What is the best LLM for text, coding, vision, search, or X? LMArena knows, and the results may surprise you.

What is the best LLM for text, coding, vision, search, or X? LMArena knows, and the results may surprise you.

LMArena is a widely referenced platform that ranks large AI models across multiple areas—including text, coding, vision, and specialized tasks—using extensive human preference data. Its leaderboards reflect which models users find most capable in real-world tasks, based on head-to-head comparisons and live voting.
Hackers Leverage GitHub Repositories to Distribute Amadey Malware and Data Stealers, Bypassing Enterprise Filters

Hackers Leverage GitHub Repositories to Distribute Amadey Malware and Data Stealers, Bypassing Enterprise Filters

Recent cybersecurity intelligence has uncovered a significant trend: threat actors are now exploiting public GitHub repositories to host and disseminate the Amadey malware and various data-stealing tools. By leveraging the reputation and widespread access policies of GitHub, these attackers are successfully bypassing traditional web filters and security protocols in organizational networks.
Computer hacker with Android robot on desk

Google Files Lawsuit to Disrupt BadBox 2.0 Botnet Infecting Millions of Devices

Google has escalated its fight against cybercrime by filing a lawsuit in New York federal court, targeting the operators of the BadBox 2.0 botnet. This sophisticated malware campaign has compromised more than 10 million devices across the globe, making it one of the largest known networks of infected smart TV devices and other connected electronics.
Chinese state-backed threat actors target Taiwan’s semiconductor sector with Colbalt Strike and custom backdoors.

Chinese state-backed threat actors target Taiwan’s semiconductor sector with Colbalt Strike and custom backdoors.

Recent months have seen a significant escalation in cyber espionage campaigns targeting Taiwan’s vital semiconductor industry, attributed to Chinese state-backed threat actors. These sophisticated operations, reported from March through June 2025 and potentially ongoing, are believed to be aimed at acquiring proprietary technology, disrupting business operations, and gathering sector intelligence. The uptick in attacks aligns with China’s strategic drive for semiconductor self-sufficiency amid increasingly restrictive export controls imposed by the United States and its allies.
A sophisticated cyberattack campaign is actively exploiting a vulnerability in the Apache HTTP Server to deploy a cryptocurrency mining malware known as “Linuxsys.”

A sophisticated cyberattack campaign is actively exploiting a vulnerability in the Apache HTTP Server to deploy a cryptocurrency mining malware known as “Linuxsys.”

A sophisticated cyberattack campaign is actively exploiting a vulnerability in the Apache HTTP Server to deploy a cryptocurrency mining malware known as “Linuxsys.” Leveraging the CVE-2021-41773 flaw, attackers are compromising servers and covertly mining cryptocurrency, highlighting the risks posed by unpatched open-source software.
OpenAI, Anthropic, Meta, and Google researchers issue a joint warning about the potential loss of a critical AI safety feature that could cause AI to hide its true intentions and deliberately deceive.

OpenAI, Anthropic, Meta, and Google researchers issue a joint warning about the potential loss of a critical AI safety feature that could cause AI to hide its true intentions and deliberately deceive.

A united front of over 40 researchers from the world’s leading artificial intelligence organizations—OpenAI, Anthropic, Meta, and Google DeepMind—has issued a rare joint statement addressing urgent risks in the future of AI safety. These experts, typically rivals in the AI arms race, have sounded the alarm over the potential loss of a critical safety feature: the ability to monitor AI systems' inner reasoning, or "chain-of-thought."
A cybersecurity researcher has discovered a significant security lapse involving sensitive adoption records.

A cybersecurity researcher has discovered a significant security lapse involving sensitive adoption records.

Cybersecurity researcher Jeremiah Fowler has discovered a significant security lapse involving sensitive adoption records. Fowler identified an unprotected, publicly accessible database belonging to a prominent U.S. adoption agency. The database, left online without password protection or encryption, presented a major privacy risk to thousands of individuals involved in adoption cases.