
25 mentions across press, blogs, and newsletters
It's a digital wolf in sheep's clothing.
Hackers are abusing steganography in PNG images to smuggle a Pulsar Remote Access Trojan (RAT) into Windows systems through a malicious NPM package named buildrunner‑dev. The attack starts with a typosquatted NPM package, buildrunner‑dev, which impersonates the abandoned “buildrunner”/“build-runn
The long-active Iranian threat group debuted various attack strains and payloads in attacks against organizations in the Middle East and Africa.
PromptSpy Android malware uses Gemini AI and Accessibility Services to maintain persistence, record activity, and evade normal malware removal.
Security researchers warn that many of the most popular Android apps — from free antivirus tools to weather and flashlight apps — engage in excessive data collection and pose real p
Describing India as "probably the fastest major economy in the world," he pointed to its strong universities and steady pipeline of engineers as key strategic advantages. ESET is expanding its presence in the country and is considering the possibility of setting up a research and development centre
Android threats may have just entered a new AI phase.
PromptSpy takes the guesswork out of Android device differences.
A new Android malware implant using Google Gemini to perform persistence tasks was discovered on VirusTotal and analyzed by ESET
PromptSpy is the first Android malware to abuse Google’s Gemini AI, enabling persistence and advanced spying features. Security researchers at ESET have uncovered PromptSpy, the first known Android malware to exploit Google’s Gemini AI to maintain persistence. The malware can capture lockscreen data
The malware leverages Gemini to analyze on-screen elements and ensure that it remains on the device even after a reboot. The post PromptSpy Android Malware Abuses Gemini AI at Runt
PromptSpy is a newly discovered Android malware family that abuses Google’s Gemini generative AI model to make real‑time decisions on how to manipulate the user interface and stay active on infected devices. PromptSpy’s AI‑assisted functionality is focused on persistence rather than initial infec
<img alt="Android AI malware" class="webfeedsFeaturedVisual wp-post-image" height="600" src="https://nerds.xyz/wp-content/uploads/
Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google's Gemini model to adapt its persistence across different devices. [...]
Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google's Gemini model to adapt its persistence across different devices. [...]
ESET researchers have uncovered the first known Android malware to incorporate generative AI directly into its execution flow. The malware, named PromptSpy, abuses Google’s Gemini model to dynamically manipulate the Android user interface and ensure its own persistence on infected devices. ESET r
'PromptSpy' appears to be the first Android malware that uses generative AI in its execution flow, according to antivirus provider ESET.
The real deal or another research project overblown? Cybersecurity researchers say they've spotted the first Android malware strain that uses generative AI to improve performance once installed. But it may be only a proof of concept.…
Save an unbelievable 50% on the ESET Home Security Ultimate plan.
Apple's iOS 26.4 sees its Stolen Device Protection anti-theft feature turned on by default. Here's what you need to know.
Threat actors are exploiting security gaps to weaponize Windows drivers and terminate security processes in targeted networks, and there may be no easy fixes in sight.
Espionage groups from China, Russia and other nations burned at least two dozen zero-days in edge devices in attempts to infiltrate defense contractors’ networks.
Apple has released iOS 26.3 fixing 39 security flaws — one of which is already being used in real-life attacks. Here's what you need to know.
Apple has released iOS 26.3 fixing 39 security flaws — one of which is already being used in real-life attacks. Here's what you need to know.
Researchers discovered Reynolds ransomware, which uses BYOVD technique to disable security tools and evade detection before encryption. Researchers found a new ransomware, named Reynolds, that implements the Bring Your Own Vulnerable Driver (BYOVD) technique to disable security tools and evade detec