AI-driven API vulnerabilities have skyrocketed by 1205% in the past year. The figures come from the 2025 API ThreatStats Report by Wallarm, which highlights how AI has become the biggest driver of API ...
Claude Mythos discovered vulnerabilities that survived 27 years of human review. This technical breakdown covers how it works ...
Lovable's API exposed source code and database credentials for 48 days after the company closed a bug report. Up to 62% of AI ...
SANTA CLARA, Calif.--(BUSINESS WIRE)--Cequence Security, a pioneer in API security and bot management, today announced that its CQ Prime Threat Research Team has identified a critical vulnerability ...
Mythos combined four separate low-severity bugs into a complete browser sandbox escape. Traditional scanners evaluate ...
Interconnected technologies are an increasingly necessary part of the trucking industry’s operations. With this rise in technologies comes an increased risk of cyberattacks. The two most prominent ...
Most companies are sitting ducks regarding API security. During my two decades in infosec, I've never seen a threat landscape evolve as rapidly and dangerously as the one surrounding APIs. And here's ...
Krystle Vermes is a Boston-based news reporter for Android Police. She is a graduate of the Suffolk University journalism program, and has more than a decade of experience as a writer and editor in ...
CSOs are being urged to quickly patch multiple vulnerabilities in Cisco Systems Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) that could allow an unauthenticated, ...