Researchers poke holes in OpenAI’s new browser as standards bodies fear U.S. businesses are “sleepwalking” into an AI governance crisis. (Photo illustration by Cheng Xin/Getty
Using commercially available equipment, researchers scanned 39 satellites and observed sensitive, encrypted communications from telecoms, businesses and the U.S. military.
This photograph taken on January 13, 2025 in Toulouse shows screens displaying the logo of Grok, a generative artificial intelligence chatbot developed by xAI, the American company specializing in artificial intelligence and it’s founder South African businessman Elon Musk. (Photo by Lionel BONAVENTURE / AFP) (Photo by LIONEL BONAVENTURE/AFP via Getty Images)
Application Attack Matrix is a community effort designed to help defenders and organizations better understand and define how attackers use and exploit weaknesses in applications.
Experts told CyberScoop the research 'doesn’t pass a sniff test' and detracts from needed conversations around credential abuse and information stealers.
To defend “target rich, resource poor” critical infrastructure from cyberattacks, the U.S. must expand its patchwork volunteer system, a new report concludes.
Some browser extension permissions are too broad, and owners can quickly repurpose pre-approved capabilities for malicious intent, a security researcher told CyberScoop.
Researchers aren’t aware of active exploitation in the wild, but they warn the risk for publicly exposed and unpatched Ingress Nginx controllers is extremely high.
Ransomware groups last year achieved lateral movement within an average of 48 minutes after gaining initial access to targeted environments, threat intelligence experts said.