OpenAI launches Codex Security, an AI agent-vulnerability scanner that helps developers find and fix high-impact holes in their code.
The evolution of vulnerability management in the agentic era is characterized by continuous telemetry, contextual prioritization and the ultimate goal of agentic remediation.
Can free AI scanners replace enterprise SAST? Anthropic and OpenAI found 500-plus zero-days pattern-matching tools missed — and both scanners are free.
Codex Security, formerly Aardvark⁠, has found hundreds of critical vulnerabilities in tested software in the past month.
Cybersecurity stocks fell for a second day in a row after Anthropic unveiled Claude Code Security on Friday. CrowdStrike's CEO pushed back on the disruption fears in a LinkedIn post over the weekend.
Cyberthreat intelligence provider VulnCheck Inc. today announced that it had raised $25 million in new funding to scale growth and expand its intelligence capabilities. Founded in 2021, Vulncheck ...
Users could be tricked into running arbitrary code, but the issue was patched last week. February 17, 2026 Add as a preferred source on Google Add as a preferred source on Google Microsoft patched a ...
╔═══════════════════════════════════════════════════════════════╗ ║ ║ ║ CVE-2026-1731 ║ ║ BeyondTrust RS/PRA Passive ...
Bad actors could use the flaw to remotely load and execute malicious files on a victim’s computer. Bad actors could use the flaw to remotely load and execute malicious files on a victim’s computer. is ...
The U.S. federal government is rethinking how to support its globally adopted vulnerability tracking ecosystem after years of backlogs, funding scares and growing doubts about whether the existing ...
New York, 27 January 2026 — United Nations Secretary-General António Guterres has appointed 15 leading experts to the Independent Expert Advisory Panel for the Multidimensional Vulnerability Index ...
Microsoft has released emergency out-of-band security updates to patch a high-severity Microsoft Office zero-day vulnerability exploited in attacks. The security feature bypass vulnerability, tracked ...