259Articles
10Categories
2026-05-12Date
🚨
Why patching SLAs should be the floor, not the strategyI’ve been a CISO for two separate companies, know several CISOs personally, and interact with many others through various cybersecurity forums. We all have one thing in common. We can tell you our patching SLA numbers off the top of our heads. Ninety-five percent of criticals clo…
KEV
🚨
How Rapid7 is bringing Cyber GRC closer to security operationsSabeen Malik is VP, Global Government Affairs and Public Policy at Rapid7. β € Security teams need a better way to connect what they detect, what they fix, and what they can prove. The pace of modern security operations no longer works in defenders’ favor. IBM’s Cost of a Data Brea…
KEV
πŸ›
Linux kernel maintainers suggest a β€˜kill switch’ to protect systems until a zero-day vulnerability is patched
πŸ›
BitUnlocker Downgrade Attack Bypasses Windows 11 Disk Encryption in Minutes
πŸ›
CVE-2026-43500 rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present
πŸ›
Cline AI Agent Flaw Allows Attackers to Launch RCE Attacks
πŸ›
cPanel flaw exposes enterprises to hosting supply-chain risks
πŸ›
Copy.Fail Linux Vulnerability
πŸ›
Attackers exploit cPanel CVE-2026-41940 to deploy Filemanager Backdoor
πŸ›
JetBrains TeamCity vulnerability allows privilege escalation, API exposure (CVE-2026-44413)
πŸ›
Stealthy hackers exploit cPanel flaw in active backdoor campaign (CVE-2026-41940)
πŸ›
CVE-2026-32204 Azure Monitor Agent Elevation of Privilege Vulnerability
πŸ›
CVE-2026-32177 .NET Elevation of Privilege Vulnerability
πŸ›
CVE-2026-21530 Windows Rich Text Edit Elevation of Privilege Vulnerability
πŸ›
CVE-2026-33117 Azure SDK for Java Security Feature Bypass Vulnerability
πŸ›
CVE-2026-33834 Windows Event Logging Service Elevation of Privilege Vulnerability
πŸ›
CVE-2026-33839 Win32k Elevation of Privilege Vulnerability
πŸ›
CVE-2026-33840 Win32k Elevation of Privilege Vulnerability
πŸ›
CVE-2026-33841 Windows Kernel Elevation of Privilege Vulnerability
πŸ›
CVE-2026-34329 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
πŸ›
CVE-2026-34330 Win32k Elevation of Privilege Vulnerability
πŸ›
CVE-2026-34331 Win32k Elevation of Privilege Vulnerability
πŸ›
CVE-2026-34333 Windows Win32k Elevation of Privilege Vulnerability
πŸ›
CVE-2026-34342 Windows Print Spooler Elevation of Privilege Vulnerability
πŸ›
CVE-2026-34343 Windows Application Identity (AppID) Subsystem Elevation of Privilege Vulnerability
πŸ›
CVE-2026-34344 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
πŸ›
CVE-2026-34345 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
πŸ›
CVE-2026-34347 Windows Win32k Elevation of Privilege Vulnerability
πŸ›
CVE-2026-34350 Windows Storport Miniport Driver Denial of Service Vulnerability
πŸ›
CVE-2026-34351 Windows TCP/IP Elevation of Privilege Vulnerability
πŸ›
CVE-2026-35415 Windows Storage Spaces Controller Elevation of Privilege Vulnerability
πŸ›
CVE-2026-35416 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
πŸ›
CVE-2026-35417 Windows Win32k Elevation of Privilege Vulnerability
πŸ›
CVE-2026-35418 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
πŸ›
CVE-2026-35419 Windows DWM Core Library Information Disclosure Vulnerability
πŸ›
CVE-2026-35420 Windows Kernel Elevation of Privilege Vulnerability
πŸ›
