News

A max-severity RCE vulnerability in Erlang’s OTP SSH daemon, CVE-2025-32433, was actively exploited in OT networks across six ...
NeuralTrust says GPT-5 was jailbroken within hours of launch using a blend of ‘Echo Chamber’ and storytelling tactics that ...
Microsoft has assessed the vulnerability in Windows Server 2025 ( CVE-2025-53779 ) as “Exploitation Less Likely,” because an ...
A critical memory overflow bug in Citrix NetScaler devices is enabling remote code execution and DDoS attacks initially ...
The industry’s biggest annual get together offers CISOs insights into security researcher’s latest findings. From cloud ...
SafeBreach researchers demonstrate how attackers can crash Windows domain controllers and build a botnet using ...
AI dominated the conversation at Black Hat 2025, from the rise of autonomous agents and shadow AI to surging identity-based ...
Survey of 80 North American MSPs shows fragmented security stacks drive fatigue, missed threats, and business inefficiency.
Researchers from Zenity have found multiple ways to inject rogue prompts into agents from mainstream vendors to extract ...
Blockchain is emerging as a powerful tool for CISOs to close trust gaps in identity, audit and supply chain security.
Naor Haziz’s discovery shows how a compromised container on EC2-backed ECS tasks can impersonate the ECS agent and steal IAM ...
AI models, agentic frameworks, data pipelines, and all the tools, services, and open-source libraries that make AI possible ...