Open source software with more than 1 million monthly downloads was compromised after a threat actor exploited a ...
A Cairo-based artificial intelligence startup has released Horus 1.0-4B, a fully open-source large language model built in Egypt that outperforms several ...
As supply-chain attacks against widely-used, open-source software repositories continue, experts are urging developers to not ...
A design choice in the MCP SDKs allows remote code execution across the AI supply chain.
An unpatched vulnerability in Anthropic's Model Context Protocol creates a channel for attackers, forcing banks to manage the ...
A practical guide to Perplexity Computer: multi-model orchestration, setup and credits, prompting for outcomes, workflows, ...
CVE-2026-5760 (CVSS 9.8) exposes SGLang via /v1/rerank endpoint, enabling RCE through malicious GGUF models, risking server ...
A design flaw – or expected behavior based on a bad design choice, depending on who is telling the story – baked into ...
Perplexity launches its “Personal Computer” AI assistant for Mac, enabling users to automate tasks across apps, files, and ...
Unsafe defaults in MCP configurations open servers to possible remote code execution, according to security researchers who ...
Hackers are exploiting a critical vulnerability in Marimo reactive Python notebook to deploy a new variant of NKAbuse malware ...
However, in a report published on April 15, researchers at Ox Security claimed that a flaw in the protocol could enable ...