"Claude Opus 4.6 discovered 22 vulnerabilities over the course of two weeks. Of these, Mozilla assigned 14 as high-severity vulnerabilities —almost a fifth of all high-severity Firefox vulnerabilities ...
Your weekly cybersecurity roundup covering the latest threats, exploits, vulnerabilities, and security news you need to know.
Distributed through over 100 GitHub repositories, the BoryptGrab stealer targets browser, wallet, system, and other user data ...
Threat actors are operationalizing AI to scale and sustain malicious activity, accelerating tradecraft and increasing risk for defenders, as illustrated by recent activity from North Korean groups ...
Thousands of iPhones were compromised using the Coruna exploit kit, which chained 23 iOS vulnerabilities into advanced attacks used for espionage and cybercrime.
Operational penetration testing is a process of simulating real-world attacks on OT systems to identify vulnerabilities before cybercriminals can exploit them, either physically or remotely. OT ...
Google will start shipping fresh Chrome milestones every two weeks beginning with version 153 on Sept. 8, slicing its long-standing four-week cadence in half. The change spans desktop, Android, iOS, ...
Cybercriminals are exploiting AI chatbots to launch sophisticated hacking attacks, with hackers recently stealing 195 million identities from Mexican government agencies. Despite safeguards built into ...
A handful of anime series made a huge splash with fans when they first debuted, but these once-popular shows have been all ...
Generative AI tools analyzed target networks and wrote exploit code, enabling an opportunistic attacker to have an outsized ...
The Arkanix infostealer combines LLM-assisted development with a malware-as-a-service model, using dual language implementations to maximize reach and establish persistence.