
Shadow AI: The invisible risk of IA tools outside corporate control
The massive deployment of writing assistants with IA, code copies and extensions that summarize meetings has turned a beneficial work practice into a silent risk for many companie…
News about security failures, exploits and vulnerabilities in systems

The massive deployment of writing assistants with IA, code copies and extensions that summarize meetings has turned a beneficial work practice into a silent risk for many companie…

Filtered copy of malware known as Shai-Hulud He has already jumped from the public repository to real life: security researchers have found malicious packages published in the npm…

When a phishing mail passes the filters because it seems "clean" but a click is enough to cause a serious exposure, the difference between containing the damage and facing a long …

Grafana Labs has confirmed that attackers accessed their GitHub environment and downloaded part of the source code after compromising an access token. Although the company claims …

In recent weeks we have seen a pattern that should require rethinking the security of the software: the attackers no longer agree to enter malicious code into packages or containe…

Microsoft confirms that the May 2026 security update for Windows 11 (KB5089549) can fail in teams with very little free space in the EFI (ESP) partition, causing 0x800f0922 errors…

A public concept test that takes advantage of a recently corrected vulnerability in the Linux kernel rxgk module increases the risk for systems that run kernel very close to the m…

The researcher known as Chaotic Eclipse recently published a proof-of-concept (PoC) that takes advantage of a vulnerability of climbing privileges on Windows, baptized as MiniPlas…

The Pwn2Own Berlin 2026 competition closed with a clear reminder for security officials: even fully-patched products can be violated by shackles of crashes and sophisticated techn…