#vulnerabilities

[ follow ]
Software development
fromTheregister
1 hour ago

Anthropic's Project Glasswing CVE count is still guesswork

Anthropic's Mythos model is under testing by select companies to identify security vulnerabilities, but actual findings remain uncertain.
#fortinet
Information security
fromTheregister
5 hours ago

Critical Fortinet sandbox bugs allow auth bypass and RCE

Two critical vulnerabilities in Fortinet's sandbox allow unauthenticated attackers to bypass authentication or execute unauthorized code.
Information security
fromTheregister
5 hours ago

Critical Fortinet sandbox bugs allow auth bypass and RCE

Two critical vulnerabilities in Fortinet's sandbox allow unauthenticated attackers to bypass authentication or execute unauthorized code.
#microsoft
Information security
fromSecurityWeek
1 day ago

Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities

Microsoft's Patch Tuesday updates address 165 vulnerabilities, including a critical SharePoint zero-day exploit tracked as CVE-2026-32201.
Information security
fromZero Day Initiative
1 day ago

Zero Day Initiative - The April 2026 Security Update Review

Several critical vulnerabilities in Microsoft products require attention, particularly those related to Office, RDP, Active Directory, and .NET Framework.
Information security
fromTechRepublic
7 hours ago

Microsoft Issues Massive Windows Patch for 160+ Bugs, Including Two Zero-Days

Microsoft released a significant security update addressing 165 vulnerabilities, including two critical zero-days, marking one of the largest updates in its history.
Information security
fromSecurityWeek
1 day ago

Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulnerabilities

Microsoft's Patch Tuesday updates address 165 vulnerabilities, including a critical SharePoint zero-day exploit tracked as CVE-2026-32201.
Information security
fromZero Day Initiative
1 day ago

Zero Day Initiative - The April 2026 Security Update Review

Several critical vulnerabilities in Microsoft products require attention, particularly those related to Office, RDP, Active Directory, and .NET Framework.
#cybersecurity
Information security
fromThe Hacker News
9 hours ago

April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

Critical vulnerabilities in Adobe, Fortinet, Microsoft, and SAP products were highlighted in April's Patch Tuesday releases.
Information security
fromWIRED
5 days ago

Anthropic's Mythos Will Force a Cybersecurity Reckoning-Just Not the One You Think

Anthropic's Claude Mythos Preview model poses a significant threat to current cybersecurity defenses by autonomously discovering vulnerabilities and developing exploits.
Information security
from24/7 Wall St.
6 days ago

CrowdStrike CEO warns AI will trigger explosion of cyber attacks with shrinking patch windows

AI will significantly increase the speed of cyberattacks, reducing response time for organizations from days to minutes.
Information security
fromTNW | Anthropic
1 week ago

Anthropic's most capable AI escaped its sandbox and emailed a researcher - so the company won't release it

Anthropic's Claude Mythos Preview can autonomously find and exploit zero-day vulnerabilities, but will not be released publicly.
Information security
fromThe Hacker News
9 hours ago

April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

Critical vulnerabilities in Adobe, Fortinet, Microsoft, and SAP products were highlighted in April's Patch Tuesday releases.
Information security
fromWIRED
5 days ago

Anthropic's Mythos Will Force a Cybersecurity Reckoning-Just Not the One You Think

Anthropic's Claude Mythos Preview model poses a significant threat to current cybersecurity defenses by autonomously discovering vulnerabilities and developing exploits.
Information security
fromwww.theguardian.com
5 days ago

Anthropic's new AI tool has implications for us all whether we want it or not

A new AI model, Claude Mythos, poses significant cybersecurity threats by exploiting vulnerabilities in major software systems, potentially enabling widespread chaos.
Information security
from24/7 Wall St.
6 days ago

CrowdStrike CEO warns AI will trigger explosion of cyber attacks with shrinking patch windows

AI will significantly increase the speed of cyberattacks, reducing response time for organizations from days to minutes.
Information security
fromTNW | Anthropic
1 week ago

Anthropic's most capable AI escaped its sandbox and emailed a researcher - so the company won't release it

Anthropic's Claude Mythos Preview can autonomously find and exploit zero-day vulnerabilities, but will not be released publicly.
#ai-security
fromInfoQ
23 hours ago
Information security

Claude Code Used to Find Remotely Exploitable Linux Kernel Vulnerability Hidden for 23 Years

Artificial intelligence
fromTheregister
5 days ago

Project Glasswing and open source: The good, bad, and ugly

Project Glasswing aims to enhance open source software security with $100 million and the Mythos AI program to identify vulnerabilities.
Information security
fromThe Hacker News
5 days ago

Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

AI browser extensions pose significant security risks, often overlooked, with vulnerabilities and access that can compromise enterprise networks.
Information security
fromSecurityWeek
2 weeks ago

Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents

Palo Alto Networks revealed vulnerabilities in Google Cloud's Vertex AI, allowing attackers to exploit AI agents for malicious activities due to excessive permissions.
Information security
fromInfoQ
23 hours ago

Claude Code Used to Find Remotely Exploitable Linux Kernel Vulnerability Hidden for 23 Years

Claude Code identified multiple security vulnerabilities in the Linux kernel, including a long-standing heap buffer overflow, with minimal oversight required.
Artificial intelligence
fromAbove the Law
1 day ago

What Lawyers Need To Know About Anthropic's Mythos - Above the Law

Anthropic's new AI model, Claude Mythos, uncovers significant security vulnerabilities, raising concerns about its potential impact on cybersecurity.
Artificial intelligence
fromTheregister
5 days ago

Project Glasswing and open source: The good, bad, and ugly

Project Glasswing aims to enhance open source software security with $100 million and the Mythos AI program to identify vulnerabilities.
Information security
fromThe Hacker News
5 days ago

Browser Extensions Are the New AI Consumption Channel That No One Is Talking About

AI browser extensions pose significant security risks, often overlooked, with vulnerabilities and access that can compromise enterprise networks.
Information security
fromSecurityWeek
2 weeks ago

Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents

Palo Alto Networks revealed vulnerabilities in Google Cloud's Vertex AI, allowing attackers to exploit AI agents for malicious activities due to excessive permissions.
Information security
fromSecurityWeek
16 hours ago

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories

Multiple industrial giants have released new ICS security advisories addressing various vulnerabilities since the last Patch Tuesday.
Information security
fromSecurityWeek
1 day ago

Adobe Patches 55 Vulnerabilities Across 11 Products

Adobe's Patch Tuesday updates address 55 vulnerabilities across 11 products, with critical ColdFusion flaws requiring immediate attention.
Information security
fromThe Hacker News
1 day ago

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

Critical risk findings surged by nearly 400% amid a 52% increase in raw alert volume, driven by AI-assisted development.
Information security
fromSecurityWeek
1 day ago

Organizations Warned of Exploited Windows, Adobe Acrobat Vulnerabilities

CISA expanded its Known Exploited Vulnerabilities catalog with seven new vulnerabilities, including critical Windows and Adobe flaws.
#ai
fromFortune
2 days ago
Information security

Anthropic caused panic that Mythos will expose cybersecurity weak spots, but one industry veteran says real problem is fixing, not finding, them | Fortune

fromTechCrunch
3 days ago
Information security

Trump officials may be encouraging banks to test Anthropic's Mythos model | TechCrunch

Information security
fromPsychology Today
5 days ago

What If We Used AI to Detect Threats to Humanity?

AI model Mythos escaped its sandbox, demonstrating capabilities to find software vulnerabilities, raising concerns about technological risks and threat assessment.
Information security
fromSecuritymagazine
5 days ago

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Claude Mythos Preview enhances vulnerability detection but poses risks if misused by cybercriminals, prompting Anthropic to limit its public release.
Information security
fromFortune
2 days ago

Anthropic caused panic that Mythos will expose cybersecurity weak spots, but one industry veteran says real problem is fixing, not finding, them | Fortune

Anthropic's Claude Mythos Preview AI model identifies cybersecurity vulnerabilities, but experts question its impact on fixing existing issues.
Information security
fromTechCrunch
3 days ago

Trump officials may be encouraging banks to test Anthropic's Mythos model | TechCrunch

Bank executives are encouraged to use Anthropic's Mythos model to detect vulnerabilities, despite its limited access and ongoing legal issues.
Artificial intelligence
fromFast Company
4 days ago

Is Mythos a blessing or a curse for cybersecurity? It depends on whom you ask

Claude Mythos AI model may enhance cybersecurity defenses but also poses risks for hackers due to its ability to identify vulnerabilities and create exploits.
Information security
fromPsychology Today
5 days ago

What If We Used AI to Detect Threats to Humanity?

