AI Deleting Data? It's Not AI, It's Bad Testing. [Analysis]
Don't blame the algorithms for the recent spate of production database deletions. The real culprit is a rush to market, not a fault in artificial intelligence.
Phishing attacks are becoming increasingly sophisticated, even targeting encrypted messaging apps. Signal's latest update aims to put up guardrails, but how effective will they be?
Don't blame the algorithms for the recent spate of production database deletions. The real culprit is a rush to market, not a fault in artificial intelligence.
Cybercrime is getting faster, more targeted, and alarmingly efficient within the SaaS ecosystem. Researchers have identified two distinct groups leveraging vishing and single sign-on abuse to exfiltrate data with unprecedented speed.
Forget passwords. The latest Azure attack, ConsentFix v3, hijacks accounts through automated OAuth abuse, a chilling escalation for cloud security.
Canvas-maker Instructure hit by social engineering attack, exposing data in its Salesforce instance. This incident echoes a disturbing pattern targeting the popular CRM platform.
Forget clunky, template-driven phishing. A new kit called Bluekit is here, arming attackers with an AI assistant and automating critical steps, making attacks more personalized and harder to spot.
The Happiest Place on Earth is getting a technological upgrade, but not everyone's smiling. Disneyland's new face recognition option raises serious questions about privacy in our increasingly surveilled world.
Authorities have detained a 15-year-old for allegedly peddling millions of records pilfered from France Titres, a critical government agency. The breach highlights persistent vulnerabilities in state infrastructure.
Metasploit just dropped a release that's less about the 'what' and more about the 'how' – specifically, how AI can now peer into its cyber arsenal. Plus, a nasty Linux bug is already weaponized.
Your AI morning briefing for May 02, 2026 — the top stories you need to know.
Threat actors are now exfiltrating data at speeds that should make CISOs sweat. The old way of looking at just endpoints is dead.
A nasty bug in the Linux kernel's crypto subsystem is letting unprivileged users become root. Millions of cloud servers are exposed.
The relentless march of AI is pushing vulnerability discovery into overdrive, creating a 'vuln-pocalypse' that threatens to overwhelm security teams. Are we prepared for the deluge?