Threat actors have started exploiting CVE-2025-59528, a critical Flowise vulnerability leading to remote code execution.
The Internet Bug Bounty program has paused new submissions, citing a massive expansion in vulnerability discovery by AI code ...
The next wave of AI-powered cybersecurity attacks will be like nothing we’ve seen before. That’s the message AI company Anthropic sent in a leaked blog post last week, in which it warned that its ...
WhatsApp’s new “Private Inference” feature represents one of the most ambitious attempts to combine end-to-end encryption with AI-powered capabilities, such as message summarization. To make this ...
Over 1,000 exposed ComfyUI instances exploited via unauthenticated code execution, enabling Monero mining and botnet expansion.
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I ...
The program includes 24/7 threat monitoring for protocols with more than $10 million in deposits and a dedicated incident response network of security firms.
North Korea has relied on cryptocurrency theft as a consistent funding mechanism for years. Past major incidents include the ...
CVE-2025-59528 exploited in Flowise for over six months across 12,000+ exposed instances, enabling full system compromise.
Infosecurity outlines key recommendations for CISOs and security teams to implement safeguards for AI-assisted coding ...
Drift Protocol said the attackers posed as traders, met contributors in person, and spent months infiltrating before draining the platform.