SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories

By connecting powerful language models like GPT-4o and Claude Sonnet 3.5 to real-world tools, the open-source tool SWE-agent allows them to autonomously perform complex tasks: from fixing bugs in live GitHub repositories and solving cybersecurity chall… Continue reading SWE-agent: Open-source tool uses LLMs to fix issues in GitHub repositories

The dark side of YouTube: Malicious links, phishing, and deepfakes

With billions of users, YouTube has become a tempting target for cybercriminals. They post malicious links in video descriptions and comments. Some send phishing emails to creators, posing as sponsors but attaching malware. Others hijack popular channe… Continue reading The dark side of YouTube: Malicious links, phishing, and deepfakes

Skyhawk Security enhances Autonomous Purple Team to secure custom cloud apps

Skyhawk Security expanded its AI-powered Autonomous Purple Team to include custom cloud applications. For the first time, organizations can preemptively and continuously secure custom cloud applications and their cloud infrastructure without agents. Th… Continue reading Skyhawk Security enhances Autonomous Purple Team to secure custom cloud apps

Verizon discovers spike in ransomware and exploited vulnerabilities

Verizon’s 2025 Data Breach Investigations Report noted a 37% increase in ransomware attacks and a 34% increase in exploited vulnerabilities.

The post Verizon discovers spike in ransomware and exploited vulnerabilities appeared first on CyberScoop.

Continue reading Verizon discovers spike in ransomware and exploited vulnerabilities

Verizon discovers spike in ransomware and exploited vulnerabilities

Verizon’s 2025 Data Breach Investigations Report noted a 37% increase in ransomware attacks and a 34% increase in exploited vulnerabilities.

The post Verizon discovers spike in ransomware and exploited vulnerabilities appeared first on CyberScoop.

Continue reading Verizon discovers spike in ransomware and exploited vulnerabilities