❌

Reading view

There are new articles available, click to refresh the page.

Anthropic, Microsoft MCP Server Flaws Shine a Light on AI Security Risks

AI technology, security, AI security, visibility, insights, security platform, Arctic Wolf, zero-trust encrypted AI Trend Micro cybersecurity poverty line, data-centric, SUSE cloud Wiz Torq AirTag Skyhawk SASE security cloud security visibility PwC Survey Finds C-Level Execs Now View Cybersecurity as Biggest Risk

Researchers with Cyata and BlueRock uncovered vulnerabilities in MCP servers from Anthropic and Microsoft, feeding ongoing security worries about MCP and other agentic AI tools and their dual natures as both key parts of the evolving AI world and easy targets for threat actors.

The post Anthropic, Microsoft MCP Server Flaws Shine a Light on AI Security Risks appeared first on Security Boulevard.

CISA Updates KEV Catalog with 4 Critical Vulnerabilities Following Ongoing Exploits

By: Divya

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its Known Exploited Vulnerabilities (KEV) Catalogue with four critical security flaws affecting widely-used enterprise software and development tools. All vulnerabilities were added on January 22, 2026, with a standardized deadline of February 12, 2026, requiring federal agencies and critical infrastructure operators to implement patches or mitigations. […]

The post CISA Updates KEV Catalog with 4 Critical Vulnerabilities Following Ongoing Exploits appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities

Really interesting blog post from Anthropic:

In a recent evaluation of AI models’ cyber capabilities, current Claude models can now succeed at multistage attacks on networks with dozens of hosts using only standard, open-source tools, instead of the custom tools needed by previous generations. This illustrates how barriers to the use of AI in relatively autonomous cyber workflows are rapidly coming down, and highlights the importance of security fundamentals like promptly patching known vulnerabilities.

[…]

A notable development during the testing of Claude Sonnet 4.5 is that the model can now succeed on a minority of the networks without the custom cyber toolkit needed by previous generations. In particular, Sonnet 4.5 can now exfiltrate all of the (simulated) personal information in a high-fidelity simulation of the Equifax data breachβ€”Β­one of the costliest cyber attacks in historyβ€”Β­using only a Bash shell on a widely-available Kali Linux host (standard, open-source tools for penetration testing; not a custom toolkit). Sonnet 4.5 accomplishes this by instantly recognizing a publicized CVE and writing code to exploit it without needing to look it up or iterate on it. Recalling that the original Equifax breach happened by exploiting a publicized CVE that had not yet been patched, the prospect of highly competent and fast AI agents leveraging this approach underscores the pressing need for security best practices like prompt updates and patches. ...

The post AIs are Getting Better at Finding and Exploiting Internet Vulnerabilities appeared first on Security Boulevard.

Why AI Is Making Attack Surface Management Mandatory

Amit Sheps, head of product marketing at CyCognito, discusses the growing challenges cybersecurity teams face as artificial intelligence accelerates the expansion of enterprise attack surfaces. He explains why visibility, continuous assessment, and proactive risk management are becoming essential in an AI-driven threat landscape. Sheps argues that most teams are still stuck in β€œvulnerability whack-a-mole” mode,..

The post Why AI Is Making Attack Surface Management Mandatory appeared first on Security Boulevard.

Why Smart Contract Security Can’t Wait for β€œBetter” AI Models

concentric, AI,

The numbers tell a stark story: $1.42 billion lost across 149 documented incidents in 2024 due to smart contract vulnerabilities, with access control flaws accounting for $953.2 million in damages alone. While the Web3 community debates the perfect AI solution for smart contract security, billions continue to drain from protocols that could have been protected..

The post Why Smart Contract Security Can’t Wait for β€œBetter” AI Models appeared first on Security Boulevard.

TP-Link Router Flaw Enables Authentication Bypass Through Password Recovery MechanismΒ 

By: Divya

TP-Link hasΒ disclosedΒ a high-severity authenticationΒ bypass vulnerabilityΒ affecting its VIGI security camera lineup, allowing attackers on local networks to reset administrator passwords without verification.Β Β  The flaw lies in the password recovery feature of the local web interface, which is exploited via client-side state manipulation.Β  The vulnerability (CVE-2026-0629) enables threat actors positioned on the sameΒ local area networkΒ (LAN) to gain […]

The post TP-Link Router Flaw Enables Authentication Bypass Through Password Recovery MechanismΒ  appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

❌