This week saw attacks on Claude Code users, LastPass users, Starlink users, and, perhaps worst of all, people who needed an ...
Research: Google has patched 9 Looker Studio flaws identified by Tenable that exposed cross-tenant data risks and enabled potential SQL injection and data exfiltration.
A serious security vulnerability has been discovered in the Ally plugin for WordPress. The flaw could allow attackers to ...
Tenable Research has uncovered a series of security vulnerabilities in Google Looker Studio, dubbed "LeakyLooker," that allowed attackers to run arbitrary SQL queries on victims’ databases and ...
Tenable Research revealed "LeakyLooker," a set of nine novel cross-tenant vulnerabilities in Google Looker Studio. These flaws could have let attackers exfiltrate or modify data across Google services ...
Researchers at red-team security startup CodeWall say their AI agent hacked McKinsey's internal AI platform and gained full read and write access to the chatbot in just two hours. It's yet another ...
First of four parts Before we can understand how attackers exploit large language models, we need to understand how these models work. This first article in our four-part series on prompt injections ...
When Anthropic launched the Model Context Protocol (MCP) in 2024, the idea was simple but powerful – a universal “USB-C” for ...
As businesses rely more on software to deliver products and services, it is vital to secure their applications against threats such as code injection, data breaches, and privilege escalation.
SafeLine self-hosted WAF blocks SaaS bot abuse with 99.45% accuracy, cutting fake sign-ups and stabilizing CPU usage.
Developer-first security tool blocks AI manipulation attacks in under 100 milliseconds with a single API call Our goal ...
AI-assisted development accelerates software delivery but expands the threat surface. From prompt injection and malicious MCP ...