VULNERABILITY

RSAC 2026: AI Dominates, But Community Remains Key to Security

RSAC 2026: AI Dominates, But Community Remains Key to Security

Cybersecurity experts from all over the world came together for the RSAC 2026 Conference to talk about how digital security is changing This article.

Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication

Picking Up 'Skull Vibrations'? Could Be XR Headset Authentication

A group at Rutgers University showed off a new piece of biometric authentication software that works with extended reality (XR) headsets This article.

CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry

CrowdStrike Next-Gen SIEM Can Now Ingest Microsoft Defender Telemetry

Microsoft Defender for Endpoint was the first EDR solution to work with CrowdStrike's Falcon Next-Gen SIEM This article explores platform crowdstrike ceo.

Claude Source Code Leak Highlights Big Supply Chain Missteps

Claude Source Code Leak Highlights Big Supply Chain Missteps

More than half a million lines of source code for Anthropic's Claude Code package were made public by mistake This article explores attack software.

Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

Chainguard Unveils Factory 2.0 to Automate Hardening the Software Supply Chain

Chainguard launched Factory 2.0, a new version of its tool for handling hardened open-source images and secure software artifacts, components, and images.

AI Is Redefining Software Supply Chain Security

AI Is Redefining Software Supply Chain Security

AI-assisted development has made autonomous attacks a normal part of the threat landscape. As a result, AI has created what Manoj Nair calls a "governance.

AI bots are breaking the old ways of finding bots.

AI bots are breaking the old ways of finding bots.

As CEO of Approov, Ted Miracco is in charge of projects that protect mobile apps and API endpoints from automated threats This article explores automated.

The Future of Application Security: AI Bots, APIs & Identity Explained

The Future of Application Security: AI Bots, APIs & Identity Explained

Tim Chang from Thales says that bots are now "mimicking humans" well enough that old defenses aren't working as well This article explores data bots.

The rise of AI-driven code is making people rethink AppSec.

The rise of AI-driven code is making people rethink AppSec.

The speed at which AI is changing how software is made is something the industry never thought possible This article explores security testing gartner.

Storm Brews Over Critical, No-Click Telegram Flaw

Storm Brews Over Critical, No-Click Telegram Flaw

Discover how The vulnerability could affect about 1 billion people who use the popular chat app. Michael DePlante, a researcher with the Trend Micro Zero.

F5 BIG-IP Vulnerability Changed to RCE and Being Used

F5 BIG-IP Vulnerability Changed to RCE and Being Used

People are actively using a flaw in F5's BIG-IP application security product line in the wild This article explores attacks cve 2026. . On Saturday, F5.

Google Sets 2029 Deadline for Quantum-Safe Cryptography

Google Sets 2029 Deadline for Quantum-Safe Cryptography

By the end of 2029, Google says it will add post-quantum cryptography (PQC) to its products, services, and systems This article explores end 2029 google.

Langflow AI Platform Under Attack for Major Flaw

Langflow AI Platform Under Attack for Major Flaw

A serious flaw in Langflow, an open source framework for making AI agents, has been used in the real world This article explores vulnerabilities kev.

AI-Powered Dependency Decisions Add Security Bugs, Ignore Them

AI-Powered Dependency Decisions Add Security Bugs, Ignore Them

Sonatype's new research shows that "frontier" AI models often make wrong or made-up suggestions for software dependencies This article explores grounding.

Checkmarx KICS Code Scanner Hit in Widening Supply Chain

Checkmarx KICS Code Scanner Hit in Widening Supply Chain

Checkmarx said on Tuesday that attackers had broken into a version of Keeping Infrastructure as Code Secure (KICS), the open source static code analysis.

How AI Tools for Coding Broke down the Endpoint Security Fortress

How AI Tools for Coding Broke down the Endpoint Security Fortress

RSAC 2026 CONFERENCE – San Francisco – A lot of people think that artificial intelligence will change the game for cybersecurity, but one researcher.

Instead of the OpenClaw Deployer repo on GitHub, you get a Trojan.

Instead of the OpenClaw Deployer repo on GitHub, you get a Trojan.

Discover how A big AI-assisted campaign for an OpenClaw Docker deployer package is sending out more than 300 Trojanized GitHub packages that steal data.

Microsoft Suggests Better Identity and Safety for AI Agents

Microsoft Suggests Better Identity and Safety for AI Agents

Organizations' use of AI agents has greatly increased their attack surface, making them more vulnerable to new types of attacks. However, software and.

CISOs Debate Human Role in AI-Powered Security

CISOs Debate Human Role in AI-Powered Security

RSAC 2026 CONFERENCE IN SAN FRANCISCO: Do AI systems need a "human in the loop," or will people just slow things down This article explores security ai.

Trivy Supply Chain Attack Targets CI/CD Secrets

Trivy Supply Chain Attack Targets CI/CD Secrets

After hacking Trivy, a popular cloud security scanning tool, a threat actor is systematically going after cloud credentials, SSH keys, authentication.

CISOs Talk About the Role of People in AI-Powered Security

CISOs Talk About the Role of People in AI-Powered Security

At the RSAC 2026 Conference in San Francisco, the question was whether AI deployments need a "human in the loop" or if people will just slow things down.

Patch Now: Oracles Fusion Middleware Has a Serious RCE Flaw

Patch Now: Oracles Fusion Middleware Has a Serious RCE Flaw

This week, Oracle broke its usual patch cycle to tell people about a serious security hole in its Fusion Middleware This article explores attackers use.

AI Puzzle: Why Cant MCP Security Be Fixed?

AI Puzzle: Why Cant MCP Security Be Fixed?

Companies that are rushing to connect their LLM-powered apps to outside data sources and services using the Model Context Protocol (MCP) may be making.

Meta, TikTok Steal Users' Sensitive PII When They Click on Ads

Meta, TikTok Steal Users' Sensitive PII When They Click on Ads

Cybersecurity experts call software programs "infostealers" when they take people's information, like their credit card numbers, personally identifiable.

GlassWorm Malware Evolves to Hide in Dependencies

GlassWorm Malware Evolves to Hide in Dependencies

New research shows that the infamous GlassWorm malware has infected many more Open VSX software packages This article explores software glassworm. . Last.

What Orgs Can Learn From Olympics, World Cup IR Plans

What Orgs Can Learn From Olympics, World Cup IR Plans

In the most recent episode of our monthly Reporters' Notebook video series, Tara Seals from ZeroOwl, Sharon Shea from TechTarget Search Security, and.

Real-Time Banking Trojan Strikes Brazil's Pix Users

Real-Time Banking Trojan Strikes Brazil's Pix Users

A new Android-based banking Trojan is trying to steal mobile payments in Brazil as they are being sent This article explores banking trojan specifically.

Xygeni GitHub Action Compromised Via Tag Poison

Xygeni GitHub Action Compromised Via Tag Poison

This month, an unknown threat actor got into one of application security vendor Xygeni's GitHub Actions by poisoning a tag This article explores github.

Top 5 this week

Page 1 of 3