Microsoft fixes 169 vulnerabilities including exploited SharePoint CVE-2026-32201, prompting CISA remediation by April 28, ...
Threat actors have started exploiting CVE-2025-59528, a critical Flowise vulnerability leading to remote code execution.
The design flaw in Flowise’s Custom MCP node has allowed attackers to execute arbitrary JavaScript through unvalidated ...
GlassWorm malware uses a Zig-based dropper to infect developer tools, stealing data and spreading across IDEs.
GlassWorm uses a fake WakaTime VS Code extension to infect IDEs, deploy RATs, and steal data, prompting urgent credential ...
The Internet Bug Bounty program has paused new submissions, citing a massive expansion in vulnerability discovery by AI code ...
With almost 175,000 npm projects listing the library as a dependency, the attack had a huge cascade effect and shows how quickly a compromised package can propagate through the ecosystem.
OpenAI's Codex desktop app now controls your Mac, runs its own browser, and generates images in a new update released today.
A data breach at the city attorney's office led to a massive cache of LAPD files being dumped online. Here's what we know ...
Anthropic announced today that its Claude Code and Claude Cowork tools are being updated to accomplish tasks using your computer. The latest update will see these AI resources become capable of ...
A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation.
If you have been in the music industry for even one month, Audacity will be nothing new. Audacity is one of the best professionally designed audio editing tools available for free on different ...