A previously undocumented set of 23 iOS exploits named "Coruna" has been deployed by multiple threat actors in targeted espionage campaigns and financially motivated attacks.
The Oasis researchers document a vulnerability chain that can be initiated from any website the AI agent (or its user) visits ...
A high-severity Chrome vulnerability has allowed malicious extensions to exploit the Gemini panel and gain elevated access to camera, microphone, and files.
A Chrome vulnerability allowed malicious extensions to hijack the browser’s Gemini Live assistant to spy on users and ...
Bad actors could use the flaw to remotely load and execute malicious files on a victim’s computer. Bad actors could use the flaw to remotely load and execute malicious files on a victim’s computer. is ...
On February 5, 2026, security researchers disclosed a severe vulnerability in the popular n8n workflow automation platform that allows authenticated attackers to run arbitrary commands on the host ...
This voice experience is generated by AI. Learn more. This voice experience is generated by AI. Learn more. A new vulnerability database has launched in the EU, in a bid to reduce dependence on the ...
The decentralized approach makes it possible to assign and publish vulnerability identifiers autonomously without having to wait for central approval. A total of more than 25 different data sources ...
Security experts have warned of a critical new vulnerability in popular AI workflow automation platform n8n that could enable adversaries to take over locally deployed instances and compromise ...
A new report out today from data security company Cyera Ltd. is warning that a recently discovered critical security vulnerability in workflow automation platform n8n is putting thousands of ...
Windows users are in the crosshairs after a critical vulnerability in Zoom was actively exploited. The flaw, which affects multiple Zoom products on Windows, allows attackers to quietly escalate ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results