#vulnerability-research

[ follow ]
#cybersecurity
Information security
fromSecurityWeek
5 days ago

In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested

Senate legislation aims to enhance satellite cybersecurity amid rising threats and vulnerabilities in commercial satellite signals.
fromIT Pro
9 months ago
Privacy professionals

Industry welcomes the NCSC's new Vulnerability Research Initiative - but does it go far enough?

Information security
fromSecurityWeek
5 days ago

In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested

Senate legislation aims to enhance satellite cybersecurity amid rising threats and vulnerabilities in commercial satellite signals.
fromIT Pro
9 months ago
Privacy professionals

Industry welcomes the NCSC's new Vulnerability Research Initiative - but does it go far enough?

Information security
fromSecurityWeek
6 days ago

Claude Code, Gemini CLI, GitHub Copilot Agents Vulnerable to Prompt Injection via Comments

A prompt injection attack method named 'Comment and Control' targets AI code security tools, allowing attackers to hijack AI agents using crafted GitHub comments.
Information security
fromThe Hacker News
2 months ago

ZAST.AI Raises $6M Pre-A to Scale "Zero False Positive" AI-Powered Code Security

ZAST.AI raised $6M Pre-A from Hillhouse Capital, discovered hundreds of zero-days with 119 CVEs, and automates POC generation and validation to reduce false positives.
fromZero Day Initiative
3 months ago

Zero Day Initiative - Pwn2Own Automotive 2026 - Day One Results

Welcome to Day One of Pwn2Own Automotive 2026! Today, 30 entries are taking the Pwn2Own stage to target the latest automotive systems, as the world's top security researchers push technology to its limits. Exploits, surprises, and breakthrough discoveries are already unfolding - follow along here for updates throughout the day as the competition continues. Stay up to date by following us on Twitter, Mastodon, LinkedIn, and Bluesky, and join the conversation using #Pwn2Own Automotive and #P2OAuto for continuous coverage.
Information security
fromTheregister
4 months ago

Microsoft now buys bugs, with or without a bounty program

Under the new model, MSRC will pay researchers who report critical vulnerabilities that have a demonstrable impact on Microsoft's online services. "Regardless of whether the code is owned and managed by Microsoft, a third party, or is open source, we will do whatever it takes to remediate the issue," Gallagher said. "Our goal is to incentivize research on the highest risk areas, especially the areas that threat actors are most likely to exploit."
Information security
Information security
fromTechzine Global
7 months ago

Wiz launches Incident Response service for cloud security crises

Wiz Incident Response provides forensic cloud investigation, rapid containment, and recovery integrated with Wiz Defend and Runtime Sensor to reduce cloud and AI attack impact.
[ Load more ]