Anthropic has pulled back access to its Mythos AI model after the company’s internal security testers found it could identify exploitable software vulnerabilities with what they described as dangerous ...
The team behind the first public macOS kernel memory corruption exploit on M5 silicon has shared fresh details on how Mythos Preview helped bypass a five-year Apple security effort in five days.
The next wave of AI-powered cybersecurity attacks will be like nothing we’ve seen before.
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking.
The zero-day-to-n-day collapse is no longer theoretical, as demonstrated by CVE-2026-39987 in Marimo, which saw initial exploitation occur just nine hours and 41 minutes after disclosure without a ...
The four-year-old company is launching its first formal partner program to drive the next phase of growth for its offering, which helps to automate cyber defense with machine-readable threat data, ...
Six teams exploited Claude Code, Copilot, Codex, and Vertex AI in nine months. Every attack hit runtime credentials that IAM ...
Hugging Face hosts 352,000 unsafe model issues. ClawHub's registry contains 341 malicious AI agent skills. The AI supply chain is now the most attractive target in software security.
Google says threat actors likely used AI tools to identify and develop a zero-day exploit, marking what it describes as the ...