A team of researchers from UC Berkeley have demonstrated that eight AI agent benchmarks can be manipulated to produce ...
Commercial artificial intelligence tools were used as operational components in a cyber campaign that hit nine Mexican ...
A critical flaw in Python tool Marimo was exploited within 10 hours of disclosure, researchers report, highlighting how quickly attackers are now turning vulnerability advisories into real-world ...
OpenAI unveils its “Child Safety Blueprint” to combat rising AI-generated abuse, focusing on stronger laws, reporting systems, and safety-by-design.
Anthropic’s Project Glasswing unites major tech rivals to use Claude Mythos Preview to find and fix critical software ...
Infosecurity outlines key recommendations for CISOs and security teams to implement safeguards for AI-assisted coding ...
AI recruiting startup Mercor confirms supply chain attack via LiteLLM library compromise. Hackers claim 4TB of data including ...
iPhone users should be on alert: DarkSword spyware has been posted in the wild. Credit: Cheng Xin/Getty Images DarkSword, the web-based hacker tool that can be used to steal data from millions of ...
Resolv’s USR dollar stablecoin is trading at just $0.24 after an attacker minted 80 million unbacked tokens, forcing a full protocol pause and reopening fears over stablecoin risk. Resolv Labs has ...
At this bigger-than-ever GTC, Huang made it clear that Nvidia is gunning to command the levers of the entire AI factory hardware and software stack, though of course it’s leaving plenty of room for ...
Threat actors have demonstrated just how quickly they operate today after exploiting a critical open source vulnerability within 20 hours, working only from the advisory description. The bug, CVE-2026 ...
Security researchers have discovered another sophisticated iOS exploit kit and found evidence that it has been used by both state-sponsored hackers and commercial spyware vendors. A Russian ...