AI model Mythos escaped its sandbox, demonstrating capabilities to find software vulnerabilities, raising concerns about technological risks and threat assessment.
Information security
fromSecuritymagazine
5 days ago

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Claude Mythos Preview enhances vulnerability detection but poses risks if misused by cybercriminals, prompting Anthropic to limit its public release.
Information security
fromTechzine Global
2 days ago

Anthropic's Mythos preview: why the human layer matters more, not less

Anthropic's Mythos Preview autonomously discovers and exploits high-severity vulnerabilities, achieving a 72.4% success rate in exploit chaining.
Information security
fromSecurityWeek
5 days ago

Juniper Networks Patches Dozens of Junos OS Vulnerabilities

Juniper Networks released patches for multiple vulnerabilities, including severe flaws that could lead to privilege escalation and remote device takeover.
Information security
fromSecurityWeek
5 days ago

Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000

Google released Chrome 147, fixing 60 vulnerabilities, including two critical ones affecting WebML, with significant bug bounties awarded to researchers.
Software development
fromDevOps.com
6 days ago

Appknox Adds AI Tool to Detect and Fix Vulnerabilities in Mobile Applications - DevOps.com

Appknox introduces AI to assess mobile app vulnerabilities and recommend fixes, enhancing the patching process for software engineering teams.
Information security
fromSecurityWeek
6 days ago

Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities

Palo Alto Networks and SonicWall released patches for multiple vulnerabilities, including high-severity bugs that could allow unauthorized access and code execution.
#artificial-intelligence
Information security
fromThe Hacker News
1 week ago

Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

Anthropic's Project Glasswing uses Claude Mythos to identify and address cybersecurity vulnerabilities, surpassing human capabilities in some instances.
fromEngadget
1 week ago
Artificial intelligence

Anthropic launches Project Glasswing, an effort to prevent AI cyberattacks with AI

Information security
fromThe Hacker News
1 week ago

Anthropic's Claude Mythos Finds Thousands of Zero-Day Flaws Across Major Systems

Anthropic's Project Glasswing uses Claude Mythos to identify and address cybersecurity vulnerabilities, surpassing human capabilities in some instances.
Artificial intelligence
fromEngadget
1 week ago

Anthropic launches Project Glasswing, an effort to prevent AI cyberattacks with AI

Project Glasswing aims to enhance cybersecurity against AI threats with major tech partnerships and a new AI model from Anthropic.
#ai-cybersecurity
Information security
fromSecurityWeek
1 week ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
fromAxios
2 weeks ago
Information security

Everyone's worried that AI's newest models are a hacker's dream weapon

Information security
fromSecurityWeek
1 week ago

The New Rules of Engagement: Matching Agentic Attack Speed

AI-enabled cyberattacks are currently occurring, with significant impacts on organizations and a widening gap between attackers and defenders.
Information security
fromAxios
2 weeks ago

Everyone's worried that AI's newest models are a hacker's dream weapon

New AI models enable sophisticated cyberattacks, making businesses vulnerable as employees unknowingly assist hackers by using these technologies.
Django
fromDjango Project
1 week ago

Django security releases issued: 6.0.4, 5.2.13, and 4.2.30

Django releases 6.0.4, 5.2.13, and 4.2.30 address security issues; users should upgrade promptly.
#ransomware
Information security
fromSecurityWeek
1 week ago

Medusa Ransomware Fast to Exploit Vulnerabilities, Breached Systems

Medusa ransomware group rapidly exploits vulnerabilities, impacting critical sectors and employing double extortion tactics since June 2021.
#openclaw
Information security
fromArs Technica
1 week ago

OpenClaw gives users yet another reason to be freaked out about security

OpenClaw's vulnerabilities pose severe security risks, allowing attackers to gain administrative access with minimal permissions.
Information security
fromInfoWorld
1 week ago

CERT-EU blames Trivy supply chain attack for Europa.eu data breach

TeamPCP exploited Trivy to access sensitive cloud credentials and data, creating significant vulnerabilities for organizations.
Information security
fromSecurityWeek
1 week ago

Critical ShareFile Flaws Lead to Unauthenticated RCE

Two critical vulnerabilities in ShareFile could allow unauthenticated remote code execution through improper access to configuration pages.
#chrome
Information security
fromTechRepublic
1 week ago

Patch Now: Chrome Flaw Under Active Attack, Google Confirms

Google has released a security update for Chrome due to multiple high-severity vulnerabilities, including an actively exploited use-after-free flaw.
Information security
fromTechRepublic
1 week ago

Patch Now: Chrome Flaw Under Active Attack, Google Confirms

Google has released a security update for Chrome due to multiple high-severity vulnerabilities, including an actively exploited use-after-free flaw.
#cisco
Information security
fromSecurityWeek
1 week ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
Information security
fromSecurityWeek
2 weeks ago

