromise devices by exploiting zero-day iOS…
A vishing-as-a-service platform that helps scammers carry out so-called “press 1” scams is misusing text-to-speech (TTS) capabilities provided by AI…
Ravie LakshmananMar 11, 2026Artificial Intelligence / Browser Security Agentic web browsers that leverage artificial intelligence (AI) capabilities to autonomously execute…
Data transmissions from tire pressure sensors can be captured using low-cost equipment placed along roads to track drivers, academic researchers…
Researchers published the results of a study showing how AI search rankings can be systematically influenced, with a high success…
Ravie LakshmananFeb 17, 2026Malware / Artificial Intelligence Cybersecurity researchers have disclosed that artificial intelligence (AI) assistants that support web browsing…
