Google's TIG documented 90 zero-day vulnerabilities exploited in 2025, up from 78 in 2024; commercial spyware vendors and China-linked groups led the abuse
Google's TIG documented 90 zero-day vulnerabilities exploited in 2025, up from 78 in 2024; commercial spyware vendors and China-linked groups led the abuse
Of the 90 zero-days GTIG tracked in 2025, 43 hit enterprise tech — Zero-day exploitation targeting enterprise tech products reached …
Anthropic launches Claude Code Security, which “scans codebases for security vulnerabilities and suggests targeted software patches”; cybersecurity stocks fall
Anthropic launches Claude Code Security, which “scans codebases for security vulnerabilities and suggests targeted software patches”; cybersecurity stocks fall
Shares of cybersecurity software companies tumbled Friday after Anthropic PBC introduced a new security feature into its Claude AI model.
Anthropic launches Claude Code Security, which “scans codebases for security vulnerabilities and suggests targeted software patches”; cybersecurity stocks fall
Shares of cybersecurity software companies tumbled Friday after Anthropic PBC introduced a new security feature into its Claude AI model.
OpenAI and Paradigm announce EVMbench, a benchmark that measures how well AI agents can detect, exploit, and patch high-severity smart contract vulnerabilities
Making smart contracts safer by evaluating AI agents' ability to detect, patch, and exploit vulnerabilities in blockchain environments.
OpenAI and Paradigm announce EVMbench, a benchmark that measures how well AI agents can detect, exploit, and patch high-severity smart contract vulnerabilities
Making smart contracts safer by evaluating AI agents' ability to detect, patch, and exploit vulnerabilities in blockchain environments.
Researchers detail WhisperPair, vulnerabilities in Google's Fast Pair protocol affecting 17 audio device models from 10 brands; Google rolled out updates
Flaws in how 17 models of headphones and speakers use Google's one-tap Fast Pair Bluetooth protocol have left devices open to eavesdroppers and stalkers.
Amazon unveils its Autonomous Threat Analysis system, born from a 2024 internal hackathon, to use AI agents competing in teams to identify vulnerabilities
Born out of an internal hackathon, Amazon's Autonomous Threat Analysis system uses a variety of specialized AI agents to detect weaknesses … Bluesky: @wired.com Bluesky: @wired.com : Born out of an in...
X replaces DMs with Chat, a new messaging system that it says is E2EE, supports file sharing, video calling, and more, rolling out first to iOS and the web
Launching a new chat app is just about the hardest thing you can do in tech. X: @chat : Say hello to Chat - all-new secure messaging on X. • end-to-end encrypted chats and file sharing • edit, delete,...