Back to Feed

Tag

Tools

50 items tagged #tools

Articles

Socket raises $60M Series C at a $1B valuation to secure software supply chains for AI-driven development

Socket raises $60M Series C at $1B valuation to defend software supply chains against AI-era attacks.

GitHub Breach: TeamPCP Steals 3,800 Repositories via VS Code Extension

TeamPCP steals 3,800 GitHub repositories via poisoned VS Code extension, demands $95K

Pwn2Own Berlin 2026 Closes With $1.3 Million in Zero-Day Payouts

Pwn2Own Berlin 2026 concludes with 47 zero-day exploits demonstrated and $1.3M in payouts.

Hackers Earn $1.3 Million at Pwn2Own Berlin 2026

Pwn2Own Berlin 2026 awards $1.3M for 47 zero-day exploits across Windows, Linux, VMware, Nvidia, and AI products.

RDP Stealer with Windows Defender Bypass https://t.co/4jNuZxUJMZ

RDP stealer malware discovered with Windows Defender evasion capability.

PoC Code Published for Critical NGINX Vulnerability

PoC code published for critical NGINX heap buffer overflow vulnerability (CVE-2026-42945).

The Next Cybersecurity Challenge May Be Verifying AI Agents

Industry develops verification standards for autonomous AI agents operating in enterprise systems.

Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and Tools

Unit 42 analyzes AD CS exploitation techniques including template misconfigurations and shadow credential misuse.

Windows 11 and Microsoft Edge hacked at Pwn2Own Berlin 2026

Pwn2Own Berlin 2026 day one: researchers exploit 24 zero-days in Windows 11, Edge, Linux, and AI tools for $523K.

18-year-old NGINX vulnerability allows DoS, potential RCE

18-year-old NGINX heap buffer overflow vulnerability allows DoS and potential RCE.

How AI Hallucinations Are Creating Real Security Risks

AI hallucinations pose critical security risks in infrastructure decision-making through confident but inaccurate

F5 Patches Over 50 Vulnerabilities

F5 patches over 50 vulnerabilities in BIG-IP, BIG-IQ, and NGINX products.

Dell confirms its SupportAssist software causes Windows BSOD crashes

Dell SupportAssist v5.5.16.0 causes Windows BSOD crashes on affected systems.

High-Severity Vulnerability Patched in VMware Fusion

Broadcom patches high-severity TOCTOU privilege escalation flaw in VMware Fusion.

Researchers say AI just broke every benchmark for autonomous cyber capability

Claude Mythos Preview and GPT-5.5 break autonomous cyber capability benchmarks, solving previously unsolvable attack

Security advisories | Mistral Docs

TanStack supply chain attack compromises Mistral AI SDK packages on npm and PyPI

Microsoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own Code

Microsoft MDASH and Palo Alto's Claude Mythos AI find dozens of vulnerabilities in their own code.

Microsoft's MDASH AI System Finds 16 Windows Flaws Fixed in Patch Tuesday

Microsoft's MDASH AI system discovered 16 Windows flaws, including 2 critical RCE vulnerabilities, fixed in May 2026

Defense at AI speed: Microsoft’s new multi-model agentic security system tops leading industry benchmark

Microsoft announces MDASH, an AI agentic system that discovered 16 new Windows vulnerabilities including four Critical

Defense at AI speed: Microsoft’s new multi-model agentic security system finds 16 new vulnerabilities

Microsoft announces MDASH AI system that discovered 16 new Windows vulnerabilities including 4 critical RCE flaws.

Microsoft and Adobe Patch Tuesday, May 2026 Security Update Review

Microsoft patches 137 vulnerabilities including 30 critical; Adobe addresses 52 vulnerabilities with 27 critical in May

Signal adds security warnings for social engineering, phishing attacks

Signal adds in-app warnings to combat phishing and social engineering via linked device abuse.

Microsoft May 2026 Patch Tuesday fixes 120 flaws, no zero-days

Microsoft May 2026 Patch Tuesday fixes 120 flaws with 17 critical vulnerabilities, no zero-days.

‼️ Nightmare-Eclipse has just released two new GitHub repositories... Same user behind RedSun, Un...

Threat actor releases two new exploitation tools: YellowKey (BitLocker bypass) and GreenPlasma (Windows privilege

When Responder forces a NetBIOS election and wins https://t.co/wihk8U3OKM

Responder tool exploits NetBIOS election mechanism to intercept network traffic.

