Aggregator
Claude AI Uncovers 22 Firefox Vulnerabilities in Two Weeks
Artificial intelligence models are rapidly evolving from simple coding assistants into highly capable, autonomous vulnerability researchers. Recently, Anthropic’s Claude Opus 4.6 demonstrated this by uncovering over 500 zero-day vulnerabilities in heavily scrutinized open-source projects. During a two-week collaborative engagement with Mozilla in February 2026, the AI model identified 22 unique security flaws within the Firefox […]
The post Claude AI Uncovers 22 Firefox Vulnerabilities in Two Weeks appeared first on Cyber Security News.
VPN или тюрьма? Иранские операторы поставили пользователей перед крайне неприятным выбором
Linux Rootkits Using Advanced eBPF and io_uring Techniques
Linux rootkits have quietly grown into one of the most dangerous threats facing modern infrastructure. For years, attackers focused primarily on Windows-based systems, but the rise of Linux in cloud environments, container orchestration, IoT, and high-performance computing has shifted that calculus. Today, threat actors are engineering Linux rootkits that exploit cutting-edge kernel features, making them […]
The post Linux Rootkits Using Advanced eBPF and io_uring Techniques appeared first on Cyber Security News.
Anthropic and the Pentagon
OpenAI is in and Anthropic is out as a supplier of AI technology for the US defense department. This news caps a week of bluster by the highest officials in the US government towards some of the wealthiest titans of the big tech industry, and the overhanging specter of the existential risks posed by a new technology powerful enough that the Pentagon claims it is essential to national security. At issue is Anthropic’s insistence that the US Department of Defense (DoD) could not use its models to facilitate “mass surveillance” or “fully autonomous weapons,” provisions the defense secretary Pete Hegseth ...
The post Anthropic and the Pentagon appeared first on Security Boulevard.
Auth0 Vendor Evaluation: Authentication, SSO, Access Management & CIAM Analysis (2026)
A detailed Auth0 vendor evaluation covering authentication, SSO, authorization, and CIAM capabilities. Learn about Auth0 pricing, scalability, strengths, risks, and how it compares with modern alternatives like SSOJet.
The post Auth0 Vendor Evaluation: Authentication, SSO, Access Management & CIAM Analysis (2026) appeared first on Security Boulevard.
Раздвоение Альтмана: пообещал не давать ИИ военным для слежки… и через 12 часов разрешил всё за $200 миллионов
900+ Certificates Used by Fortune 500, Governments Exposed by Key Leaks
AI as tradecraft: How threat actors operationalize AI
Threat actors are operationalizing AI to scale and sustain malicious activity, accelerating tradecraft and increasing risk for defenders, as illustrated by recent activity from North Korean groups such as Jasper Sleet and Coral Sleet (formerly Storm-1877).
The post AI as tradecraft: How threat actors operationalize AI appeared first on Microsoft Security Blog.
Microsoft 365 Outage Hits North America as CDN Misconfiguration Disrupts Multiple Services
Microsoft is actively investigating a service disruption affecting multiple Microsoft 365 products for users in the North American region, with engineers pointing to Content Delivery Network (CDN) configuration issues as the likely root cause. The incident, tracked in the Microsoft 365 admin center, began on March 6, 2026, and remains under active investigation as of […]
The post Microsoft 365 Outage Hits North America as CDN Misconfiguration Disrupts Multiple Services appeared first on Cyber Security News.