CVE-2026-35421 Windows GDI Remote Code Execution Vulnerability
πŸ›
CVE-2026-35422 Windows TCP/IP Driver Security Feature Bypass Vulnerability
πŸ›
CVE-2026-35423 Windows 11 Telnet Client Information Disclosure Vulnerability
πŸ›
CVE-2026-35424 Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability
πŸ›
CVE-2026-35433 .NET Elevation of Privilege Vulnerability
πŸ›
CVE-2026-35438 Windows Admin Center Elevation of Privilege Vulnerability
πŸ›
CVE-2026-35439 Microsoft SharePoint Server Remote Code Execution Vulnerability
πŸ›
CVE-2026-35440 Microsoft Word Information Disclosure Vulnerability
πŸ›
CVE-2026-40360 Microsoft Excel Information Disclosure Vulnerability
πŸ›
CVE-2026-40363 Microsoft Office Remote Code Execution Vulnerability
πŸ›
CVE-2026-40364 Microsoft Word Remote Code Execution Vulnerability
πŸ›
CVE-2026-40366 Microsoft Word Remote Code Execution Vulnerability
πŸ›
CVE-2026-40368 Microsoft SharePoint Server Remote Code Execution Vulnerability
πŸ›
CVE-2026-40374 Microsoft Power Automate Desktop Information Disclosure Vulnerability
πŸ›
CVE-2026-40377 Microsoft Cryptographic Services Elevation of Privilege Vulnerability
πŸ›
CVE-2026-40380 Windows Volume Manager Extension Driver Remote Code Execution Vulnerability
πŸ›
CVE-2026-40399 Windows TCP/IP Elevation of Privilege Vulnerability
πŸ›
CVE-2026-40405 Windows TCP/IP Denial of Service Vulnerability
πŸ›
CVE-2026-40406 Windows TCP/IP Information Disclosure Vulnerability
πŸ›
CVE-2026-40407 Windows Common Log File System Driver Elevation of Privilege Vulnerability
πŸ›
CVE-2026-40408 Windows WAN ARP Driver Elevation of Privilege Vulnerability
πŸ›
CVE-2026-40410 Windows SMB Client Elevation of Privilege Vulnerability
πŸ›
CVE-2026-40414 Windows TCP/IP Denial of Service Vulnerability
πŸ›
CVE-2026-40415 Windows TCP/IP Remote Code Execution Vulnerability
πŸ›
CVE-2026-40417 Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
πŸ›
CVE-2026-40419 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
πŸ›
CVE-2026-40421 Microsoft Word Information Disclosure Vulnerability
πŸ›
CVE-2026-41088 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
πŸ›
CVE-2026-41089 Windows Netlogon Remote Code Execution Vulnerability
πŸ›
CVE-2026-41094 Microsoft Data Formulator Remote Code Execution Vulnerability
πŸ›
CVE-2026-41095 Data Deduplication Elevation of Privilege Vulnerability
πŸ›
CVE-2026-41096 Windows DNS Client Remote Code Execution Vulnerability
πŸ›
CVE-2026-41100 Microsoft 365 Copilot for Android Spoofing Vulnerability
πŸ›
CVE-2026-41101 Microsoft Word for Android Spoofing Vulnerability
πŸ›
CVE-2026-41102 Microsoft PowerPoint for Android Spoofing Vulnerability
πŸ›
CVE-2026-41109 GitHub Copilot and Visual Studio Code Security Feature Bypass Vulnerability
πŸ›
CVE-2026-41610 Visual Studio Code Security Feature Bypass Vulnerability
πŸ›
CVE-2026-41611 Visual Studio Code Remote Code Execution Vulnerability
πŸ›
CVE-2026-41612 Visual Studio Code Information Disclosure Vulnerability
πŸ›
CVE-2026-41614 M365 Copilot for Desktop Spoofing Vulnerability
πŸ›
CVE-2026-32161 Windows Native WiFi Miniport Driver Remote Code Execution Vulnerability
πŸ›
CVE-2026-32170 Windows Rich Text Edit Elevation of Privilege Vulnerability
πŸ›
CVE-2026-32185 Microsoft Teams Spoofing Vulnerability
πŸ›
CVE-2026-42831 Microsoft Office Remote Code Execution Vulnerability
