The real leap in Anthropic's and OpenAI's latest cyber-capable models isn't that they can hack in entirely new ways, but that ...
Claude Mythos discovered vulnerabilities that survived 27 years of human review. This technical breakdown covers how it works ...
Anthropic's latest model needs to be kept under lock and key, but for how long?
AI models are making rapid gains in vulnerability research and exploit development, raising new cybersecurity risks, a ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I ...
In a new proof-of-concept, endpoint security provider Morphisec showed that the Exploit Prediction Scoring System (EPSS), one of the most widely used frameworks for assessing vulnerability exploits, ...
Hackers have been unsuccessfully targeting CVE-2023-33538, a vulnerability in discontinued TP-Link routers, for a year.
Analysis Finds 1% of Vulnerabilities Were Exploited in the Wild in 2025 and Identifies the 50 Most Routinely Targeted Flaws of Last Year VulnCheck, the exploit intelligence company, today released the ...
AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones. On March 10, 2026, Microsoft patched ...
LayerZero attributes $292M KelpDAO rsETH breach to Lazarus Group, exploiting DVN infrastructure flaws in cross-chain ...
A critical Adobe Acrobat zero-day has been exploited for months via malicious PDFs to steal data and potentially take over ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I'm not explaining how this works.” ...