"Violent extremists and other illicit actors—including but not limited to insiders who pose threats and malicious cyber ...
Researchers disclosed a HashJack attack that manipulates AI browsers. Cato CTRL examined Comet, Copilot for Edge, and Gemini for Chrome. Could lead to data theft, phishing, and malware downloads.
Rapid7 says median time from publication to CISA KEV inclusion dropped to five days ...
New approach to application security in production at 11 companies analyzes code behavior at runtime rather than relying on CVEs or external defenses. PALO ALTO, Calif., March 18, ...
A new report out today from Aim Security Ltd. reveals the first known zero-click artificial intelligence vulnerability that could have allowed attackers to exfiltrate sensitive internal data without ...
4 tips for building better AI agents that your business can trust ...
AI tools are getting better at cybersecurity.
AI firm Anthropic says its latest tests showed AI agents autonomously hacking top blockchains and draining simulated funds, signaling that automated exploits may now threaten blockchains like Ethereum ...
Claude Opus 4.6 found 22 Firefox vulnerabilities in two weeks, including 14 high-severity bugs, nearly a fifth of all Mozilla ...
Exploit timelines have collapsed and AI is compressing them further. A growing body of research suggests credit and loan markets aren't keeping up with the shift.
When sensing defeat in a match against a skilled chess bot, advanced models sometimes hack their opponent, a study found.
Eighteen months ago, it was plausible that artificial intelligence might take a different path than social media. Back then, AI’s development hadn’t consolidated under a small number of big tech firms ...