Forgotten integrations, shadow IT, SaaS, and now shadow AI and agents are everywhere, and attackers don't need sophisticated ...
A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability ...
Vercel breached after attacker compromised Context.ai, hijacked an employee's Google Workspace via OAuth, and accessed ...
In today's security landscape, some of the most dangerous vulnerabilities aren't flagged by automated scanners at all. These ...
A convincing impersonation of TidBITS contributor Glenn Fleishman on our public Slack group fooled an experienced IT ...
A Vercel employee's AI tool OAuth grant gave attackers access to internal systems via a four-hop kill chain. Here's what ...
Stolen OAuth tokens, which are at the root of these breaches, "are the new attack surface, the new lateral movement," a ...
This week, scam compounds. Attackers exploit flaws pre-disclosure. A crackdown on DDoS-for-hire. No Mythos for CISA, yes for ...
A new malware family named 'AgingFly' has been identified in attacks against local governments and hospitals that steal ...
The introduction of Anthropic's Mythos model signals a shift in the cybersecurity industry - one not yet fully understood, ...
The answer lies in the movement from the artisanal to the industrial. A human attacker, no matter how gifted, is a ...