πŸ›
CVE-2026-32175 .NET Core Tampering Vulnerability
πŸ›
CVE-2026-42825 Windows Telephony Service Elevation of Privilege Vulnerability
πŸ›
CVE-2026-42896 Windows DWM Core Library Elevation of Privilege Vulnerability
πŸ›
CVE-2026-42898 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
πŸ›
CVE-2026-42899 ASP.NET Core Denial of Service Vulnerability
πŸ›
CVE-2026-33110 Microsoft SharePoint Server Remote Code Execution Vulnerability
πŸ›
CVE-2026-33112 Microsoft SharePoint Server Remote Code Execution Vulnerability
πŸ›
CVE-2026-33833 Azure Machine Learning Notebook Spoofing Vulnerability
πŸ›
CVE-2026-33835 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
πŸ›
CVE-2026-33837 Windows TCP/IP Local Elevation of Privilege Vulnerability
πŸ›
CVE-2026-33838 Windows Message Queuing (MSMQ) Elevation of Privilege Vulnerability
πŸ›
CVE-2026-34332 Windows Kernel-Mode Driver Remote Code Execution Vulnerability
πŸ›
CVE-2026-34334 Windows TCP/IP Elevation of Privilege Vulnerability
πŸ›
CVE-2026-34336 Windows DWM Core Library Information Disclosure Vulnerability
πŸ›
CVE-2026-34337 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
πŸ›
CVE-2026-34338 Windows Telephony Service Elevation of Privilege Vulnerability
πŸ›
CVE-2026-34339 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
πŸ›
CVE-2026-34340 Windows Projected File System Elevation of Privilege Vulnerability
πŸ›
CVE-2026-34341 Windows Link-Layer Discovery Protocol (LLDP) Elevation of Privilege Vulnerability
πŸ›
CVE-2026-40357 Microsoft SharePoint Server Remote Code Execution Vulnerability
πŸ›
CVE-2026-40358 Microsoft Office Remote Code Execution Vulnerability
πŸ›
CVE-2026-40359 Microsoft Excel Remote Code Execution Vulnerability
πŸ›
CVE-2026-40361 Microsoft Word Remote Code Execution Vulnerability
πŸ›
CVE-2026-40362 Microsoft Excel Remote Code Execution Vulnerability
πŸ›
CVE-2026-40365 Microsoft SharePoint Server Remote Code Execution Vulnerability
πŸ›
CVE-2026-40367 Microsoft Word Remote Code Execution Vulnerability
πŸ›
CVE-2026-40370 SQL Server Remote Code Execution Vulnerability
πŸ›
CVE-2026-40369 Windows Kernel Elevation of Privilege Vulnerability
πŸ›
CVE-2026-40382 Windows Telephony Service Elevation of Privilege Vulnerability
πŸ›
CVE-2026-40397 Windows Common Log File System Driver Elevation of Privilege Vulnerability
πŸ›
CVE-2026-32209 Windows Filtering Platform (WFP) Security Feature Bypass Vulnerability
πŸ›
CVE-2026-40398 Windows Remote Desktop Services Elevation of Privilege Vulnerability
πŸ›
CVE-2026-40401 Windows TCP/IP Denial of Service Vulnerability
πŸ›
CVE-2026-40402 Windows Hyper-V Elevation of Privilege Vulnerability
πŸ›
CVE-2026-40403 Windows Graphics Component Remote Code Execution Vulnerability
πŸ›
CVE-2026-40413 Windows TCP/IP Denial of Service Vulnerability
πŸ›
CVE-2026-40418 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
πŸ›
CVE-2026-35436 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
πŸ›
CVE-2026-40420 Microsoft Office Click-To-Run Elevation of Privilege Vulnerability
πŸ›
CVE-2026-41086 Windows Admin Center in Azure Portal Elevation of Privilege Vulnerability
πŸ›
CVE-2026-41097 Secure Boot Security Feature Bypass Vulnerability
πŸ›
CVE-2026-40381 Azure Connected Machine Agent Elevation of Privilege Vulnerability
πŸ›
