AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes
22
Aug
2025

AI Systems Can Generate Working Exploits for Published CVEs in 10-15 Minutes

Artificial intelligence systems can automatically generate functional exploits for newly published Common Vulnerabilities and Exposures (CVEs) in just 10-15 minutes…

NIST Releases New Control Overlays to Manage Cybersecurity Risks in AI Systems
22
Aug
2025

NIST Releases New Control Overlays to Manage Cybersecurity Risks in AI Systems

The National Institute of Standards and Technology (NIST) has unveiled a comprehensive initiative to address the growing cybersecurity challenges associated…

Kill-Switch Malware
22
Aug
2025

Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware

Aug 22, 2025Ravie LakshmananCybercrime / Malware A 55-year-old Chinese national has been sentenced to four years in prison and three…

22
Aug
2025

14 Million-Download SHA JavaScript Library Exposes Users to Hash Manipulation Attacks

A critical security vulnerability has been discovered in the widely-used sha.js npm package, exposing millions of applications to sophisticated hash…

AI gives ransomware gangs a deadly upgrade
22
Aug
2025

AI gives ransomware gangs a deadly upgrade

Ransomware continues to be the major threat to large and medium-sized businesses, with numerous ransomware gangs abusing AI for automation,…

Windows Docker Desktop Vulnerability Allows Full Host Compromise
22
Aug
2025

Windows Docker Desktop Vulnerability Allows Full Host Compromise

A critical vulnerability in Docker Desktop for Windows has been discovered that allows any container to achieve full host system…

The new battleground for CISOs is human behavior
22
Aug
2025

The new battleground for CISOs is human behavior

Attackers don’t always need a technical flaw. More often, they just trick your people. Social engineering works, and AI makes…

ChatGPT-5 Downgrade Attack Allows Hackers to Evade AI Defenses With Minimal Prompts
22
Aug
2025

ChatGPT-5 Downgrade Attack Allows Hackers to Evade AI Defenses With Minimal Prompts

Security researchers from Adversa AI have uncovered a critical vulnerability in ChatGPT-5 and other major AI systems that allows attackers…

Local governments struggle to defend critical infrastructure as threats grow
22
Aug
2025

Local governments struggle to defend critical infrastructure as threats grow

A small-town water system, a county hospital, and a local school district may not seem like front-line targets in global…

New infosec products of the week: August 22, 2025
22
Aug
2025

New infosec products of the week: August 22, 2025

Here’s a look at the most interesting products from the past week, featuring releases from Doppel, Druva, LastPass, and StackHawk….

Microsoft plans full quantum-resistant cryptography transition by 2033
22
Aug
2025

Microsoft plans full quantum-resistant cryptography transition by 2033

Microsoft has outlined a timeline to protect its services and customers from future quantum computing threats that could render current…

ChatGPT-5 Downgrade Attack Let Hackers Bypass AI Security With Just a Few Words
22
Aug
2025

ChatGPT-5 Downgrade Attack Let Hackers Bypass AI Security With Just a Few Words

A critical vulnerability in OpenAI’s latest flagship model, ChatGPT-5, allows attackers to sidestep its advanced safety features using simple phrases….