Cisco Patches Multiple Vulnerabilities in IOS Software

Cisco released patches for high- and medium-severity vulnerabilities in IOS and IOS XE, primarily to prevent denial-of-service conditions.
Information security
fromSecurityWeek
1 week ago

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has released fixes for two critical and six high-severity vulnerabilities affecting various enterprise networking products.
Information security
fromSecurityWeek
2 weeks ago

Cisco Patches Multiple Vulnerabilities in IOS Software

Cisco released patches for high- and medium-severity vulnerabilities in IOS and IOS XE, primarily to prevent denial-of-service conditions.
Python
fromThe Hacker News
1 week ago

The State of Trusted Open Source Report

AI is reshaping software development and security, influencing container image usage and vulnerability management.
#google-chrome
Information security
fromTechRepublic
2 weeks ago

Google Issues High-Risk Security Patch for 3.5 Billion Chrome Users

Google has released a security update for Chrome addressing eight high-risk vulnerabilities affecting its 3.5 billion users.
Information security
fromTechRepublic
2 weeks ago

Google Issues High-Risk Security Patch for 3.5 Billion Chrome Users

Google has released a security update for Chrome addressing eight high-risk vulnerabilities affecting its 3.5 billion users.
fromComputerworld
2 weeks ago

Why the axios supply chain attack should have Apple worried

The attack illustrates the extent to which Big Tech relies on open-source software. Without the many contributions of open-source developers, Apple, Amazon, Google, Microsoft, and everyone else would need to invest vast sums in building more of the infrastructure of our digital world.
Information security
Information security
fromComputerWeekly.com
2 weeks ago

Banning routers won't fix what's already broken | Computer Weekly

The FCC's ban on foreign-made routers addresses future procurement, not current security risks, as routers are already vulnerable and widely deployed.
Soccer (FIFA)
fromTheregister
2 weeks ago

AFC Ajax drops ball as hackers transfer tickets, lift bans

AFC Ajax experienced a data breach due to vulnerabilities, exposing personal data and allowing unauthorized access to user accounts.
#tp-link
Information security
fromTechRepublic
2 weeks ago

TP-Link Fixes Bug That Lets Hackers Take Over Routers Without a Password

TP-Link patched critical vulnerabilities in Archer NX routers that allowed unauthorized firmware installation and network manipulation.
Information security
fromTechRepublic
2 weeks ago

TP-Link Fixes Bug That Lets Hackers Take Over Routers Without a Password

TP-Link patched critical vulnerabilities in Archer NX routers that allowed unauthorized firmware installation and network manipulation.
Information security
fromSecurityWeek
2 weeks ago

BIND Updates Patch High-Severity Vulnerabilities

ISC released BIND 9 updates to fix four vulnerabilities, including two high-severity bugs that can lead to memory leaks and high CPU consumption.
Node JS
fromThe Cyber Express
2 weeks ago

Node.js Fixes CVE-2026-21637 And Critical Flaws Now

Node.js has released security updates addressing multiple vulnerabilities, including critical issues in TLS error handling and HTTP request processing.
fromSecurityWeek
3 weeks ago

iOS, macOS 26.4 Roll Out With Fresh Security Patches

Apple's iOS 26.4 and iPadOS 26.4 updates include patches for nearly 40 security defects, addressing critical vulnerabilities that could be exploited by malicious actors.
Apple
Information security
fromComputerWeekly.com
3 weeks ago

Cyber pros must grasp the vibe coding nettle, says NCSC chief | Computer Weekly

Cyber security professionals must develop safeguards for AI-enhanced software generation to prevent vulnerabilities and cyber attacks.
Information security
fromTechRepublic
3 weeks ago

New 'DarkSword' Leak Puts Millions of iPhones at Risk After Initial Attack

The leaked DarkSword exploit kit poses a significant threat to outdated iPhones, making attacks easier for less experienced hackers.
Information security
fromTheregister
3 weeks ago

Lightning-fast exploits mean patch fast, says Cisco Talos

Strengthening MFA policies and enhancing anti-phishing training are critical as attackers exploit vulnerabilities rapidly and effectively.
Information security
fromSecurityWeek
3 weeks ago

QNAP Patches Four Vulnerabilities Exploited at Pwn2Own

QNAP released patches for multiple vulnerabilities, including four critical issues demonstrated at Pwn2Own 2025 affecting SD-WAN routers.
Information security
fromTheregister
3 weeks ago

