The team behind the first public macOS kernel memory corruption exploit on M5 silicon has shared fresh details on how Mythos Preview helped bypass a five-year Apple security effort in five days.
Anthropic has pulled back access to its Mythos AI model after the company’s internal security testers found it could identify exploitable software vulnerabilities with what they described as dangerous ...
The four-year-old company is launching its first formal partner program to drive the next phase of growth for its offering, which helps to automate cyber defense with machine-readable threat data, ...
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking.
Google says threat actors likely used AI tools to identify and develop a zero-day exploit, marking what it describes as the ...
The zero-day-to-n-day collapse is no longer theoretical, as demonstrated by CVE-2026-39987 in Marimo, which saw initial exploitation occur just nine hours and 41 minutes after disclosure without a ...
Tesla, the renowned electric vehicle (EV) manufacturer, continues to prioritize cybersecurity through incentivizing white hat hackers. Recently, the automaker rewarded the hackers $200,000 cash on top ...
Researchers at Google Threat Intelligence Group (GTIG) say that a zero-day exploit targeting a popular open-source web ...
MAP Protocol paused its bridge between MAPO ERC-20 and mainnet MAPO after a reported exploit on Butter Bridge V3.1. Here's ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results