CVE-2026-41103 Microsoft SSO Plugin for Jira & Confluence Elevation of Privilege Vulnerability
πŸ›
CVE-2026-41613 Visual Studio Code Elevation of Privilege Vulnerability
πŸ›
CVE-2026-42823 Azure Logic Apps Elevation of Privilege Vulnerability
πŸ›
CVE-2026-42830 Azure Monitor Agent Metrics Extension Elevation of Privilege Vulnerability
πŸ›
CVE-2026-42832 Microsoft Office Spoofing Vulnerability
πŸ›
CVE-2026-42833 Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability
πŸ›
CVE-2025-54518 AMD: CVE-2025-54518 CPU OP Cache Corruption
πŸ›
CVE-2026-42893 Microsoft Outlook for iOS Tampering Vulnerability
πŸ›
Microsoft’s May 2026 Patch Tuesday Addresses 118 CVEs (CVE-2026-41103)
KEV
πŸ›
New Exim BDAT Vulnerability Exposes GnuTLS Builds to Potential Code Execution
πŸ›
Microsoft May 2026 Patch Tuesday: Many fixes, but no zero-days
KEV
⚠️
Google Warns Hackers Are Using AI to Build Working Zero-Day Exploits
⚠️
HEIDI: Free IDE security plugin for open-source vulnerability checks
⚠️
Magecart Hackers Exploit Google Tag Manager to Inject Credit Card Skimmers
⚠️
OpenAI Launches Daybreak for AI-Powered Vulnerability Detection and Patch Validation
⚠️
OpenAI Daybreak Automates Vulnerability Detection and Patching
⚠️
Claude Chrome Extension Flaw Lets Malicious Add-Ons Steal Gmail and Drive Data
⚠️
OpenAI’s Daybreak uses Codex Security to identify risky attack paths
⚠️
CISOs step into the AI spotlight
⚠️
Why Basic Security Practices Still Work - Rob Allen - ASW #382
⚠️
Developer workstations are the new beachhead
⚠️
WannaCry, the ransomware attack that changed the history of cybersecurity
⚠️
Six new dnsmasq vulnerabilities open the door to DNS cache poisoning, local root
⚠️
Ε koda confirms unauthorized access to its online shop
⚠️
Open WebUI File Upload Vulnerability Enables 1-Click RCE Attack
⚠️
Fake Claude Code takes the IElevator to your browser secrets
⚠️
Go fuzzing was missing half the toolkit. We forked the toolchain to fix it.
⚠️
Attackers Combine ClickFix With PySoxy Proxying to Maintain Persistence
⚠️
Citrix moves secure access to a flexible, credit-based consumption model
⚠️
Top 10 Deep & Dark Web Forums
⚠️
Zoom Rooms and Workplace Flaws Expose Users to Elevated Access Attacks
⚠️
Threat Actors Abuse Vercel AI Tools to Mass-Produce Realistic Phishing Sites
⚠️
SAP Releases Patch for Critical SQL Injection Flaw in S/4HANA
⚠️
OpenAI introduces Daybreak cyber platform, takes on Anthropic Mythos
⚠️
Google Says Hackers Used AI to Build Zero-Day Exploit
⚠️
Exaforce raises $125M Series B to build AI for catching and stopping cyberattacks as they happen
⚠️
The world’s most β€œDangerous” AI, Anthropic’s Mythos, found only one flaw in curl
⚠️
Mullvad shares workaround for Android 16 VPN leak that remains unfixed
⚠️
Exaforce raises $125 million to respond to AI-powered attacks
⚠️
Amazon Quick authorization bypass let users reach blocked AI chat agents
⚠️
Google launches new Android security feature to help uncover spyware attacks
⚠️
Mistral AI SDK, TanStack Router hit in npm software supply chain attack
⚠️
Critical Patches Issued for Microsoft Products, May 12, 2026
⚠️
Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
⚠️
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
⚠️
Stop Chasing Individual CVEs
⚠️
Windows 11 security update fixes critical Bing and Azure flaws
