Latest Tech News

Stay updated with the latest in technology, AI, cybersecurity, and more

Filtered by: vulnerabilities Clear Filter

Max severity Cisco ISE bug allows pre-auth command execution, patch now

A critical vulnerability (CVE-2025-20337) in Cisco's Identity Services Engine (ISE) could be exploited to let an unauthenticated attacker store malicious files, execute arbitrary code, or gain root privileges on vulnerable devices. The security issue received the maximum severity rating, 10 out of 10, and is caused by insufficient user-supplied input validation checks. It was discovered by Kentaro Kawane, a researcher at the Japanese cybersecurity service GMO Cybersecurity by Ierae, and report

Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot

Dozens of Gigabyte motherboard models run on UEFI firmware vulnerable to security issues that allow planting bootkit malware that is invisible to the operating system and can survive reinstalls. The vulnerabilities could allow attackers with local or remote admin permissions to execute arbitrary code in System Management Mode (SMM), an environment isolated from the operating system (OS) and with more privileges on the machine. Mechanisms running code below the OS have low-level hardware access

Cybersecurity’s global alarm system is breaking down

Cybersecurity practitioners have since flooded Discord channels and LinkedIn feeds with emergency posts and memes of “NVD” and “CVE” engraved on tombstones. Unpatched vulnerabilities are the second most common way cyberattackers break in, and they have led to fatal hospital outages and critical infrastructure failures. In a social media post, Jen Easterly, a US cybersecurity expert, said: “Losing [CVE] would be like tearing out the card catalog from every library at once—leaving defenders to sor

Hundreds of Brother printer models have security flaw that can't be patched

This could allow bad actors to remotely access these devices. A security company has found eight security vulnerabilities that impact hundreds of Brother printer models. The company has released firmware updates to handle seven of these vulnerabilities, but one security flaw cannot be patched. Brother has indicated that it'll fix the remaining issue during the manufacturing process of future printers, which doesn't help current owners. The company recommends that users change the default main

History made as Al claims number one spot among world's top ethical hackers

What just happened? Just a year after its founding, cybersecurity startup Xbow has risen to the top of the HackerOne leaderboard, a platform that ranks the world's most effective bug hunters by the number and severity of vulnerabilities they uncover for major companies. This marks the first time an artificial intelligence system has claimed the number one spot, outpacing thousands of human ethical hackers and security researchers who have traditionally dominated the field. Xbow's rapid ascent i

AI tool Xbow becomes first non-human to top ethical hacker leaderboard

What just happened? Just a year after its founding, cybersecurity startup Xbow has risen to the top of the HackerOne leaderboard, a platform that ranks the world's most effective bug hunters by the number and severity of vulnerabilities they uncover for major companies. This marks the first time an artificial intelligence system has claimed the number one spot, outpacing thousands of human ethical hackers and security researchers who have traditionally dominated the field. Xbow's rapid ascent i

AI Agents Are Getting Better at Writing Code—and Hacking It as Well

The latest artificial intelligence models are not only remarkably good at software engineering—new research shows they are getting ever-better at finding bugs in software, too. AI researchers at UC Berkeley tested how well the latest AI models and agents could find vulnerabilities in 188 large open source codebases. Using a new benchmark called CyberGym, the AI models identified 17 new bugs including 15 previously unknown, or “zero-day,” ones. “Many of these vulnerabilities are critical,” says

XBOW, an autonomous penetration tester, has reached the top spot on HackerOne

For the first time in bug bounty history, an autonomous penetration tester has reached the top spot on the US leaderboard. Our path to reaching the top ranks on HackerOne began with rigorous benchmarking. Since the early days of XBOW, we understood how crucial it was to measure our progress, and we did that in two stages: First we tested XBOW with existing CTF challenges (from well-known providers like PortSwigger and Pentesterlab), then quickly moved on and built our own unique benchmark that