Hugging Face and ClawHub Abused in Active Malware Distribution Campaign
Threat actors abuse Hugging Face and ClawHub with social engineering to deliver AMOS stealer and credential-theft malware targeting AI developers.
Threat actors abuse Hugging Face and ClawHub with social engineering to deliver AMOS stealer and credential-theft malware targeting AI developers.
CVE-2026-25874 gives unauthenticated RCE in LeRobot (CVSS 9.8). Learn how unsafe deserialization in machine learning frameworks creates systemic risk.
That’s a lot . No, it’s an extraordinary number: Since February, the Firefox team has been working around the clock using frontier AI
Ryan Goldberg (Sygnia) and Kevin Martin (DigitalMint) sentenced to 4 years each for deploying BlackCat/ALPHV ransomware against US victims in 2023.
Anthropic's Claude Security initiative uses Claude Mythos Preview to help defenders find and patch vulnerabilities faster than AI-equipped attackers can exploit them.
Mandiant M-Trends 2026 and IBM X-Force data confirm AI has industrialized cybercrime — exploitation routinely precedes patching and 80% of ransomware now uses
EtherRAT deploys 44 spoofed GitHub repos to target enterprise admins with a blockchain-powered JavaScript RAT. Active since December 2025.
Vidar Stealer 2.0 detection guide: current YARA rules, Dead Drop Resolver C2 signatures, and post-compromise credential checklist for security teams.
BlueNoroff is using AI deepfakes in fake Zoom calls to deliver macOS malware to crypto executives. Learn the IOCs, attack chain, and detection
Claroty Team82 found two chained flaws in EnOcean SmartServer IoT — an ASLR bypass and RCE via IP-852 — exposing building automation networks