KEV
⚠️
Multiple Vulnerabilities in Fortinet Products Could Allow for Remote Code Execution
⚠️
Hackers accessed BWH Hotels reservation system for months
⚠️
AWS Security Agent full repository code scanning feature now available in preview
⚠️
β€˜Mini Shai-Hulud’ malware compromises hundreds of open-source packages in sprawling supply-chain attack
⚠️
It's Patch Tuesday for Microsoft and Not a Zero-Day In Sight
⚠️
AI-Written Exploits Are Here
πŸ“‹
Microsoft May 2026 Patch Tuesday, (Tue, May 12th)
πŸ“‹
iOS 26.5 Updates RCS Messaging, Apple Maps, and iPhone Wallpapers
πŸ“‹
Patch Tuesday, May 2026 Edition
πŸ“‹
Microsoft Patch Tuesday for May 2026 β€” Snort rules and prominent vulnerabilities
πŸ“‹
Microsoft addresses 137 vulnerabilities in May’s Patch Tuesday, including 13 rated critical
πŸ“’
Navigating Human and Agentic Risks for Financial Institutions in the APJ Region
πŸ“’
Major world economies spell out key elements of AI β€˜ingredients list’
πŸ”₯
Checkmarx Jenkins AST Plugin Compromised in KICS Supply Chain Attack
πŸ”₯
84 npm Packages Linked to TanStack Hit by Supply-Chain Breach
πŸ”₯
Instructure Reaches Ransom Agreement with ShinyHunters to Stop 3.65TB Canvas Leak
πŸ”₯
State of ransomware in 2026
πŸ”₯
Microsoft Warns: MistralAI PyPI Package Compromised with Malware
πŸ”₯
Stolen Canvas data was β€œreturned” after hacker agreement, Instructure says
πŸ”₯
South Staffordshire Water Fined Β£1m After Data Breach
πŸ”₯
Cushman & Wakefield - 310,431 breached accounts
πŸ”₯
State-sponsored actors, better known as the friends you don’t want
πŸ”₯
New β€˜Shai-Hulud’ attack breached hundreds of npm and PyPI packages
πŸ”₯
Hackers Hijack Microsoft Teams Accounts to Spread ModeloRAT Malware
πŸ”₯
ANY.RUN & Elastic Security: BringΒ ThreatΒ Intelligence into Detection and Investigation Workflows
πŸ”₯
Cushman and Wakefield Confirms Data Breach Impacting Over 310,000 Accounts
πŸ”₯
Instructure strikes deal with hackers who breached it twice
πŸ”₯
Instructure pays ransom after Canvas incident as Congress announces investigation
πŸ”₯
Canvas owner reaches agreement with ShinyHunters, says user data was deleted
πŸ”₯
Instructure took a risky approach to recover stolen Canvas data
πŸ”₯
Identity takes center stage as a leading factor in enterprise cyberattacks
πŸ”₯
Hugging Face Packages Weaponized With a Single File Tweak
πŸ”₯
Report: Most Phishing Attacks Abuse Trusted Services
πŸ”₯
West Pharmaceutical warns of ransomware attack impacting business operations
πŸ”₯
Foxconn confirms cyberattack impacting North American factories
πŸ”₯
Foxconn Ransomware Attack Shows Nothing Is Safe Forever
πŸ•΅οΈ
ISC Stormcast For Tuesday, May 12th, 2026 https://isc.sans.edu/podcastdetail/9928, (Tue, May 12th)
πŸ•΅οΈ
The hidden smart fridge risks that emerge years after purchase
πŸ•΅οΈ
Cybersecurity jobs available right now: May 12, 2026
πŸ•΅οΈ
TrickMo Android Malware Targets Banking, Wallet, and Authenticator Apps
πŸ•΅οΈ
Mini Shai-Hulud Worm Compromises TanStack, Mistral AI, Guardrails AI & More Packages
πŸ•΅οΈ
Fake TronLink Chrome Extension Steals Crypto Wallet Credentials
πŸ•΅οΈ
North Korea Hackers Abuse Git Hooks to Deploy Cross-Platform Malware
πŸ•΅οΈ
AI is separating the companies built to scale from the ones built to sell
πŸ•΅οΈ
The Civil War Spies and Saboteurs Across the Canadian Border
