Cyber Security

The case for fixing CWE weakness patterns instead of pa...

In this Help Net Security interview, Alec Summers, MITRE CVE/CWE Project Lead, d...

OpenAI opens applications for an external AI safety res...

OpenAI is accepting applications for a paid fellowship program that will fund ex...

Comp AI: The open-source way to get compliant with SOC ...

Getting a startup through a SOC 2 audit has long meant months of manual evidence...

GitHub Copilot CLI gets a second-opinion feature built ...

Coding agents make decisions in sequence: a plan is drafted, implemented, then t...

New GPUBreach Attack Enables Full CPU Privilege Escalat...

New academic research has identified multiple RowHammer attacks against high-per...

China-Linked Storm-1175 Exploits Zero-Days to Rapidly D...

A China-based threat actor known for deploying Medusa ransomware has been linked...

Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exp...

Threat actors are exploiting a maximum-severity security flaw in Flowise, an ope...

AI-Assisted Supply Chain Attack Targets GitHub

PRT-scan is the second in recent months where a threat actor appears to have lev...

Axios Attack Shows Social Complex Engineering Is Indust...

The attack on the popular NPM package Axios is just one of many targeting mainta...

Fortinet Issues Emergency Patch for FortiClient Zero-Day

The authentication bypass flaw, tracked as CVE-2026-35616, is the latest in a se...

Iran-Linked Password-Spraying Campaign Targets 300+ Isr...

An Iran-nexus threat actor is suspected to be behind a password-spraying campaig...

DPRK-Linked Hackers Use GitHub as C2 in Multi-Stage Att...

Threat actors likely associated with the Democratic People's Republic of Korea (...

Automated Credential Harvesting Campaign Exploits React...

An emerging threat cluster tracked as UAT-10608 is exploiting vulnerable Web-exp...

Multi-OS Cyberattacks: How SOCs Close a Critical Risk i...

Your attack surface no longer lives on one operating system, and neither do the ...

⚡ Weekly Recap: Axios Hack, Chrome 0-Day, Fortinet Exp...

This week had real hits. The key software got tampered with. Active bugs showed ...

Shadow AI in Healthcare is Here to Stay

Medical professionals are not going to stop using AI tools to manage growing wor...