Please turn on your JavaScript for this page to function normally.
Enterprises are losing track of the devices inside their networks

Security teams are often surprised when they discover the range and number of devices connected to their networks. The total goes far beyond what appears in agent-based …

PortGPT
PortGPT: How researchers taught an AI to backport security patches automatically

Keeping older software versions secure often means backporting patches from newer releases. It is a routine but tedious job, especially for large open-source projects such as …

privacy
Connected homes: Is bystander privacy anyone’s responsibility?

Smart doorbells, connected cameras, and home monitoring systems have become common sights on doorsteps and living rooms. They promise safety and convenience, but they also …

zero trust
A new way to think about zero trust for workloads

Static credentials have been a weak point in cloud security for years. A new paper by researchers from SentinelOne takes direct aim at that issue with a practical model for …

face
Your photo could be all AI needs to clone your voice

A photo of someone’s face may be all an attacker needs to create a convincing synthetic voice. A new study from Australia’s national science agency explores this …

AI agents
AI agents can leak company data through simple web searches

When a company deploys an AI agent that can search the web and access internal documents, most teams assume the agent is simply working as intended. New research shows how …

user
Scammers target international students by threatening their visa status

In 2025, the U.S. government revoked thousands of visas from international students, often without warning or explanation. According to a newly released study, this opened a …

earbud
Can your earbuds recognize you? Researchers are working on it

Biometric authentication has moved from fingerprints to voices to facial scans, but a team of researchers believes the next step could be inside the ear. New research explores …

Model Context Protocol (MCP)
Faster LLM tool routing comes with new security considerations

Large language models depend on outside tools to perform real-world tasks, but connecting them to those tools often slows them down or causes failures. A new study from the …

AI agent
AI’s split personality: Solving crimes while helping conceal them

What happens when investigators and cybercriminals start using the same technology? AI is now doing both, helping law enforcement trace attacks while also being tested for its …

forget
Most AI privacy research looks the wrong way

Most research on LLM privacy has focused on the wrong problem, according to a new paper by researchers from Carnegie Mellon University and Northeastern University. The authors …

A new approach to blockchain spam: Local reputation over global rules

Spam has long been a nuisance in blockchain networks, clogging transaction queues and driving up fees. A new research paper from Delft University of Technology introduces a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools