
45 mentions across press, blogs, and newsletters
<div clas
NordVPN or Surfshark? Compare speed, security, price, streaming, unique features, and more in our detailed 2026 VPN review. Find your match. The post Surfshark vs NordVPN (2026): Which VPN Wins? Full Breakdown app
Hackers targeted Poland’s National Centre for Nuclear Research, but security systems detected and blocked the attack before any damage. The National Centre for Nuclear Research in Poland reported a cyberattack on its IT infrastructure. The intrusion attempt was quickly detected by security systems,
Security firm ESET has introduced a brand new addition to its Threat Intelligence portfolio called eCrime Reports, that could potentially give security teams far deeper insight into ransomware and infostealer activity. The reports provide detailed data on how attacks unfold, offering information tha
The FBI is investigating malware hidden in Steam games, used for cryptocurrency mining and data theft by malicious developers exploiting the platform's open submission process. Valv
Disclosure: This article contains affiliate links. If you click through and make a purchase, we may earn a commission at no additional cost to you. This helps support our cont
Microsoft's March 2025 Patch Tuesday fixes 78 vulnerabilities including six actively exploited zero-days targeting NTFS, FAT file systems, Windows kernel, and Management Console. Se
A new technique dubbed "Zombie ZIP" helps conceal payloads in compressed files specially created to avoid detection from security solutions such as antivirus and endpoint detection and response (EDR) products. [...]
Cyber
AI an
After several years of using simple implants, the Russia-affiliated actor is back with two new sophisticated malware tools.
APT28 used BEARDSHELL and COVENANT malware to spy on Ukrainian military personnel, enabling long-term surveillance since April 2024. The Russia-linked group APT28 (aka UAC-0001, aka Fancy Bear, Pawn Storm, Sofacy Group, Sednit, BlueDelta, and STRONTIUM) has used BEARDSHELL and COVENANT malware to co
Russia-linked threat actor APT28 has reactivated its advanced malware development team with a modern espionage toolkit that combines the BeardShell implant with a heavily customized version of the open-source Covenant framework. APT28, also known as Fancy Bear and linked to Russia’s GRU Unit 2616
The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations. [...]
<div clas
Looking for a new antivirus? My tried and tested favorites will improve the security of your desktop PC, laptop, and mobile devices.
The technology giant and third-party security vendors are plo
Around 10 million people thought to be affected in 2024 TfL cyberattack.
The technology giant and third-party security vendors are plo
Looking for a new antivirus? My tried and tested favorites will improve the security of your desktop PC, laptop, and mobile devices.
It's a digital wolf in sheep's clothing.
Hackers are abusing steganography in PNG images to smuggle a Pulsar Remote Access Trojan (RAT) into Windows systems through a malicious NPM package named buildrunner‑dev. The attack starts with a typosquatted NPM package, buildrunner‑dev, which impersonates the abandoned “buildrunner”/“build-runn
The long-active Iranian threat group debuted various attack strains and payloads in attacks against organizations in the Middle East and Africa.
PromptSpy Android malware uses Gemini AI and Accessibility Services to maintain persistence, record activity, and evade normal malware removal.
Security researchers warn that many of the most popular Android apps — from free antivirus tools to weather and flashlight apps — engage in excessive data collection and pose real p
Describing India as "probably the fastest major economy in the world," he pointed to its strong universities and steady pipeline of engineers as key strategic advantages. ESET is expanding its presence in the country and is considering the possibility of setting up a research and development centre
Android threats may have just entered a new AI phase.
PromptSpy takes the guesswork out of Android device differences.
A new Android malware implant using Google Gemini to perform persistence tasks was discovered on VirusTotal and analyzed by ESET
PromptSpy is the first Android malware to abuse Google’s Gemini AI, enabling persistence and advanced spying features. Security researchers at ESET have uncovered PromptSpy, the first known Android malware to exploit Google’s Gemini AI to maintain persistence. The malware can capture lockscreen data
The malware leverages Gemini to analyze on-screen elements and ensure that it remains on the device even after a reboot. The post PromptSpy Android Malware Abuses Gemini AI at Runt
PromptSpy is a newly discovered Android malware family that abuses Google’s Gemini generative AI model to make real‑time decisions on how to manipulate the user interface and stay active on infected devices. PromptSpy’s AI‑assisted functionality is focused on persistence rather than initial infec
<img alt="Android AI malware" class="webfeedsFeaturedVisual wp-post-image" height="600" src="https://nerds.xyz/wp-content/uploads/
Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google's Gemini model to adapt its persistence across different devices. [...]
Researchers have discovered the first known Android malware to use generative AI in its execution flow, using Google's Gemini model to adapt its persistence across different devices. [...]
ESET researchers have uncovered the first known Android malware to incorporate generative AI directly into its execution flow. The malware, named PromptSpy, abuses Google’s Gemini model to dynamically manipulate the Android user interface and ensure its own persistence on infected devices. ESET r
'PromptSpy' appears to be the first Android malware that uses generative AI in its execution flow, according to antivirus provider ESET.
The real deal or another research project overblown? Cybersecurity researchers say they've spotted the first Android malware strain that uses generative AI to improve performance once installed. But it may be only a proof of concept.…
Save an unbelievable 50% on the ESET Home Security Ultimate plan.
Apple's iOS 26.4 sees its Stolen Device Protection anti-theft feature turned on by default. Here's what you need to know.
Threat actors are exploiting security gaps to weaponize Windows drivers and terminate security processes in targeted networks, and there may be no easy fixes in sight.
Espionage groups from China, Russia and other nations burned at least two dozen zero-days in edge devices in attempts to infiltrate defense contractors’ networks.
Apple has released iOS 26.3 fixing 39 security flaws — one of which is already being used in real-life attacks. Here's what you need to know.
Apple has released iOS 26.3 fixing 39 security flaws — one of which is already being used in real-life attacks. Here's what you need to know.
Researchers discovered Reynolds ransomware, which uses BYOVD technique to disable security tools and evade detection before encryption. Researchers found a new ransomware, named Reynolds, that implements the Bring Your Own Vulnerable Driver (BYOVD) technique to disable security tools and evade detec