Google's GTIG identified the first zero-day exploit developed with AI and stopped a mass exploitation event. The report documents state actors using AI for vulnerability research and autonomous ...
Google identified the first malicious AI use for a zero-day 2FA bypass in an open-source admin tool, accelerating threat ...
Google says attackers are using AI for zero-day research, malware development, reconnaissance, and access to premium AI tools ...
Whether you want simple fire-and-forget alerts or full two-way control, here's how to securely wire your AI agent into Slack.
Microsoft’s Azure-based AI development and deployment platform shines with a strong selection of models and agent types and ...
A cybercriminal group came close to launching a mass attack earlier this year, armed with a software exploit that an AI model ...
New research exposes how prompt injection in AI agent frameworks can lead to remote code execution. Learn how these ...
Google says hackers used AI to help build a zero-day exploit targeting 2FA, raising concerns about AI-assisted hacking.
PCPJack makes innovative use of parquet files for stealthy, pre-validated target discovery as it canvasses multiple cloud ...
The PCPJack worm targets cloud environments and vulnerable web applications to remove TeamPCP infections and steal ...
In March 2026, someone hijacked a maintainer account for Axios, a JavaScript HTTP library downloaded more than 45 million ...
ProgramBench tests SWE agents' ability to develop complete software projects holistically from scratch. Claude Opus 4.7, Gemini 3.1 Pro, GPT 5.4 and others score 0% on the new benchmark developed by ...