A purpose-built AI security agent detected vulnerabilities in 92% of exploited DeFi smart contracts in a new open-source benchmark. The study, released Thursday by AI security firm Cecuro, evaluated ...
The cybersecurity community went on alert when Anthropic announced on April 7, 2026, that its latest and most capable general ...
AI-assisted coding tools are making it faster and easier to turn disclosed vulnerabilities into working exploits, challenging traditional risk scoring models like CVSS. Experts warn that skill is no ...
Industrialized cybercrime delivers attacks with greater scale, speed and success. Defenders must match this with use of AI ...
A string of recent incidents — from an AI-driven Web3 theft to a newly exploited SharePoint zero-day — is underscoring the evolving nature of cyber threats. Attackers are increasingly leveraging AI ...
Anthropic's latest AI technology, called Mythos, is so powerful at revealing software vulnerabilities that the company is afraid to release the model publicly lest it fall into the hands of bad actors ...
Binance Research finds that AI is twice as effective at exploiting smart contracts, with GPT-5.3-Codex achieving a 72% ...
Frontier AI models can lower the skill barrier for attackers and compress the time between exposure and exploitation faster ...
A new report out today from Aim Security Ltd. reveals the first known zero-click artificial intelligence vulnerability that could have allowed attackers to exfiltrate sensitive internal data without ...
AI firm Anthropic says its latest tests showed AI agents autonomously hacking top blockchains and draining simulated funds, signaling that automated exploits may now threaten blockchains like Ethereum ...
Intruder, a leader in exposure management, today announced that its founder and CEO, Chris Wallis, will be a featured speaker at KB4-CON 2026 on May 13. Wallis will headline the session titled AI, ...
Fortinet disclosed a critical vulnerability, CVE-2026-35616, in its FortiClient Endpoint Management Server that has been actively exploited and flagged in the Known Exploited Vulnerabilities catalog.