#vulnerability-analysis

[ follow ]
fromArs Technica
1 week ago

Mozilla: Anthropic's Mythos found 271 zero-day vulnerabilities in Firefox 150

Computers were completely incapable of doing this a few months ago, and now they excel at it. We have many years of experience picking apart the work of the world's best security researchers, and Mythos Preview is every bit as capable.
Information security
#ai
fromSecurityWeek
2 weeks ago
Information security

OpenAI Widens Access to Cybersecurity Model After Anthropic's Mythos Reveal

OpenAI launched GPT-5.4-Cyber, a cybersecurity AI model, expanding access to verified defenders and enhancing capabilities for vulnerability analysis.
fromTechzine Global
2 weeks ago
Information security

GPT-5.4-Cyber aims to further embed AI in cybersecurity

OpenAI's GPT-5.4-Cyber enhances generative AI for cybersecurity, focusing on defensive applications and providing trusted users with advanced capabilities.
Information security
fromSecurityWeek
2 weeks ago

OpenAI Widens Access to Cybersecurity Model After Anthropic's Mythos Reveal

OpenAI launched GPT-5.4-Cyber, a cybersecurity AI model, expanding access to verified defenders and enhancing capabilities for vulnerability analysis.
Information security
fromTechzine Global
2 weeks ago

GPT-5.4-Cyber aims to further embed AI in cybersecurity

OpenAI's GPT-5.4-Cyber enhances generative AI for cybersecurity, focusing on defensive applications and providing trusted users with advanced capabilities.
Information security
fromInfoWorld
6 months ago

OpenAI launches Aardvark to detect and patch hidden bugs in code

Aardvark integrates into development pipelines to provide continuous, automated vulnerability analysis, repository-wide threat modeling, and sandboxed exploit validation.
Information security
fromSecurityWeek
7 months ago

Top 25 MCP Vulnerabilities Reveal How AI Agents Can Be Exploited

Model Context Protocol is essential for safe agentic AI but contains exploitable vulnerabilities; comprehensive vulnerability catalogs and standards mapping are needed for mitigation.
E-Commerce
fromHackernoon
9 months ago

How to Find Smart Contract Vulnerabilities Before Exploit Happen | HackerNoon

AVVERIFIER serves as a real-time detector of vulnerabilities in smart contracts.
[ Load more ]