CVE-2026-42208 exploited within 36 hours of disclosure, exposing LiteLLM credentials, risking cloud account compromise.
SQL injection attacks are among the oldest exploits against web applications, dating back more than a decade. Sadly, despite the fact that it is fairly easy to defend against these injection attacks, ...
How indirect prompt injection attacks on AI work - and 6 ways to shut them down ...
Dozens of vulnerabilities were discovered recently in the open source electronic medical records platform OpenEMR.
New research exposes how prompt injection in AI agent frameworks can lead to remote code execution. Learn how these ...
A five-level operating model for turning API security visibility into measurable risk reduction, faster remediation, and ...
Escape, Shannon, Strix, PentAGI, and Claude against a modern vulnerable application. Learn more about their detection rates, ...
Making headlines everywhere is the CopyFail Linux kernel vulnerability, which allows local privilege escalation (LPE) from any user to root privileges on most kernels and distributions. Local ...
Penetration tests of AI systems expose significantly higher severe-flaw density when compared to legacy apps. New attack ...
If you are a CIO or CISO evaluating an agentic AI platform, ask the same questions you would ask about any enterprise ...
Microsoft’s Azure-based AI development and deployment platform shines with a strong selection of models and agent types and ...
AI agents are now being weaponized through prompt injection, exposing why model guardrails are not enough to protect ...