When 500,000 Findings Hide 14 Real Threats Modern enterprises ingest vulnerability data from dozens of sources: endpoint ...
The discovery involves a vulnerable GitHub workflow, [GitHub’s automation scripts using one or more jobs using GitHub Actions ...
Researchers say a prompt injection bug in Google's Antigravity AI coding tool could have let attackers run commands, despite ...
The critical remote code execution flaw (CVE-2026-1731) in the remote monitoring and management tool can be exploited to ...
The prompt injection issue in the agentic AI product for filesystem operations was a sanitization issue that allowed for ...
Lovable's API exposed source code and database credentials for 48 days after the company closed a bug report. Up to 62% of AI ...
Autonomous SOC agents now shipping can rewrite firewall rules and modify IAM policies — outpacing the governance frameworks ...
CVE-2026-5760 (CVSS 9.8) exposes SGLang via /v1/rerank endpoint, enabling RCE through malicious GGUF models, risking server ...
Serial-to-IP converters are affected by potentially serious vulnerabilities that can expose OT and healthcare systems to ...
Cybersecurity researchers have discovered a critical "by design" weakness in the Model Context Protocol's (MCP) architecture ...
Proof-of-concept exploit code has been published for a critical remote code execution flaw in protobuf.js, a widely used ...
Threat actors are abusing external Microsoft Teams collaboration to impersonate IT helpdesk staff and convince users to grant ...