πŸ•΅οΈ
Signal rolls out new protections against impersonation attacks
πŸ•΅οΈ
Vidar Stealer Campaign Evades EDR to Steal Credentials
πŸ•΅οΈ
AI and an absent government: Takeaways from RSAC 2026
πŸ•΅οΈ
CyberheistNews Vol 16 #19 Crafty Criminals Continue to Pose as Help Desks in Social Engineering Attacks
πŸ•΅οΈ
General Motors to pay $12.75 million over driver data sales
πŸ•΅οΈ
Download: The IT and security field guide to AI adoption
πŸ•΅οΈ
AI Can’t Detect Malicious Intent
πŸ•΅οΈ
This Samsung 4TB Portable SSD Moves Files at 2,000 MB/s For $1K
πŸ•΅οΈ
Veeam Intelligent ResOps unifies data context and recovery
πŸ•΅οΈ
FIRESIDE CHAT: Cyber insurers deepen SMB security role as supply chain attacks spread
πŸ•΅οΈ
ThreatDown ITDR prevents credential-based attacks
πŸ•΅οΈ
SAP unveils Autonomous Enterprise for AI-driven business operations
πŸ•΅οΈ
Google and Amnesty International teamed up to make it harder for spyware vendors to hide
πŸ•΅οΈ
Over 1 Million Baby Monitors, Security Cameras Exposed Through Meari Flaws
πŸ•΅οΈ
Samsung Galaxy Watch Glucose Tracking: What Works Now and What Doesn’t
πŸ•΅οΈ
6 Best ChatGPT Photo Editing Trends in 2026 (With Prompts to Try)
πŸ•΅οΈ
Tomato, JDownloader, TempPCP, Bad Vibes, Dirty Frag, Giedi Prime, Aaran Leyland - SWN #580
πŸ•΅οΈ
Fedora Hummingbird brings the container security model to a Linux host OS
🌐
TeamPCP Compromises Checkmarx Jenkins AST Plugin Weeks After KICS Supply Chain Attack
🌐
Android banking Trojan TrickMo evolves using TON network for C2
🌐
Malicious Hugging Face Repository Typosquats OpenAI
🌐
Webinar: What the Riskiest SOC Alerts Go Unanswered - and How Radiant Security Can Help
🌐
New TrickMo Variant Uses TON C2 and SOCKS5 to Create Android Network Pivots
🌐
RubyGems Suspends New Signups After Hundreds of Malicious Packages Are Uploaded
🌐
Instructure strikes a deal with ShinyHunters.
🌐
China’s hackers aren’t invincible.
πŸŽ™οΈ
Inside the Media Mind of Shaun Waterman: Freelancer
πŸ“‘
Elastic Security MCP App: Interactive security operations inside your AI Tools
πŸ“‘
iOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android
πŸ“‘
1 in 8 employees have sold company logins or know someone who has
πŸ“‘
Why Agentic AI Is Security's Next Blind Spot
πŸ“‘
10 Best Dark / Deep Web Browsers for Anonymity
πŸ“‘
End‑to‑End Encrypted RCS Messaging Arrives Across iPhone and Android
πŸ“‘
20 Leaders Who Built the CISO Era: 2 Decades of Change
πŸ“‘
Mini Shai-Hulud Hits TanStack npm Packages
πŸ“‘
Enabling AI sovereignty on AWS
πŸ“‘
OpenAI Launches 'Daybreak' to Help Build Secure By Design Software
πŸ“‘
U.S. bank disclose security lapse after sharing customer data with AI app
πŸ“‘
Fake Claude search results lure Mac users into ClickFix attack
πŸ“‘
European countries are exporting surveillance tech to countries with poor human rights records, report says
πŸ“‘
Guardrail Technologies launches Traffic Light for Code & AIβ„’; first security technology to verify & secure AI code and the people creating it
πŸ“‘
Twin brothers wipe 96 gov't databases minutes after being fired
πŸ“‘
Congressman launches inquiry into how food retailers use surveillance pricing
πŸ“‘
Iran Is Using Tiny β€˜Mosquito’ Boats to Shut Down the Strait of Hormuz
πŸ“‘
LLMjacking: what these attacks are, and how to protect AI servers