17 posts were published in the last hour 10:3 : US Judge Challenges SEC, Musk Over Twitter Settlement 10:3 : Lyrie.ai Unveils Open Standard for Agent Security and Joins Anthropic’s Cyber Verification Program 10:2 : Amazon Quick Security Flaw Allowed…
US Judge Challenges SEC, Musk Over Twitter Settlement
Federal judge says settlement presents string of ‘red flags’, asking them to explain why it appears crafted to avoid personally penalising Musk This article has been indexed from Silicon UK Read the original article: US Judge Challenges SEC, Musk Over…
Lyrie.ai Unveils Open Standard for Agent Security and Joins Anthropic’s Cyber Verification Program
DUBAI, UAE — May 14, 2026 — As autonomous AI agents begin to handle everything from corporate bank transfers to sensitive code deployments, the digital world is facing a new “Wild West” scenario: millions of autonomous entities operating without a…
Amazon Quick Security Flaw Allowed Restricted Users to Access AI Chat Agents
A newly disclosed security flaw in Amazon’s AI-powered business intelligence platform has revealed how restricted users could quietly bypass controls and interact with AI chat agents, despite explicit administrative denial. The issue, discovered by Fog Security researcher Jason Kao, exposes…
Your iPhone Gets Stolen. Then the Hacking Begins
A bustling underground ecosystem is providing criminals with the tools to unlock iPhones—and wage phishing attacks against their contacts to access bank accounts and more. This article has been indexed from Security Latest Read the original article: Your iPhone Gets…
Hackers Targeted PraisonAI Vulnerability Hours After Disclosure
The first exploitation attempts were observed less than four hours after the authentication bypass was publicly disclosed. The post Hackers Targeted PraisonAI Vulnerability Hours After Disclosure appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original…
AI cyber capability is speeding past earlier projections
AI cyber capability is improving faster than expected, with newer models surpassing earlier projections, according to the UK government’s AI Security Institute (AISI). AISI measures AI cyber capability using “time horizon benchmarks”, which estimate how long AI systems can complete…
BYD Adds Fast Charging To International EV Models
Tech that can charge battery in 5 minutes comes to Europe, as BYD seeks to pose more direct challenge to petrol vehicles This article has been indexed from Silicon UK Read the original article: BYD Adds Fast Charging To International…
Hackers Hijack HWMonitor to Sideload Malicious DLL
Hackers are once again exploiting user trust in legitimate software, this time abusing the popular CPUID HWMonitor utility to deliver a stealthy remote access trojan. The malicious archive mimics a legitimate installer, highlighting how trusted tools remain a powerful lure…
GitLab Security Flaw Allows Cross-Site Scripting and Unauthenticated DoS
GitLab has issued an urgent security update to neutralise a massive wave of vulnerabilities. Threat actors could exploit these newly disclosed flaws to silently hijack developer sessions or completely paralyze continuous integration pipelines with unauthenticated attacks. GitLab Security Flaw On…
FamousSparrow targets Azerbaijani energy sector in multi-wave espionage campaign
Chinese-linked FamousSparrow repeatedly targeted an Azerbaijani oil and gas company, reusing the same entry point in three intrusions from Dec 2025 to Feb 2026. Chinese-linked threat actor FamousSparrow has conducted a sustained intrusion campaign against an Azerbaijani oil and gas…
Critical 18-Year-Old NGINX Vulnerability Enables Remote Code Execution Attacks
A critical heap buffer overflow vulnerability has been discovered in the source code of NGINX, present since 2008. This vulnerability has been publicly disclosed, along with a working proof-of-concept exploit that can enable unauthenticated remote code execution (RCE) against one…
Windows DNS Client Vulnerability Enables Remote Code Execution Attacks
A newly disclosed vulnerability in the Microsoft Windows DNS Client could let attackers silently execute malicious code across enterprise networks, exposing a massive attack surface. Officially designated as CVE-2026-41096, this critical security flaw carries a severe CVSS score of 9.8…
Seedworm APT Abuses Signed Fortemedia and SentinelOne Binaries for DLL Sideloading
Iran-linked hackers have been quietly breaking into networks around the world, and their latest campaign is more calculated than anything we have seen from them before. The group known as Seedworm, also tracked as MuddyWater, spent the first quarter of…
Packagist Urges Immediate Composer Update After GitHub Actions Token Leak
Packagist is sounding the alarm for PHP developers everywhere. A flaw in Composer, the widely used PHP dependency manager, briefly caused GitHub authentication tokens to leak into publicly visible CI logs, raising urgent concerns about credential exposure across thousands of…
Langflow CVE-2026-33017 Exploited to Steal AWS Keys and Deploy NATS Worker
Attackers are now abusing a fresh Langflow vulnerability to quietly steal cloud keys and turn victim systems into workers for a new NATS based botnet. This campaign shows how a single exposed AI workflow tool can become the start of…
Deepfake sextortion forces schools to remove student photos from websites
Experts are urging schools to take down identifiable photos of students, after AI deepfakes have led to sextortion cases at UK schools. This article has been indexed from Malwarebytes Read the original article: Deepfake sextortion forces schools to remove student…
Most Organizations Now Use AI Agents for Sensitive Security Tasks
Semperis study finds 74% of organizations believe AI will increase attacks on identity infrastructure This article has been indexed from www.infosecurity-magazine.com Read the original article: Most Organizations Now Use AI Agents for Sensitive Security Tasks
Mistral Pitches Security-Focused AI As Mythos Alternative
French start-up reportedly in talks with European banks to use upcoming model to review security of their systems This article has been indexed from Silicon UK Read the original article: Mistral Pitches Security-Focused AI As Mythos Alternative
High-Severity Vulnerability Patched in VMware Fusion
The patch was announced as Broadcom is attending the Pwn2Own hacking competition in Berlin this week. The post High-Severity Vulnerability Patched in VMware Fusion appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: High-Severity…
UK AI Chip Start-Up Fractile Raises $220m
Fractile completes Series B round valuing it at $1bn as it seeks to ease inference bottleneck for cutting-edge AI models This article has been indexed from Silicon UK Read the original article: UK AI Chip Start-Up Fractile Raises $220m
Met Police Arrest 173 In Live Facial Recognition Trial
Six-month live facial recognition trial results in an arrest every 35 minutes, including a woman wanted for more than 20 years This article has been indexed from Silicon UK Read the original article: Met Police Arrest 173 In Live Facial…
PoC Released for 18-Year-Old NGINX Flaw Allowing Remote Code Execution
A critical vulnerability in NGINX’s source code, hidden since 2008, has finally been exposed, and a working exploit is already in the wild. Security researchers at depthfirst have publicly released a proof-of-concept (PoC) exploit demonstrating unauthenticated remote code execution (RCE)…
Langflow CVE-2026-33017 Exploited to Steal AWS Keys, Deploy NATS Worker
Langflow instances left unpatched against CVE-2026-33017 are now being actively abused not just for remote code execution, but as launchpads to steal AWS keys and join a NATS-backed botnet-style worker pool dubbed “KeyHunter.” The vulnerability, now listed in CISA’s Known…