When 500,000 Findings Hide 14 Real Threats Modern enterprises ingest vulnerability data from dozens of sources: endpoint ...
The discovery involves a vulnerable GitHub workflow, [GitHub’s automation scripts using one or more jobs using GitHub Actions ...
Researchers say a prompt injection bug in Google's Antigravity AI coding tool could have let attackers run commands, despite ...
The critical remote code execution flaw (CVE-2026-1731) in the remote monitoring and management tool can be exploited to ...
The prompt injection issue in the agentic AI product for filesystem operations was a sanitization issue that allowed for ...
Lovable's API exposed source code and database credentials for 48 days after the company closed a bug report. Up to 62% of AI ...
Autonomous SOC agents now shipping can rewrite firewall rules and modify IAM policies — outpacing the governance frameworks ...
CVE-2026-5760 (CVSS 9.8) exposes SGLang via /v1/rerank endpoint, enabling RCE through malicious GGUF models, risking server ...
Serial-to-IP converters are affected by potentially serious vulnerabilities that can expose OT and healthcare systems to ...
Cybersecurity researchers have discovered a critical "by design" weakness in the Model Context Protocol's (MCP) architecture ...
Proof-of-concept exploit code has been published for a critical remote code execution flaw in protobuf.js, a widely used ...
Threat actors are abusing external Microsoft Teams collaboration to impersonate IT helpdesk staff and convince users to grant ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results