Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.
| 30 Mar 2026 | |
| Written by Gabi Gerber | |
| Attacks & Threats |
| Hacking Topics, Security Operation Center |
Ransomware attackers have switched their tactics from encrypting production systems to disabling backup infrastructure. This evolution has raised the stakes for organizations, as compromised backups eliminate recovery paths, said Anthony Cusimano, chief evangelist and director of solutions marketing at Object First. More here
A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and thus use them to engage in further malicious activity. More...
The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environment… More...
Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandle… More...
AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones. More...
The prompt-injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that all… More...
A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and thus use them to engage in further malicious activity. More...
The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environment… More...
Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandle… More...
AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones. More...
The prompt-injection vulnerability in the agentic AI product for filesystem operations was a sanitization issue that all… More...