Supply chain vulnerabilities and AI-powered phishing attacks are the latest trends in cybersecurity threats, says a new ...
Cogent Security boasts an all-star AI team—and is promising to close the gap between finding software flaws and actually fixing them.
Underground Telegram channels shared SmarterMail exploit PoCs and stolen admin credentials within days of disclosure. Flare explains how monitoring these communities reveals rapid weaponization of CVE ...
Vulnerabilities in PDF platforms from Foxit and Apryse could have been exploited for account takeover, data exfiltration, and ...
SecureLayer7 Blackf0g researcher team A critical RCE vulnerability in n8n has been identified and patched. n8n’s AI ...
China’s Tianfu Cup hacking contest made its return in 2026, now overseen by the government and marked by limited transparency.
This year should break all the records in terms of vulnerability disclosed, reaching or even surpassing 50,000 new CVEs ...
Microsoft's February Patch Tuesday release addresses 58 vulnerabilities across Windows, Office and several other products, ...
The National Institute of Standards and Technology is preparing to shift its role in the globally-adopted vulnerability ...
Responsible disclosure is built on an assumption that “doing the right thing” will be met with timely action, fair treatment, and professional respect, if not a bounty award. Increasingly, that ...
Lucid Motors has already launched two EVs and is preparing for its third, a compact crossover rivaling the Tesla Model Y. However, the EV startup has disappointed its customers with buggy software, ...