The Tidal Cyber 2025 Threat-Led Defense Report represents a groundbreaking shift in cybersecurity analysis by placing real adversary behavior at the forefront of defense strategies. Read the Full ...
A critical vulnerability in Grandstream GXP1600 series VoIP phones allows a remote, unauthenticated attacker to gain root privileges and silently eavesdrop on communications.
OpenAI launches EVMbench to test AI agents on smart contract security days after Claude Opus 4.6-assisted code triggered a $1.78M DeFi exploit.
Use the vitals package with ellmer to evaluate and compare the accuracy of LLMs, including writing evals to test local models.
Growing AI investment and expanding SaaS ecosystems are exposing structural weaknesses in enterprise integration environments. Info-Tech Research Group's latest findings indicate that integration ...
Codex can exploit vulnerable crypto smart contracts 72% of the time, raising urgent questions about AI-powered cyber offense and defense.
PromptSpy' appears to be the first Android malware that uses generative AI in its execution flow, according to antivirus provider ESET.
MediStreams, a leading provider of healthcare payment and remittance automation solutions, closed a record year in 2025 while advancing the industry's only true end-to-end remittance processing ...
Day 3 of the IndiaAI Impact Summit kicked off with a packed agenda as the Expo officially opened its doors to the general public, promising an up‑close look at the latest breakthroughs in artificial ...
OpenAI introduces EVMbench to measure AI crypto security. Benchmark evaluates detection, patching and exploit skills. OpenAI has launched a benchmarking system called EVMbench to evaluate how ...
Bringing AI agents and multi-modal analysis to SAST dramatically reduces the false positives that plague traditional SAST and rules-based SAST tools.
ThreatsDay Bulletin tracks active exploits, phishing waves, AI risks, major flaws, and cybercrime crackdowns shaping this week’s threat landscape.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results