AI Security | Vulnerability Exploitation Red Teams have successfully bypassed GPT-5’s safeguards, cautioning that it has become ‘almost impractical’ for business use.
Cybersecurity Threats | Malware Development | Vulnerability Exploitation Chinese cybercriminals are taking advantage of vulnerabilities in SharePoint to launch toolsets that include backdoors, ransomware, and loaders.
Cloud Security Risks | Financial Data Manipulation | Vulnerability Exploitation A newly discovered vulnerability in Streamlit enables cybercriminals to execute cloud account takeover attacks.
Cybersecurity Threats | Remote Code Execution | Vulnerability Exploitation Cybercriminals have the ability to access IIS machine keys by taking advantage of a vulnerability in SharePoint’s deserialization process.
AI Security Risks | Remote Code Execution | Vulnerability Exploitation A vulnerability chain in NVIDIA Triton has the potential to allow attackers to gain control over AI servers.
Cybersecurity Threats | Ransomware Attacks | Vulnerability Exploitation SonicWall VPNs are being actively targeted due to a zero-day vulnerability that allows attackers to circumvent multi-factor authentication (MFA) and install ransomware.
Code Auditing | Kernel Security | Vulnerability Exploitation Researchers took advantage of kernelCTF instances on Google and a zero-day vulnerability in Debian 12.