Cryptographer fights RustSec ban over bug reports

Nadim Kobeissi filed a complaint against Rust maintainers over critical bugs in cryptography libraries after facing dismissal and bans.
Information security
fromSecurityWeek
3 weeks ago

Thousands of Magento Sites Hit in Ongoing Defacement Campaign

Over 7,500 Magento sites were defaced in a campaign exploiting file upload vulnerabilities, affecting global brands and various organizations.
fromThe Hacker News
1 month ago

Critical Flaws Found in Four VS Code Extensions with Over 125 Million Installs

CVE-2025-65717 (CVSS score: 9.1) - A vulnerability in Live Server that allows attackers to exfiltrate local files, tricking a developer into visiting a malicious website when the extension is running, causing JavaScript embedded in the page to crawl and extract files from the local development HTTP server that runs at localhost:5500, and transmit them to a domain under their control. (Remains unpatched)
Information security
fromSecurityWeek
2 months ago

Chrome 145 Patches 11 Vulnerabilities

Google on Tuesday announced the release of Chrome 145 to the stable channel with fixes for 11 vulnerabilities, including three high-severity bugs. First in line is CVE-2026-2313, a high-severity use-after-free issue in CSS that earned the reporting researchers an $8,000 bug bounty reward. The two other high-severity defects, tracked as CVE-2026-2314 and CVE-2026-2315, were found and reported by Google and are described as a heap buffer overflow in Codecs and an inappropriate implementation in WebGPU, respectively.
Information security
Information security
fromComputerWeekly.com
2 months ago

CVE volumes may plausibly reach 100,000 this year | Computer Weekly

Disclosed CVEs may exceed 50,000 in 2026, with realistic scenarios reaching 70,000–100,000 and an urgent need to scale and prioritise vulnerability response.
Information security
fromSecurityWeek
2 months ago

Google-Intel Security Audit Reveals Severe TDX Vulnerability Allowing Full Compromise

Google and Intel's joint review of Intel TDX uncovered five vulnerabilities and 35 bugs, leading to patches for privilege escalation and information disclosure issues.
fromThe Cyber Express
2 months ago

The Cyber Express Weekly Roundup: Jan 2026 Threats & Trends

On January 26, 2026, Delta, a Russian alarm and vehicle security provider, suffered a major cyberattack, disrupting alarms, vehicle systems, and company communications for tens of thousands of customers. While no confirmed customer data breach occurred, an unverified leak circulated online.
Information security
Information security
fromTechzine Global
2 months ago

Rapid adoption of AI agents exposes structural weakness in MCP

Lack of authentication in the Model Context Protocol left many MCP servers exposed, enabling unauthorized full system access and data breaches.
fromSecurityWeek
2 months ago

Access System Flaws Enabled Hackers to Unlock Doors at Major European Firms

Vulnerabilities discovered by researchers in Dormakaba physical access control systems could have allowed hackers to remotely open doors at major organizations. The security holes were discovered by experts at SEC Consult, a cybersecurity consulting firm under Atos-owned Eviden, in Dormakaba's Exos central management software, a hardware access manager, and registration units that enable entry via a keypad, fingerprint reader, or chip card.
Information security
fromTheregister
3 months ago

Meta admits to Instagram password reset mess, denies leaks

infosec in brief Meta has fixed a flaw in its Instagram service that allowed third parties to generate password reset emails, but denied the problem led to theft of users' personal information. Last Friday, security software vendor Malwarebytes claimed "Cybercriminals stole the sensitive information of 17.5 million Instagram accounts, including usernames, physical addresses, phone numbers, email addresses, and more." The vendor included a screenshot of a password reset email sent to Instagram users.
Information security
fromTechzine Global
3 months ago

Trend Micro closes critical vulnerabilities in Apex Central

The most serious, with a CVSS score of 9.8, allows attackers to execute code with SYSTEM privileges without authentication. Organizations should immediately patch to Build 7190. The most dangerous vulnerability, CVE-2025-69258, is a remote code execution vulnerability in LoadLibraryEX. An attacker can load a malicious DLL into a critical part of the system without login credentials. This gives them full control with the highest system privileges. The impact is significant: confidentiality, integrity, and availability are all at stake.
Information security
Information security
fromThe Hacker News
4 months ago

Picklescan Bugs Allow Malicious PyTorch Models to Evade Scans and Execute Code

Picklescan contains critical vulnerabilities that allow attackers to bypass detection and execute arbitrary code via malicious PyTorch models, enabling supply-chain attacks.
#fluent-bit
[ Load more ]