OpenAI Launches Bug Bounty Program for Abuse and Safety Risks
Through the new program, OpenAI will reward reports covering design or implementation issues leading to material harm. The post OpenAI Launches Bug Bounty Pr...
20 articles
Through the new program, OpenAI will reward reports covering design or implementation issues leading to material harm. The post OpenAI Launches Bug Bounty Pr...
Threat actors are using adversary-in-the-middle (AitM) phishing pages to seize control of TikTok for Business accounts in a new campaign, according to a repo...
AFC Ajax, the Dutch football club from Amsterdam, disclosed that an unknown hacker gained access to parts of its IT systems and obtained the email addresses ...
Microsoft recently patched a severe Elevation of Privilege (EoP) vulnerability in the Windows Error Reporting (WER) service, officially tracked as CVE-2026-2...
In an AI-driven world, says Bruce Schneier, guaranteeing the integrity of data is more important than ever.
OpenAI’s public Safety Bug Bounty program focuses on AI abuse and safety risks across its products. The goal is to support safe and secure systems and reduce...
Aamir Lakhani discusses how cyber defenders should respond as AI accelerates attacks.
Security researchers from Georgia Tech have observed a surge in reported CVEs for which the flaw was introduced by AI-generated code
Auvik's 2026 IT Trends Report reveals a widening gap between AI ambition and execution, as IT teams grapple with visibility gaps, shadow IT, and staffing sho...
Russian law enforcement was reported to have apprehended the alleged administrator of the cybercrime forum LeakBase, reports The Hacker News.
Security Affairs reports that the U.S.
Cybersecurity risks faced by the U.S.
Officials at Puerto Rico's Department of Transportation have cancelled all upcoming driver's license, permit, and vehicle registration appointments at the Ce...
Microsoft credential phishing weaponizes Bubble AI app builder AI-powered no-code app-building platform Bubble has been exploited to create illicit web apps ...
Threat actors have used a multi-stage framework deploying a remote access trojan and a fake information-stealing Google Docs Offline extension for Chrome in ...
WhatsApp is rolling out multiple features designed to make the app easier to use, including AI-powered message replies and photo retouching, support for two ...
Cybersecurity researchers have disclosed a vulnerability in Anthropic's Claude Google Chrome Extension that could have been exploited to trigger malicious pr...
Three individuals, Stanley Yi Zheng, Matthew Kelly, and Tommy Shad English, have been charged with conspiracy to commit smuggling and export control violatio...
The kernel exploit for two security vulnerabilities used in the recently uncovered Apple iOS exploit kit known as Coruna is an updated version of the same ex...
In December, the Trump administration signed an executive order that neutered states’ ability to regulate AI by ordering his administration to both sue and w...