[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fZJzVYREiQ0S6nW3S0Cs-LmT4sG1I4S-jvnRvZQUxvMc":3},{"article":4,"iocs":44},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":24,"category":25,"article_tags":28},"44c67d31-b88f-4273-9f9c-3fb0cca77811","LatAm Vibe Hackers Generate Custom Hacking Tools on the Fly","latam-vibe-hackers-generate-custom-hacking-tools-on-the-fly-afc93e","In the latest evolution of automated cyberattacks, two threat campaigns heavily leveraged AI agents to support attacks against entities in Mexico and Brazil.","Two threat campaigns targeting entities in Mexico and Brazil are leveraging AI agents to dynamically generate custom hacking tools during attacks. This represents a significant evolution in automated cyberattacks, where attackers use generative AI to create bespoke malware and exploitation tools on-the-fly rather than relying on static pre-built payloads. The use of AI agents enables faster tool development and potentially evasion of traditional signature-based detection.","LatAm Vibe threat campaigns use AI agents to generate custom hacking tools targeting Mexico and Brazil.",null,"https:\u002F\u002Fwww.darkreading.com\u002Fcloud-security\u002Fai-agents-generate-custom-hacking-tools","https:\u002F\u002Feu-images.contentstack.com\u002Fv3\u002Fassets\u002Fblt6d90778a997de1cd\u002Fblt21f9c2318a5ab687\u002F6a038ac9398f1c61e4de8097\u002Fevil_robot_Anna_Vaczi_Alamy.jpg?width=1280&auto=webp&quality=80&disable=upscale","2026-05-13T13:00:00+00:00","2026-05-13T14:00:18.730205+00:00",7,[18,21],{"name":19,"type":20},"LatAm Vibe","threat_actor",{"name":22,"type":23},"AI agents","technology","839da5c1-3c34-47e2-9499-f7201640e3ac",{"id":24,"icon":11,"name":26,"slug":27},"AI Security","ai-security",[29,34,39],{"category":30},{"id":31,"icon":11,"name":32,"slug":33},"6cbdd207-aaa1-4176-9534-e156b125e917","Nation-state","nation-state",{"category":35},{"id":36,"icon":11,"name":37,"slug":38},"89f78b1c-3503-45a1-9fc7-e23d2ce1c6d5","Malware","malware",{"category":40},{"id":41,"icon":11,"name":42,"slug":43},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[]]