Anthropic's Mythos AI discovered over 2,000 unknown software vulnerabilities in seven weeks, prompting the company to ...
When 500,000 Findings Hide 14 Real Threats Modern enterprises ingest vulnerability data from dozens of sources: endpoint ...
Threat actors have been exploiting the BlueHammer Microsoft Defender vulnerability as a zero-day to gain System privileges.
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I'm not explaining how this works.” ...
CVE-2026-33626 exploited within 13 hours of disclosure, enabling SSRF-based cloud credential theft and internal scanning.
If your security team is drowning in vulnerabilities, that’s math done wrong. Prioritize your risk with the right vulnerability assessment tool. Here’s why? The volume of vulnerabilities has exploded ...
Microsoft fixes 169 vulnerabilities including exploited SharePoint CVE-2026-32201, prompting CISA remediation by April 28, ...
Hackers have been unsuccessfully targeting CVE-2023-33538, a vulnerability in discontinued TP-Link routers, for a year.
DeFi leaders say that AI will arm both attackers and defenders, and widen the gap between projects that prioritize security ...
In the wake of Anthropic’s initiative to make its Claude Mythos vulnerability discovery tool available to select IT and ...
In a new proof-of-concept, endpoint security provider Morphisec showed that the Exploit Prediction Scoring System (EPSS), one of the most widely used frameworks for assessing vulnerability exploits, ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I ...