Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.
| 19 Mar 2026 | |
| Written by Gabi Gerber | |
| Attacks & Threats |
| Hacking Topics, Security Operation Center |
Cybersecurity companies are not immune from the same kind of attacks they help their customers defend against — but a successful compromise could have big consequences for their customers in ways that other hacks don't.
A recent example of attackers targeting security vendors is a phishing attack aimed at a C-level executive at security firm Outpost24 that was engineered to bypass multiple layers of enterprise email security without triggering a single alert.
Read more here
Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandled memory files will continue to threaten AI systems. More...
AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones. More...
The prompt-injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that all… More...
Chained Bypasses Exfiltrate Data Via Hidden AI Prompts More...
Attackers can abuse the near-maximum severity flaw in nginx-ui to restart, create, modify, and delete NGINX configuratio… More...
Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandled memory files will continue to threaten AI systems. More...
AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones. More...
The prompt-injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that all… More...
Chained Bypasses Exfiltrate Data Via Hidden AI Prompts More...
Attackers can abuse the near-maximum severity flaw in nginx-ui to restart, create, modify, and delete NGINX configuratio… More...