AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers 

Palo Alto Networks has developed Zealot, a multi-agent penetration testing PoC capable of reconnaissance, exploitation, and exfiltration. 
The post AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers  appeared first on SecurityWe… Continue reading AI Can Autonomously Hack Cloud Systems With Minimal Oversight: Researchers 

Google Antigravity in Crosshairs of Security Researchers, Cybercriminals

Researchers discovered a remote code execution vulnerability and cybercriminals are using its reputation to deliver malware.
The post Google Antigravity in Crosshairs of Security Researchers, Cybercriminals appeared first on SecurityWeek.
Continue reading Google Antigravity in Crosshairs of Security Researchers, Cybercriminals

Unsecured Perforce Servers Expose Sensitive Data From Major Orgs

Things are improving, but a researcher has still identified over 1,500 Perforce P4 instances allowing attackers to read files on the server.
The post Unsecured Perforce Servers Expose Sensitive Data From Major Orgs appeared first on SecurityWeek.
Continue reading Unsecured Perforce Servers Expose Sensitive Data From Major Orgs

Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000

Data breaches were disclosed by Southern Illinois Dermatology, Saint Anthony Hospital, and North Texas Behavioral Health Authority.
The post Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000 appeared first on SecurityWeek.
Continue reading Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000

Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking

Forescout researchers discovered 20 new vulnerabilities in Lantronix and Silex products and described theoretical attack scenarios.
The post Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking appeared first on SecurityWeek.
Continue reading Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking