May 2026 dropped three critical Linux vulnerabilities on a near-weekly cadence, and the security discourse has mostly treated them as three separate bad days. They’re not. Together they form a ...
Google reported the first confirmed AI-assisted zero-day exploit, raising new concerns about logic flaws, supply chain risk, ...
On May 11, the same day Google's Threat Intelligence Group disclosed the first confirmed case of attackers using AI to build ...
Microsoft flagged a Mistral AI hack as a supply-chain attack that hid malware in a fake AI library on PyPI. Here's what ...
Composer 2.5 brings stronger long running coding performance to Cursor, with targeted RL, Kimi K2.5 foundations, new pricing, ...
Google’s own hackers, Project Zero, have disclosed what they say was a Holy Grail Pixel 10 security vulnerability. Here’s ...
A 732-byte Python script has uncovered a significant vulnerability in the Linux kernel, affecting users worldwide. Explore ...
A recently patched local privilege escalation vulnerability in the Linux kernel's rxgk module now has a proof-of-concept exploit that allows attackers to gain root access on some Linux systems. Named ...
Storm-2949 turned stolen credentials into a cloud-wide breach, moving from identity compromise to large-scale data theft ...
Security startup Calif says researchers used a preview version of Anthropic's Claude Mythos AI to help build an Apple macOS ...
Pwn2Own Berlin 2026 participants earned a total of nearly $1.3 millon for exploits targeting Windows, Linux, VMware, Nvidia, ...
A legacy Windows scripting utility tied to Internet Explorer is still being used in modern malware campaigns, researchers say ...