A ModelScope MS-Agent vulnerability allows attackers to feed malicious commands to AI agents and modify system files or steal ...
Security firms monitoring US-Israel-Iran cyberattacks report that while hacktivist attacks spiked, state-sponsored actors ...
The JVG algorithm factors RSA and ECC keys using fewer quantum resources than Shor’s algorithm, accelerating the time needed ...
An OpenClaw vulnerability allowed malicious websites to take over AI agents, exposing sensitive information and enabling data ...
Two AWS data centers in the United Arab Emirates were “directly struck” and another facility in Bahrain was also damaged after a drone landed nearby.
Google has patched nearly 130 vulnerabilities in Android, including an exploited zero-day bug in the graphics component of Qualcomm chipsets.
Hackers stole names, Social Security numbers, driver’s license information, voter registration records, and health-related information.
Researchers developed attacks able to bypass client isolation in Wi-Fi networks used at home, at work, in airports, and in coffee shops.
Researcher finds high-risk vulnerability in Honeywell building management controller, but the vendor disputes the severity and impact.
Fig Security was founded in March 2025 by Gal Shafir (CEO), Nir Loya Dahan (CPO), and Roy Haimof (CTO), all veterans of Israeli intelligence units 8200 and Mamram with experience at companies like ...
Academic researchers have shown that low-cost receivers can be used to capture transmissions from tire pressure sensors and track drivers.
A Chrome vulnerability allowed malicious extensions to hijack the browser’s Gemini Live assistant to spy on users and ...