File-based malware has long been among the most effective attack vectors employed by threat actors worldwide. While ...
In a groundbreaking study published in BME Frontiers, researchers from the University of California, Los Angeles (UCLA), in ...
Security leaders share how artificial intelligence is changing malware, ransomware, and identity-led intrusions, and how defenses must evolve. SecurityWeek’s Cyber Insights 2026 examines expert ...
A new family of Android click-fraud trojans leverages TensorFlow machine learning models to automatically detect and interact with specific advertisement elements. The mechanism relies on visual ...
The NSA and the Cybersecurity and Infrastructure Security Agency have assessed that China is using an advanced malware family to access government agencies and technology companies, according to ...
A new attempt to influence AI-driven security scanners has been identified in a malicious npm package. The package, eslint-plugin-unicorn-ts-2 version 1.2.1, appeared to be a TypeScript variant of the ...
Leaving behind a decades-long legacy of threats to life, land mines continue to be used across conflict zones and surrounding areas. Globally, the challenge remains immense. A 2024 NATO report notes ...
ABSTRACT: The research aim is to develop an intelligent agent for cybersecurity systems capable of detecting abnormal user behavior using deep learning methods and ensuring interpretability of ...
Researchers at Google’s Threat Intelligence Group (GTIG) have discovered that hackers are creating malware that can harness the power of large language models (LLMs) to rewrite itself on the fly. An ...
A new Android malware family, Herodotus, uses random delay injection in its input routines to mimic human behavior on mobile devices and evade timing-based detection by security software. Herodotus, ...
Abstract: Malware continues to pose a serious threat to cybersecurity, especially with the rise of unknown or zero day attacks that bypass the traditional antivirus tools. This study proposes a hybrid ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results