A structured framework helps organizations gain visibility into unapproved AI tools employees are using while providing a clear path for safe adoption.
The patch batch includes a critical DNS client memory corruption bug and an AMD processor flaw affecting Zen 2 products.
Modern phishing attacks bypass traditional filters by mimicking legitimate behavior, requiring SOC teams to use interactive analysis to identify and…
Attackers inject fake Google Tag Manager scripts into WooCommerce checkout pages through an unpatched Funnel Builder plugin flaw to steal…
Attackers can chain multiple critical bugs in n8n's HTTP Request, Git, and XML nodes to fully compromise automation servers.
Researchers earned $385,750 on day two of Pwn2Own Berlin by chaining three flaws to fully compromise Microsoft Exchange and exploiting…
Active exploitation of a critical NGINX vulnerability began within days of disclosure, with over 5 million potentially exposed servers worldwide.
The Avada Builder plugin flaws allow low level users to read server files and unauthenticated attackers to steal database credentials.
A critical out-of-bounds read vulnerability in Ollama allows remote attackers to leak process memory, exposing API keys and user conversations.
Four npm packages from the same publisher deliver a DDoS botnet and credential stealing malware, with one containing a near…
Linux kernel maintainers are implementing new quality standards and triage rules to filter AI generated bug reports that have been overwhelming the project's security mailing list.
Fast16 malware manipulated nuclear weapons simulation software to make engineers believe their virtual detonation tests were failing, stalling weapons development…
A parsing flaw in Claude Code's deeplink handler allowed attackers to inject malicious hooks that execute commands automatically when a…
Organizations using on premises Exchange Server are urged to patch an XSS flaw in Outlook Web Access that CISA confirms…
A new webinar from Wiz explains how attackers chain together small coding bugs and cloud misconfigurations to access sensitive data, and how teams can break that path.
The Dead.Letter vulnerability affects Exim mail server versions 4.97 through 4.99.2 compiled with GnuTLS, enabling heap corruption via a crafted BDAT SMTP sequence.
Google uncovered a criminal campaign in which an AI system was used to discover a zero day vulnerability and generate exploit code for mass exploitation of a popular administration tool.
The open-source release of a credential-stealing worm has triggered a wave of copycat attacks targeting developer environments and cloud infrastructure.
MicroStealer malware uses Discord webhooks to exfiltrate credentials and cryptocurrency wallet data from education and telecom targets with low detection…
An unauthenticated buffer overflow in the PAN-OS authentication portal allows remote attackers to execute arbitrary code with root privileges, with…
Flare researchers analyzed 128 underground posts revealing REMUS malware's rapid evolution from a simple stealer to a full commercial MaaS…
Cybercriminals are using phishing and email compromise techniques, traditionally associated with ransomware, to steal truckloads of freight worth hundreds of…
Microsoft's new Cloud Initiated Driver Recovery automatically rolls back faulty Windows drivers delivered through Windows Update, removing the need for…
Microsoft will patch Edge to stop decrypting saved credentials into process memory at startup, reversing its earlier position that the…
Sign in to your account