AI-Driven Security Tools | Cybersecurity Threats | Exploitation of Vulnerabilities Malicious actors using HexStrike AI to create Citrix exploits
Cybersecurity Vulnerabilities | Remote Monitoring and Management | Software Updates and Patches N-able N-Central vulnerabilities actively exploited (CISA)
Cybersecurity Vulnerabilities | Remote Code Execution | Video Surveillance Security A total of 6,500 Axis servers are found to have the Remoting Protocol open, with 4,000 of them located in the United States susceptible to potential exploits.
AI Model Protection | Remote Code Execution | Security Vulnerabilities Vulnerabilities in NVIDIA Triton allow unauthenticated attackers to run code and take control of AI servers.