โŒ

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

CISA Updates KEV Catalog with 4 Critical Vulnerabilities Following Ongoing Exploits

By: Divya
23 January 2026 at 07:08

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalogue with four critical security flaws affecting widely-used enterprise software and development tools. All vulnerabilities were added on January 22, 2026, with a standardized deadline of February 12, 2026, requiring federal agencies and critical infrastructure operators to implement patches or mitigations. [โ€ฆ]

The post CISA Updates KEV Catalog with 4 Critical Vulnerabilities Following Ongoing Exploits appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities

23 January 2026 at 07:01

Really interesting blog post from Anthropic:

In a recent evaluation of AI modelsโ€™ cyber capabilities, current Claude models can now succeed at multistage attacks on networks with dozens of hosts using only standard, open-source tools, instead of the custom tools needed by previous generations. This illustrates how barriers to the use of AI in relatively autonomous cyber workflows are rapidly coming down, and highlights the importance of security fundamentals like promptly patching known vulnerabilities.

[โ€ฆ]

A notable development during the testing of Claude Sonnet 4.5 is that the model can now succeed on a minority of the networks without the custom cyber toolkit needed by previous generations. In particular, Sonnet 4.5 can now exfiltrate all of the (simulated) personal information in a high-fidelity simulation of the Equifax data breachโ€”ยญone of the costliest cyber attacks in historyโ€”ยญusing only a Bash shell on a widely-available Kali Linux host (standard, open-source tools for penetration testing; not a custom toolkit). Sonnet 4.5 accomplishes this by instantly recognizing a publicized CVE and writing code to exploit it without needing to look it up or iterate on it. Recalling that the original Equifax breach happened by exploiting a publicized CVE that had not yet been patched, the prospect of highly competent and fast AI agents leveraging this approach underscores the pressing need for security best practices like prompt updates and patches. ...

The post AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities appeared first on Security Boulevard.

Why AI Is Making Attack Surface Management Mandatory

22 January 2026 at 14:38

Amit Sheps, head of product marketing at CyCognito, discusses the growing challenges cybersecurity teams face as artificial intelligence accelerates the expansion of enterprise attack surfaces. He explains why visibility, continuous assessment, and proactive risk management are becoming essential in an AI-driven threat landscape. Sheps argues that most teams are still stuck in โ€œvulnerability whack-a-moleโ€ mode,..

The post Why AI Is Making Attack Surface Management Mandatory appeared first on Security Boulevard.

Why Smart Contract Security Canโ€™t Wait for โ€œBetterโ€ AI Models

20 January 2026 at 12:31
concentric, AI,

The numbers tell a stark story: $1.42 billion lost across 149 documented incidents in 2024 due to smart contract vulnerabilities, with access control flaws accounting for $953.2 million in damages alone. While the Web3 community debates the perfect AI solution for smart contract security, billions continue to drain from protocols that could have been protected..

The post Why Smart Contract Security Canโ€™t Wait for โ€œBetterโ€ AI Models appeared first on Security Boulevard.

TP-Link Router Flaw Enables Authentication Bypass Through Password Recovery Mechanismย 

By: Divya
20 January 2026 at 03:16

TP-Link hasย disclosedย a high-severity authenticationย bypass vulnerabilityย affecting its VIGI security camera lineup, allowing attackers on local networks to reset administrator passwords without verification.ย ย  The flaw lies in the password recovery feature of the local web interface, which is exploited via client-side state manipulation.ย  The vulnerability (CVE-2026-0629) enables threat actors positioned on the sameย local area networkย (LAN) to gain [โ€ฆ]

The post TP-Link Router Flaw Enables Authentication Bypass Through Password Recovery Mechanismย  appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

โŒ
โŒ