AIs can create complex zero-day exploits. The consequence: The search for security vulnerabilities is successfully industrialized and scaled.
Google Chrome is under cyber threat! On January 19, Google issued an urgent warning to all Chrome users worldwide and advised ...
Check Point Research has identified a coordinated attack campaign targeting CVE-2025-37164, a critical vulnerability in HPE ...
VulnCheck analysts found that vulnerabilities exploited before being publicly disclosed rose from 23.6% in 2024 to 28.96% in 2025 ...
Cloud-native applications have changed how businesses build and scale software. Microservices, containers, and serverless ...
Zoom and GitLab have released security updates to resolve a number of security vulnerabilities that could result in denial-of ...
A critical vulnerability in Cloudflare's Web Application Firewall (WAF) gave attackers easy access to otherwise protected ...
This week’s recap unpacks how evolving exploits, malware frameworks, and cloud missteps are reshaping modern cyber defense ...
The Microsoft Security Response Center, which researches various vulnerabilities and exploits, has reported that the North Korean cyber attack group ' Citrine Sleet (UNC4736) ' has exploited the ...
Anthropic has launched Cowork with a known data exfiltration vulnerability that researchers reported in October 2025 but ...