Google DeepMind paper warns AI agents can be hijacked by malicious web content
Google DeepMind researchers are warning that autonomous AI agents face a growing security problem from what they call “AI Agent Traps.” In their paper, the…
Google DeepMind researchers are warning that autonomous AI agents face a growing security problem from what they call “AI Agent Traps.” In their paper, the…
More than 2,000 FortiClient EMS instances appear reachable from the public internet at a time when Fortinet has confirmed in-the-wild exploitation of a critical FortiClient…
CISA has added CVE-2026-3502, a TrueConf Client vulnerability, to its Known Exploited Vulnerabilities catalog after confirming active exploitation. The agency says federal civilian agencies must…
A new open-source security tool called METATRON is drawing attention because it runs AI-assisted penetration testing workflows entirely on the local machine. According to the…
A newly uncovered npm supply chain attack used 36 malicious packages disguised as Strapi plugins to target a cryptocurrency payment environment with Redis exploitation, credential…
A newly documented Windows remote access trojan called ResokerRAT uses Telegram’s Bot API as its command-and-control channel, giving attackers a way to control infected systems…
Security researchers are warning about a fresh phishing campaign that uses fake Microsoft Teams meeting pages to trick users into installing malware. The reported lure…
Anthropic has shipped a fix for a Claude Code security issue that could let long shell command chains slip past developer-set deny rules in older…
Developers who installed [email protected] or [email protected] on March 31 should treat those systems as compromised. Axios maintainer Jason Saayman confirmed that two malicious versions were…
A malicious site posing as ILSpy appears to have redirected visitors toward malware on April 6, 2026, but one key part of the sample article…