AIs can create complex zero-day exploits. The consequence: The search for security vulnerabilities is successfully industrialized and scaled.
Check Point Research has identified a coordinated attack campaign targeting CVE-2025-37164, a critical vulnerability in HPE ...
VulnCheck analysts found that vulnerabilities exploited before being publicly disclosed rose from 23.6% in 2024 to 28.96% in 2025 ...
Google Chrome is under cyber threat! On January 19, Google issued an urgent warning to all Chrome users worldwide and advised ...
A critical vulnerability in Cloudflare's Web Application Firewall (WAF) gave attackers easy access to otherwise protected ...
Anthropic has launched Cowork with a known data exfiltration vulnerability that researchers reported in October 2025 but ...
The hype around the exploits of centralized digital asset exchanges (CEX) and democratized digital asset exchanges (DEX) ...
Zoom and GitLab have released security updates to resolve a number of security vulnerabilities that could result in denial-of ...
The Microsoft Security Response Center, which researches various vulnerabilities and exploits, has reported that the North Korean cyber attack group ' Citrine Sleet (UNC4736) ' has exploited the ...
It has been revealed that it is possible to gain root privileges by exploiting a vulnerability in the virtual machine protection technology installed in AMD CPUs. The attack method in question was ...