Researchers Analyze Challenges in Building LLM-Driven Security Workflows
New research explores the practical challenges and operational hurdles of integrating LLMs into security operations centers for automated alert triage.
Stories cluster related articles into a single narrative, linked to the underlying CVEs and affected products. 288 stories synthesized.
New research explores the practical challenges and operational hurdles of integrating LLMs into security operations centers for automated alert triage.
New research reveals that ten of the most popular workplace apps are collecting up to 19 distinct data points from users' mobile devices.
The latest SANS ISC Stormcast podcast episode provides a summary of current cybersecurity threats and developments for security professionals.
Educational technology firm Instructure has confirmed a data breach involving the theft of student and user information, including names, email addresses, and private messages.
OpenAI has expanded its Advanced Account Security features for ChatGPT, introducing stronger login methods, shorter session times, and improved data privacy controls.
Microsoft Defender is incorrectly flagging legitimate DigiCert root certificates as malicious, leading to potential system instability and connectivity issues.
Wireshark 4.6.5 has been released, patching 43 vulnerabilities in a significant update driven by AI-assisted research.
The U.S. military has partnered with seven major tech firms to integrate AI capabilities into classified defense systems.
A widespread fraud campaign is abusing Telegram's Mini App feature to impersonate brands, run crypto scams, and distribute Android malware.
A weekly review highlights the emergence of AI-driven criminal activity on gig platforms alongside persistent threats like Linux kernel vulnerabilities.
CISA has added CVE-2026-33825, a Microsoft Defender vulnerability, to its Known Exploited Vulnerabilities (KEV) Catalog due to evidence of active exploitation.
CISA has added the Marimo remote code execution vulnerability (CVE-2026-39987) to its Known Exploited Vulnerabilities Catalog following evidence of active exploitation.
APT actors are using the FIRESTARTER backdoor to target Cisco Firepower and Secure Firewall devices for network persistence, according to a joint advisory from CISA and the UK NCSC.
CISA and international partners have released an advisory on defending against China-nexus covert networks that exploit compromised infrastructure, noting a shift in threat actor tactics.
CISA has released multiple ICS advisories detailing critical vulnerabilities in products from Hardy Barth, Siemens, Zero Motorcycles, SenseLive, Intrado, Yadea, and Milesight, with potential impacts ranging from remote code execution to complete system compromise.
CISA has issued multiple ICS advisories for critical vulnerabilities in IP cameras, GNSS receivers, booking systems, and network analysis tools.
CISA and federal partners have released new guidance on applying Zero Trust security principles to Operational Technology (OT) environments.
CISA has added the critical cPanel & WHM vulnerability CVE-2026-41940 to its Known Exploited Vulnerabilities (KEV) Catalog due to active exploitation.
CISA has issued six new ICS advisories detailing critical vulnerabilities in various ABB industrial products, ranging from authentication bypasses to remote code execution risks.
CISA and international partners have released new guidance on the secure adoption and management of agentic artificial intelligence systems.
CISA has added the Linux kernel vulnerability CVE-2026-31431 to its Known Exploited Vulnerabilities (KEV) Catalog following reports of active exploitation.
The newly identified ConsentFix v3 attack technique is targeting Microsoft Azure environments by automating the abuse of OAuth consent flows.
A new phishing kit called Bluekit is currently under development, featuring an integrated AI assistant to automate domain registration and phishing operations.
Cybersecurity company Trellix has confirmed a breach of its source code repository, prompting an investigation by forensic experts and law enforcement.