Anthropic Unveils ‘Claude Mythos’ – A Cybersecurity Breakthrough That Could Also Supercharge Attacks

New AI model drives Project Glasswing, a effort to secure critical software before advanced capabilities fall into the wrong hands.
The post Anthropic Unveils ‘Claude Mythos’ – A Cybersecurity Breakthrough That Could Also Supercharge Attacks appe… Continue reading Anthropic Unveils ‘Claude Mythos’ – A Cybersecurity Breakthrough That Could Also Supercharge Attacks

Mobile Attack Surface Expands as Enterprises Lose Control

Shadow AI embedded in everyday apps, combined with outdated mobile devices and zero-click exploits, is creating a new and largely unseen mobile risk.
The post Mobile Attack Surface Expands as Enterprises Lose Control appeared first on SecurityWeek.
Continue reading Mobile Attack Surface Expands as Enterprises Lose Control

Critical Vulnerability in Claude Code Emerges Days After Source Leak

Within days of each other, Anthropic first leaked the source code to Claude Code, and then a critical vulnerability was found by Adversa AI.
The post Critical Vulnerability in Claude Code Emerges Days After Source Leak appeared first on SecurityWeek.
Continue reading Critical Vulnerability in Claude Code Emerges Days After Source Leak

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Report shows how industrialized credential theft underpins ransomware, SaaS breaches, and geopolitical attacks, shifting security focus from prevention to detecting misuse of legitimate access.
The post Stolen Logins Are Fueling Everything From Ransomw… Continue reading Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

Critical Vulnerability in OpenAI Codex Allowed GitHub Token Compromise 

Researchers found an OpenAI Codex vulnerability that could have been exploited to compromise GitHub tokens.
The post Critical Vulnerability in OpenAI Codex Allowed GitHub Token Compromise  appeared first on SecurityWeek.
Continue reading Critical Vulnerability in OpenAI Codex Allowed GitHub Token Compromise 

Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

LLMs can write complex Rego and Cedar code in seconds, but a single missing condition or hallucinated attribute can quietly dismantle your organization’s least-privilege security model.
The post Silent Drift: How LLMs Are Quietly Breaking Organizationa… Continue reading Silent Drift: How LLMs Are Quietly Breaking Organizational Access Control

AI Speeds Attacks, But Identity Remains Cybersecurity’s Weakest Link

PwC finds AI is amplifying speed and scale of attacks, as identity theft evolves into a cybercriminal supply chain.
The post AI Speeds Attacks, But Identity Remains Cybersecurity’s Weakest Link appeared first on SecurityWeek.
Continue reading AI Speeds Attacks, But Identity Remains Cybersecurity’s Weakest Link

Iran Readied Cyberattack Capabilities for Response Prior to Epic Fury

Analysis reveals a six-month buildup of Iran-linked cyber infrastructure, including US-based shell companies, designed to weather kinetic strikes and ensure the resilience of its global hacking operations.
The post Iran Readied Cyberattack Capabilities… Continue reading Iran Readied Cyberattack Capabilities for Response Prior to Epic Fury