Discover Microsoft’s holistic SDL for AI combining policy, research, and enablement to help leaders secure AI systems against evolving cyberthreats.
Hackers are targeting developers by exploiting the critical vulnerability CVE-2025-11953 in the Metro server for React Native ...
The hype around the exploits of centralized digital asset exchanges (CEX) and democratized digital asset exchanges (DEX) ...
Losses tied to crypto exploits declined over 60% from November levels, reaching $76 million in December 2025, PeckShield reported Thursday. The largest single incident resulted in a $50 million loss ...
The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for recently disclosed vulnerabilities. Previously spread through pirated software ...
AI-driven attacks on manufacturing security are increasing dramatically year over year, said Chaz Spahn, director of product management at Adaptiva, tells Design News. For instance, “40,000 ...
Chinese hackers automated 90% of an espionage campaign using Anthropic’s Claude, breaching four organizations of the 30 they chose as targets. "They broke down their attacks into small, seemingly ...
Artificial intelligence company Anthropic PBC today provided details of what it says is the first ever reported “AI-orchestrated cyber espionage campaign” that involved alleged Chinese state-sponsored ...
Balancer and Stream Finance incidents totaling over $200 million shook DeFi as RedStone and major Ethereum protocols launched reform initiatives. Balancer suffered one of the largest decentralized ...
A major vulnerability is the "patch gap"—the often-months-long delay between when software vendors release security fixes and when organizations actually install them. The race to find and fix ...
A new report out today from Google LLC’s Threat Intelligence Group warns that there has been a major shift in cybercrime as attackers are no longer using artificial intelligence solely for ...
Pixnapping could be used to steal private data, including 2FA codes. Side-channel attack abuses Google Android APIs to steal data on display. Flaw is partially patched, although a more complete fix is ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results