January 2026 was a wake-up month for enterprise security teams. In a single week, CERT-In released three high-severity ...
Learn about the key differences between DAST and pentesting, the emerging role of AI pentesting, their roles in security ...
Most CISOs think they know their automation footprint — until they see it. The real exposure isn’t code, but ungoverned ...
The US used a cyberattack to turn off power in Caracas during the raid to seize Maduro. The US grid is also vulnerable to ...
Threat actors behind the campaign are abusing Microsoft Visual Studio Code’s trusted workflows to execute and persist ...
Over three decades, the companies behind Web browsers have created a security stack to protect against abuses. Agentic browsers are undoing all that work.
Researchers found an indirect prompt injection flaw in Google Gemini that bypassed Calendar privacy controls and exposed ...
Varonis found a “Reprompt” attack that let a single link hijack Microsoft Copilot Personal sessions and exfiltrate data; ...
Reprompt impacted Microsoft Copilot Personal and, according to the team, gave "threat actors an invisible entry point to perform a data‑exfiltration chain that bypasses enterprise security controls ...
PromptArmor, a security firm specializing in the discovery of AI vulnerabilities, reported on Wednesday that Cowork can be ...
Ascendant Technologies reports that budget-conscious businesses can enhance productivity and security through IT solutions ...
CERT-In issued urgent security advisories warning Windows and Microsoft product users about vulnerabilities that could expose ...