ZEST Security Adds AI Agents to Identify Vulnerabilities That Pose No Actual Risk
ZEST Security introduces AI Sweeper Agents that identify which vulnerabilities are truly exploitable, helping security teams cut patch backlogs and focus on real risk ... Read More
VoidLink Represents the Future of AI-Developed Malware: Check Point
Check Point dug into the details of VoidLink and found a sophisticated and quickly developed malware that was mostly generated using AI and putting a spotlight on what the future of cyber threats looks like ... Read More
Fight for the Future, EFF, Others Push Back Against Growing ICE Surveillance
The privacy rights group Fight for the Future was one of 44 organizations that sent a letter to lawmakers urging them to pull back on funding for ICE, noting the growing threats to U.S. citizens and others as the agency spends millions of dollars on its growing surveillance capabilities ... Read More
Exploiting Google Gemini to Abuse Calendar Invites Illustrates AI Threats
Researchers with security firm Miggo used an indirect prompt injection technique to manipulate Google's Gemini AI assistant to access and leak private data in Google Calendar events, highlighting the challenges AI presents that traditional security measures can't address ... Read More
What’s On the Tube Or Rather in the Tube: Kimwolf Targets Android-based TVs and Streaming Devices
Kimwolf botnet exploits smart gadgets for DDoS attacks, highlighting security lapses in device protection and supply chains ... Read More
Hacker Pleads Guilty to Access Supreme Court, AmeriCorps, VA Systems
Nicholas Moore, a 24-year-old Tennessee man, pleaded guilty to using stolen credentials of authorized users to hack into computer systems of the Supreme Court, VA, and AmeriCorps, obtaining sensitive information and then posting it online to his Instagram account ... Read More
Who’s Stalking Whom? ICE Uses Social Media and Phone Surveillance System to Track Protesters
ICE protests surveillance yet uses tech to track citizens' devices, possibly violating privacy laws and the Fourth Amendment, revealed through ICE's data tools ... Read More
JFrog Researchers Uncover RCE Exploit for Existing Redis Database Vulnerability
JFrog this week published an analysis of a vulnerability in Redis databases that may be more serious than initially thought following the discovery of a remote code execution (RCE) exploit. Researchers found that a stack buffer overflow vulnerability in Redis (CVE-2025-62507) can be used to run the XACKDEL command with ... Read More
Vulnerability in Anthropic’s Claude Code Shows Up in Cowork
PromptArmor threat researchers uncovered a vulnerability in Anthropic's new Cowork that already was detected in the AI company's Claude Code developer tool, and which allows a threat actor to trick the agent into uploading a victim's sensitive files to their own Anthropic account ... Read More
Cyber Fraud, Not Ransomware, is Now Businesses’ Top Security Concern
In a report a week before its Davos conference, the World Economic Foundation said 64% world business leaders are most worried about cyber fraud, replacing ransomware at their top concern. AI vulnerabilities also ranked high, as did threats fueled by geopolitics. The group argued that a coordinated approach to cybersecurity ... Read More




