What if your romantic AI chatbot can’t keep a secret?
Does your chatbot know too much? Here's why you should think twice before you tell your AI companion everything.
Aggregating 2885 articles from trusted cybersecurity sources
Does your chatbot know too much? Here's why you should think twice before you tell your AI companion everything.
We’re releasing Slither-MCP, a new tool that augments LLMs with Slither’s unmatched static analysis engine. Slither-MCP benefits virtually every use case for...
The Trail of Bits cryptography team is releasing our open-source pure Go implementations of ML-DSA (FIPS-204) and SLH-DSA (FIPS-205), two NIST-standardized p...
Posted by Jeff Vander Stoep, Android Last year, we wrote about why a memory safety strategy that focuses on vulnerability prevention in new code quickly yiel...
Since its original release in 2009, checksec has become widely used in the software security community, proving useful in CTF challenges, security posturing,...
Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe
HTTP Anomaly Rank If you've ever used Burp Intruder or Turbo Intruder, you'll be familiar with the ritual of manually digging through thousands of responses ...
From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company
.content img { border: 1px solid black; } TL;DR The root cause of the hack was a rounding direction issue that had been present in the code for many years.
Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security
ESET Chief Security Evangelist Tony Anscombe highlights some of the key findings from the latest issue of the ESET APT Activity Report
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2 2025 and Q3 2025
Eurail B.V.
A hacker allegedly stole 10+ PB of sensitive military and aerospace data from China’s National Supercomputing Center, risking national security. A massive al...
In December 2025, hackers stole names and passport numbers from the European travel company’s network. The post 300,000 People Impacted by Eurail Data Breach...
Major luxury hotel and casino operator Wynn Resorts had information from 21,775 of its employees exfiltrated in a ShinyHunters-claimed attack, which was init...
Minnesota's Winona County will be receiving support from the state's National Guard in responding to a cyberattack earlier this week that has significantly c...
A buggy but functional proof-of-concept (PoC) exploit for an unpatched Windows local privilege escalation vulnerability dubbed BlueHammer has been published ...
In February, a hacker claimed the attack and said they stole 1.3 TB of data that included source code, database backups and Zendesk support tickets.
The LA Times reported that social media posts allegedly featuring information about the stolen material — some of which have since been taken down — revealed...
This is the seventh update to the TeamPCP supply chain campaign threat intelligence report,&#;x26;#;xc2;&#;x26;#;xa0;"When the Security Scanner Became the We...
Snowflake confirmed unusual activity impacting a small number of its customers, stating the attacks did not exploit vulnerabilities in its own systems.
Hackers are turning the Claude Code source leak into an active malware-delivery channel, using GitHub Releases to push the Vidar stealer and GhostSocks under...
Malicious actors have breached the official WordPress site for open-source decompiler ILSpy to compromise developers with malware as part of a new supply cha...