Forgotten integrations, shadow IT, SaaS, and now shadow AI and agents are everywhere, and attackers don't need sophisticated ...
A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability ...
Vercel breached after attacker compromised Context.ai, hijacked an employee's Google Workspace via OAuth, and accessed ...
In today's security landscape, some of the most dangerous vulnerabilities aren't flagged by automated scanners at all. These ...
A Vercel employee's AI tool OAuth grant gave attackers access to internal systems via a four-hop kill chain. Here's what ...
This week, scam compounds. Attackers exploit flaws pre-disclosure. A crackdown on DDoS-for-hire. No Mythos for CISA, yes for ...
Stolen OAuth tokens, which are at the root of these breaches, "are the new attack surface, the new lateral movement," a ...
A new malware family named 'AgingFly' has been identified in attacks against local governments and hospitals that steal ...
The introduction of Anthropic's Mythos model signals a shift in the cybersecurity industry - one not yet fully understood, ...
The answer lies in the movement from the artisanal to the industrial. A human attacker, no matter how gifted, is a ...
The call came at a perfect time because Albert needed a payment reference number (PRN) from his SSS (social security service) but he was having a challenging time logging on to his app. The caller ...