ChatGPT data leakage vulnerability discovered and patched
Researchers at Check Point discovered that a single malicious prompt could exploit a hidden outbound channel within ChatGPT's code execution runtime.
20 articles
Researchers at Check Point discovered that a single malicious prompt could exploit a hidden outbound channel within ChatGPT's code execution runtime.
Security Affairs reports that multiple China-linked threat groups executed a complex cyber campaign against a Southeast Asian government in 2025, employing a...
The incident occurred shortly after LiteLLM had obtained two security compliance certifications from Delve.
The cyberattack, detected after a third-party alert, led to unauthorized access to internal systems within the policy department.
The vulnerability, identified as CVE-2025-53521, allows attackers to gain complete control of affected servers through malicious traffic, enabling remote cod...
The campaign, attributed to the Chinese cybercrime group Silver Fox, encompasses a wide range of applications including VPN clients, encrypted messengers, vi...
Spalletta is accused of exploiting vulnerabilities in Uranium Finance's smart contracts on two separate occasions in April 2021.
IBM's Mark Hughes and Fabio Campos discuss how organizations are rethinking cyber risk through automation, real-time data, and AI-driven insights.
Think of AI browsers as a new category of enterprise software, not an advanced version of a traditional browser.
The platform’s new capabilities are designed to support enterprises in safeguarding complex, AI-driven environments, and are in response to a security enviro...
When asked about the factors that affect business operations beyond IT teams, 74% of companies that decided to slow or delay application deployments over the...
With critical services, institutional data, and user identities now spanning countless cloud and SaaS platforms, the conventional campus perimeter has disapp...
Researchers found that while 99% of respondents cite AI as one of the factors contributing to a rising demand for cloud investment, 88% reported existing bud...
The axios npm package, with about 100 million weekly downloads, was compromised via a maintainer’s account.
A command injection hidden in a branch name could cause an OAuth token to be exfiltrated.
Flaw upgraded to an actively exploited RCE, experts advise teams to patch right away.
More than a decade since DMARC became available, many organizations still don't use it. Here's why you can no longer wait.
The rise of autonomous systems has created a critical need to secure AI agent identities with the same rigor used for human employees, Ping Identity CEO Andr...
Biometric Update reports that Cloaked has raised $375 million in Series B funding led by General Catalyst and Liberty City Ventures, pushing the identity sec...