Today > 5 Critical | 6 High | 28 Medium vulnerabilities - You can now download lists of IOCs here!
1 attack reports | 0 vulnerabilities
Threat actors are using fake AI image and video generators to distribute Lumma Stealer and AMOS information-stealing malware on Windows and macOS. These malicious programs masquerade as an AI application called EditProAI, targeting users through search results and social media advertisements. The m…