Over 170 TanStack, Mistral AI, OpenSearch, UiPath, and other packages were affected in a new Mini Shai-Hulud supply chain ...
Google says attackers are using AI for zero-day research, malware development, reconnaissance, and access to premium AI tools ...
ShinyHunters-linked attackers defaced Canvas portals, disrupting finals week access and exposing SaaS security risks for ...
Google identified the first malicious AI use for a zero-day 2FA bypass in an open-source admin tool, accelerating threat ...
Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestrate ...
The attacks compromise aerospace and drone firms' systems to exfiltrate GIS files, terrain models, and GPS data to gain a clear picture of analysts' intel.
The “Copy Fail” Linux bug could impact crypto infrastructure that relies on Linux servers, highlighting growing cybersecurity ...
Between models from OpenAI and Anthropic, good things are happening to organizations that want to squish software bugs.
Forbes contributors publish independent expert analyses and insights. As we look ahead to 2026, the cybersecurity landscape is approaching a crucial stage where new technologies, changing threat ...
Critical cPanel flaw under attack, Copy Fail Linux privilege escalation, TeamPCP supply chain campaign, GitHub RCE & major ...
A single line of Python code was all it took. Developers who ran import lightning after installing versions 2.6.2 or 2.6.3 of ...
Malicious actors with code execution capability may gain root access on Linux systems using as few as 10 lines of Python, according to a researcher.