News

CSO Online
csoonline.com > article > 4152133 > cybersecurity-in-the-age-of-instant-software.html

Cybersecurity in the age of instant software

1+ day, 3+ hour ago  (836+ words) AI is changing cybersecurity as well. In particular, AI systems are getting better at finding and patching vulnerabilities in code. This has implications for both attackers and defenders, depending on the ways this and related technologies improve. In this essay,…...

CSO Online
csoonline.com > article > 4153288 > vim-and-gnu-emacs-claude-code-helpfully-found-zero-day-exploits-for-both.html

Vim and GNU Emacs: Claude Code helpfully found zero-day exploits for both

1+ day, 3+ hour ago  (611+ words) Developers can spend days using fuzzing tools to find security weaknesses in code. Alternatively, they can simply ask an LLM to do the job for them in seconds. The catch: LLMs are evolving so rapidly that this convenience might come…...

CSO Online
csoonline.com > article > 4152830 > anthropic-employee-error-exposes-claude-code-source-2.html

Anthropic employee error exposes Claude Code source

1+ day, 18+ hour ago  (362+ words) However, Anthropic spokesperson told CSO, "no sensitive customer data or credentials were involved or exposed. This was a release packaging issue caused by human error, not a security breach. We're rolling out measures to prevent this from happening again." But…...

CSO Online
csoonline.com > article > 4152696 > attackers-trojanize-axios-http-library-in-highest-impact-npm-supply-chain-attack.html

Attackers trojanize Axios HTTP library in highest-impact npm supply chain attack

1+ day, 18+ hour ago  (737+ words) In their analysis, Snyk researchers also noted the sophistication of techniques involved in the attack. Shortly after midnight UTC on March 31 a new version of the Axios package, [email protected], was published on npm followed by [email protected] 39 minutes later. Both listed…...

CSO Online
csoonline.com > article > 4152658 > 5-month-old-f5-big-ip-dos-bug-becomes-critical-rce-exploited-in-the-wild.html

5-month-old F5 BIG-IP DoS bug becomes critical RCE exploited in the wild

1+ day, 21+ hour ago  (461+ words) BIG-IP APM is F5s secure access solution that allows enterprises, service providers, and government agencies to control authentication, authorization, and VPN access across remote, mobile, and cloud environments. The Shadowserver Foundation currently tracks over 240,000 F5 BIG-IP instances on the internet, but its…...

CSO Online
csoonline.com > article > 4151983 > 8-ways-to-bolster-your-security-posture-on-the-cheap.html

8 ways to bolster your security posture on the cheap

2+ day, 12+ hour ago  (966+ words) As every CISO knows, maintaining a strong cybersecurity posture is costly. What's not so well known is that there are many ways cybersecurity can be enhanced with the help of relatively trivial investments. Simply by thinking creatively, a security leader…...

CSO Online
csoonline.com > article > 4151814 > langchain-path-traversal-bug-adds-to-input-validation-woes-in-ai-pipelines.html

LangChain path traversal bug adds to input validation woes in AI pipelines

3+ day, 9+ hour ago  (436+ words) Security researchers are warning that applications using AI frameworks without proper safeguards can expose sensitive information in basic, yet critical, non-AI ways. According to a recent Cyera analysis, widely used AI orchestration tools, LangChain and LangGraph, are vulnerable to critical…...

CSO Online
csoonline.com > article > 4151801 > leak-reveals-anthropics-mythos-a-powerful-ai-model-aimed-at-cybersecurity-use-cases.html

Leak reveals Anthropic’s ‘Mythos,’ a powerful AI model aimed at cybersecurity use cases

3+ day, 9+ hour ago  (722+ words) Anthropic didn't intend to introduce Mythos this way. Details of what it calls its most capable AI model yet surfaced through a data leak in its content management system (CMS), revealing a LLM with sharply improved reasoning and coding skills....

CSO Online
csoonline.com > article > 4151367 > why-kubernetes-controllers-are-the-perfect-backdoor.html

Why Kubernetes controllers are the perfect backdoor

5+ day, 23+ hour ago  (691+ words) In my years securing cloud-native environments, I've noticed a recurring blind spot. We obsess over the "front doors" such as exposed dashboards, misconfigured RBAC, or unpatched container vulnerabilities. We harden the perimeter, but we often ignore the machinery humming inside....

CSO Online
csoonline.com > article > 4148315 > apis-are-the-new-perimeter-heres-how-cisos-are-securing-them.html

APIs are the new perimeter: Here’s how CISOs are securing them

1+ week, 5+ day ago  (1619+ words) We used to talk about defense-in-depth and endpoint protection," says Sean Murphy, CISO at BECU, a nationwide credit union. That morphed into identity, and now the API is the new perimeter." BECU's backend architecture is heavily based on microservices and…...