OpenAI releases GPT-5.5-Cyber with Trusted Access for Cyber, expanding controlled AI tools for advanced cybersecurity ...
Open source components continue to cause huge problems for security practitioners, and AIxCC was created to determine whether automation could help close the gap. At DEF CON 33, DARPA announced the ...
Unit 42, the research team at Palo Alto Networks, has identified a new malicious campaign targeting many financial organizations across Africa. The attackers, tracked as CL-CRI-1014, have been ...
It uses Opus 4.7 to scan, validate, and generate patches, helping fix dangerous flaws before they can be exploited.
Cisco Systems Inc. is rolling out a set of new features designed to help companies secure their artificial intelligence agents. The product enhancements made their debut today at the RSAC 2026 ...
The EU Cyber Resilience Act (CRA), adopted last year, aims to strengthen product security in several ways. One of its most ambitious goals is the elimination of exploitable vulnerabilities from ...
Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca. The Fog ransomware operation was ...
CyberStrikeAI lowers the barrier to complex cyberattacks by combining AI orchestration, MCP integration, and more than 100 offensive tools into a single, public GitHub repository. AI is making it ever ...
‘Most anti-phishing tools stop the attack at the email. That’s fantastic,’ says Kelvin Tegelaar , founder of CyberDrain. ‘But phishing doesn’t just come from email anymore. People get phone calls, SMS ...
Anthropic’s Project Glasswing unites major tech rivals to use Claude Mythos Preview to find and fix critical software ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results