People hacking branded AI bots can result in significant reputational, financial, and legal consequences. There appears to be ...
Yubico warns of a search path vulnerability in YubiKey Manager, libfido2 and python-fido2. Updates fix the bugs.
CVE-2026-5760 (CVSS 9.8) exposes SGLang via /v1/rerank endpoint, enabling RCE through malicious GGUF models, risking server ...
As supply-chain attacks against widely-used, open-source software repositories continue, experts are urging developers to not ...
Anthropic fixed a significant vulnerability in Claude Code's handling of memories, but experts caution that memory files will ...
Cybersecurity researchers have discovered a critical "by design" weakness in the Model Context Protocol's (MCP) architecture ...
A design flaw – or expected behavior based on a bad design choice, depending on who is telling the story – baked into ...
Yet another npm supply-chain attack is worming its way through compromised packages, stealing secrets and sensitive data as ...
Already, BAND's early users — and enterprises more broadly — are mixing and matching AI agents powered by models from various ...
A team of researchers from UC Berkeley have demonstrated that eight AI agent benchmarks can be manipulated to produce ...
Unsafe defaults in MCP configurations open servers to possible remote code execution, according to security researchers who ...