The AI Attack Surface: How Agents Raise the Cyber Stakes
Researcher shows how agentic AI is vulnerable to hijacking to subvert an agent’s goals and how agent interaction can be…
Researcher shows how agentic AI is vulnerable to hijacking to subvert an agent’s goals and how agent interaction can be…
A recently disclosed security flaw impacting 7-Zip has come under active exploitation in the wild, according to an advisory issued…
Initially though to be a DDoS attack, the incident was actually due to a routine change in permissions that caused…
Cybersecurity researchers have disclosed details of a new campaign that leverages a combination of social engineering and WhatsApp hijacking to…
An intermittent outage at Cloudflare on Tuesday briefly knocked many of the Internet’s top destinations offline. Some affected Cloudflare customers…
It only takes recycled cans, copper, and cheap gadgets off the Web to trick a train conductor into doing something…
A newly discovered campaign has compromised tens of thousands of outdated or end-of-life (EoL) ASUS routers worldwide, predominantly in Taiwan,…
The challenge facing security leaders is monumental: Securing environments where failure is not an option. Reliance on traditional security postures,…
IT threat evolution in Q3 2025. Mobile statistics IT threat evolution in Q3 2025. Non-mobile statistics The quarter at a…
IT threat evolution in Q3 2025. Mobile statistics IT threat evolution in Q3 2025. Non-mobile statistics Quarterly figures In Q3…