AI agents now act, decide, and access systems on their own — creating new blind spots Zero Trust can't see. Token Security ...
OpenAI's Atlas and Perplexity's Comet browsers are vulnerable to AI sidebar spoofing attacks that mislead users into ...
State-sponsored Iranian hacker group MuddyWater has targeted more than 100 government entities in attacks that deployed ...
Security researchers collected $792,750 in cash after exploiting 56 unique zero-day vulnerabilities during the second ...
North Korean Lazarus hackers compromised three European companies in the defense sector through a coordinated Operation DreamJob campaign leveraging fake recruitment lures.
A high-severity vulnerability in the now-abandoned async-tar Rust library and its forks can be exploited to gain remote code ...
Hackers are actively exploiting the critical SessionReaper vulnerability (CVE-2025-54236) in Adobe Commerce (formerly Magento) platforms, with hundreds of attempts recorded.
A spearphishing attack that lasted a single day targeted members of the Ukrainian regional government administration and ...
The FinWise breach shows that when insider threats strike, encryption is the last line of defense. Penta Security's D.AMO ...
Hackers believed to be associated with China have leveraged the ToolShell vulnerability (CVE-2025-53770) in Microsoft ...
CISA has confirmed that an Oracle E-Business Suite flaw tracked as CVE-2025-61884 is being exploited in attacks, adding it to ...
The operators of Vidar Stealer, one of the most successful malware-as-a-service (MaaS) operations of the past decade, have ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results