Wallarm’s latest Q3 2025 API ThreatStats report reveals that API vulnerabilities, exploits, and breaches are not just increasing; they’re evolving.  Malicious actors are shifting from code-level ...
The widespread adoption of IoT technologies has greatly improved connectivity and convenience across industries, homes, and ...
Security researcher Eaton Zveare discovered that two sets of Amazon Web Services keys were left exposed across Tata Motors' ...
Microsoft security researchers have discovered a new backdoor malware that uses the OpenAI Assistants API as a covert command ...
The vulnerability, dubbed Brash, can crash browsers within seconds by flooding the document.title API, and Google’s silence ...
Microsoft Incident Response – Detection and Response Team (DART) researchers uncovered a new backdoor that is notable for its novel use of the OpenAI Assistants Application Programming Interface (API) ...
The vulnerability works on Google Chrome and all web browsers that run on Chromium, which includes Microsoft Edge, Brave, ...
On Monday, Microsoft Detection and Response Team (DART) researchers warned that an OpenAI API was being abused as a backdoor ...
AI agents now make decisions and access systems on their own, creating identity blind spots traditional tools can't see.
Google’s Threat Intelligence Group reports that new malware strains use LLMs mid-execution to generate, rewrite, and ...
"The exploit hijacks Claude and follows the adversaries instructions to grab private data, write it to the sandbox, and then calls the Anthropic File API to upload the file to the attacker's account ...
If it wasn’t apparent already, no organization (no matter how large and well-resourced) is immune to the ever-evolving ...