SAP Patches Critical S/4HANA, Commerce Vulnerabilities

SAP patches 15 critical and high-severity vulnerabilities in S/4HANA, Commerce, and other enterprise products.

Why Agentic AI Is Security's Next Blind Spot

Agentic AI systems running in production lack security team oversight and understanding, creating emerging blind spots.

iOS 26.5 Brings Default End-to-End Encrypted RCS Messaging Between iPhone and Android

Apple iOS 26.5 enables end-to-end encrypted RCS messaging by default across iPhone and Android devices.

‼️AIRDC advertised as AI-powered hidden remote desktop control tool for Windows targets A threat...

AIRDC, an AI-powered hidden remote desktop control tool, advertised for sale by threat actors targeting Windows.

Build Application Firewalls Aim to Stop the Next Supply Chain Attack

Build Application Firewalls emerge as defense against supply chain attacks targeting CI/CD pipelines.

Your Purple Team Isn't Purple — It's Just Red and Blue in the Same Room

Purple team security model fails due to process friction, tool fragmentation, and inability to match AI-powered

Checkmarx Jenkins AST Plugin Compromised in Supply Chain Attack

Checkmarx Jenkins AST plugin compromised with malicious version published to Jenkins Marketplace.

Hackers Hijack JDownloader Site to Deliver Malware Through Installers

JDownloader website compromised to distribute malware via modified installers on May 6-7, 2026.

ClaudeBleed Vulnerability Lets Hackers Hijack Claude Chrome Extension to Steal Data

ClaudeBleed vulnerability in Claude Chrome extension allows data exfiltration via guardrail bypass.

Flaw in Claude’s Chrome extension allowed ‘any’ other plugin to hijack victims’ AI

Chrome extension flaw in Anthropic's Claude allows malicious plugins to hijack AI agent without permissions.

One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk

Analysis of 25M security alerts reveals 1% of confirmed incidents came from low-severity alerts, with one missed threat

Pentest-Tools.com Releases Free Scanner for CVE-2026-41940 as cPanel Authentication Bypass Enters Its Third Week of Active Exploitation

Pentest-Tools releases free scanner for CVE-2026-41940, critical cPanel auth bypass actively exploited for 3 weeks.

Vulnerability in Claude Extension for Chrome Exposes AI Agent to Takeover

ClaudeBleed vulnerability in Claude Chrome extension allows attackers to hijack AI agent via prompt injection.

Researcher Shows Edge Browser Stores Saved Passwords in Plaintext

Microsoft Edge stores saved passwords in plaintext memory, making them easily accessible to attackers.

Chrome 148 Rolls Out With 127 Security Fixes

Chrome 148 released with 127 security fixes including three critical vulnerabilities.

Threat actors leverage LLMs to accelerate development of malicious browser extensions. These exte...

Threat actors use LLMs to develop malicious browser extensions disguised as AI tools.

Attackers Could Exploit AI Vision Models Using Imperceptible Image Changes

Cisco researchers reveal pixel-level perturbation attacks bypass vision-language model safety filters.

'TrustFall' Convention Exposes Claude Code Execution Risk

Malicious code repositories trigger execution in Claude, Cursor, Gemini, and CoPilot CLIs via inadequate warnings.

Google Chrome Accused of Silently Installing 4GB AI Model on User Devices

Google Chrome silently installs 4GB Gemini Nano AI model without user consent.

‼️ Nuclei template for fingerprinting the PAN-OS CVE-2026-0300 zero-day: https://t.co/rqQGxeDcFG...

Nuclei template released for detecting PAN-OS CVE-2026-0300 zero-day vulnerability.

Before the Breach, There Was a Test Environment

QA and test environments pose production-grade security risks through misconfigurations and excessive permissions.

Google's Android Apps Get Public Verification to Stop Supply Chain Attacks

Google expands Binary Transparency for Android to detect supply chain attacks on Google apps.

‼️ PhishLab V1, a new phishing-as-a-service panel, is allegedly being sold on a hacking forum, ma...

PhishLab V1 phishing-as-a-service panel offered on hacking forum with 2FA bypass claims.

The EOL Blind Spot in Your CVE Feed: What SCA Tools Miss

SCA tools miss critical vulnerabilities in EOL open source software due to CVE investigation gaps and tracking blind

Anti-Tampering Kernel Driver Deep Dive We have found an interesting WHQL-signed vulnerable kerne...

WHQL-signed vulnerable kernel driver from DNP Hypertech abuses ObCallbacks to hide processes.