Anthropic's Mythos AI discovered over 2,000 unknown software vulnerabilities in seven weeks, prompting the company to ...
When 500,000 Findings Hide 14 Real Threats Modern enterprises ingest vulnerability data from dozens of sources: endpoint ...
In a new proof-of-concept, endpoint security provider Morphisec showed that the Exploit Prediction Scoring System (EPSS), one of the most widely used frameworks for assessing vulnerability exploits, ...
Analysis Finds 1% of Vulnerabilities Were Exploited in the Wild in 2025 and Identifies the 50 Most Routinely Targeted Flaws of Last Year VulnCheck, the exploit intelligence company, today released the ...
A security researcher frustrated with Microsoft has released the BlueHammer Windows zero-day exploit, telling the company, “I ...
Threat actors have been exploiting the BlueHammer Microsoft Defender vulnerability as a zero-day to gain System privileges.
CVE-2026-32202 actively exploited after April 27 advisory fix, exposing NTLMv2 hashes via zero-click SMB authentication.
PhantomCore exploited three TrueConf flaws since September 2025, enabling remote access and lateral movement across Russian ...
Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk? Your email has been sent Apache Tomcat is under attack as cybercriminals actively exploit a recently disclosed ...
Public-facing instances of ProjectSend, an open-source file-sharing web application, have been exploited by attackers, according to vulnerability intelligence provider VulnCheck. ProjectSend was ...
Attackers can target the Foxit PDF Reader and PDF Editor applications. Security patches are available for download.
The vulnerability has since been fixed and the malicious landing page is offline.