AI as Cyberattacker
From Anthropic: In mid-September 2025, we detected suspicious activity that later investigation determined to be a highly sophisticated espionage campaign.…
From Anthropic: In mid-September 2025, we detected suspicious activity that later investigation determined to be a highly sophisticated espionage campaign.…
Can you ever imagine the impact on your business if it went offline on Black Friday or Cyber Monday due…
Operation WrtHug refers to a widespread compromise of end-of-life (EoL) ASUS routers, where attackers exploit previously disclosed vulnerabilities to gain…
A security vulnerability in the widely used 7-Zip file archiver has recently come under active exploitation. The flaw, identified as…
Heads up, Chrome users! An actively exploited zero-day vulnerability, CVE-2025-13223, has been identified in Google Chrome’s V8 JavaScript and WebAssembly…
Google has filed a complaint in court that details the scam: In a complaint filed Wednesday, the tech giant accused…
Fortinet has recently addressed two actively exploited zero-days in its FortiWeb web application firewall (WAF). These flaws, a command injection…
Kendra Albert gave an excellent talk at USENIX Security this year, pointing out that the legal agreements surrounding vulnerability disclosure…
Zero-day vulnerabilities sit at the center of many high-profile cyberattacks. Security teams race to defend their environments, while attackers exploit…
DoorDash says a social engineering attack led to a data breach exposing names, addresses, emails, and phone numbers of users,…