Search Articles

Search Results: ThreatIntelligence

Malware Enters the AI Age: Inside Google's Discovery of Self-Modifying Threats

Malware Enters the AI Age: Inside Google's Discovery of Self-Modifying Threats

Google Threat Intelligence Group (GTIG) reveals a critical shift: threat actors are now deploying AI-powered malware that dynamically rewrites its own code mid-attack to evade detection. State-sponsored groups and cybercriminals are weaponizing LLMs like Gemini and Qwen for real-time obfuscation, command generation, and social engineering, signaling a dangerous evolution beyond simple productivity abuse.
HexStrike-AI: How Hackers Weaponize Open-Source AI to Shrink the N-Day Exploitation Window

HexStrike-AI: How Hackers Weaponize Open-Source AI to Shrink the N-Day Exploitation Window

Threat actors are leveraging the open-source HexStrike-AI framework to automate the exploitation of critical Citrix vulnerabilities within hours of disclosure, collapsing patching windows from days to minutes. CheckPoint Research reveals nearly 8,000 systems remain exposed as AI-powered attacks democratize advanced offensive capabilities.