Cybercriminals created a zero-day exploit with AI, the first example of artificial intelligence finding and hacking software ...
The company said that it had identified, for the first time, hackers using artificial intelligence to discover an unknown bug ...
Google Threat Intelligence Group details how cybercriminals attempted to launch a campaign based around an AI-developed ...
Dirty Frag, a critical Linux kernel zero-day vulnerability with no patch and giving hackers root, has gone public after an ...
The 2026 picoCTF competition has officially expanded with more challenges than ever before, yet the transition from the block-based logic of Karel to the raw Python scripting required for CTFs remains ...
Millions of students in universities and K-12 districts had their data compromised this week as a hack took down Canvas, a classroom management tool used all over the country.
The website for the popular JDownloader download manager was compromised earlier this week to distribute malicious Windows ...
After the CopyFail vulnerability gave root access from any user on almost all distributions last week, this week we’ve got DirtyFrag. This chains the vulnerability in CopyFail (xfrm-ESP) and ...
The attack on the Trellix source code repository disclosed last week has been claimed by the RansomHouse threat group, which ...
The PCPJack worm targets cloud environments and vulnerable web applications to remove TeamPCP infections and steal ...
New research exposes how prompt injection in AI agent frameworks can lead to remote code execution. Learn how these ...
ZiChatBot malware spread via 3 PyPI packages in July 2025 uses Zulip APIs as C2, enabling stealthy attacks across systems ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results