This article has been updated to adjust the total number of hacks and scams in the first quarter to $482 million and the ...
According to a new report from blockchain security firm Hacken, Web3 hacks resulted in $482 million in losses during the ...
Plus: The FBI says a recent hack of its wiretap tools poses a national security risk, attackers stole Cisco source code as ...
Concerns about code vulnerabilities are fading in the crypto space, but more sophisticated scam tactics are emerging as protocol security improves. Crypto hackers stole $3.3 billion in 2025, but the ...
Ledger’s Charles Guillemet says artificial intelligence is making hacks cheaper and faster, forcing a rethink of how crypto ...
BURLINGTON, Mass.--(BUSINESS WIRE)--Veracode, a global leader in application risk management, today unveiled its 2025 GenAI Code Security Report, revealing critical security flaws in AI-generated code ...
Crypto hackers took social engineering to a whole other level this year, and advances in artificial intelligence mean scams are about to get even harder to detect. The majority of crypto exploits in ...
The code generated by large language models (LLMs) has improved some over time — with more modern LLMs producing code that has a greater chance of compiling — but at the same time, it's stagnating in ...
The AI platform said Friday it’s adding vulnerability scanning capabilities into its web-based Claude Code tool in a move to compete with application security vendors. Anthropic announced Friday it is ...
Code quality testing startup SonarSource SA today announced the upcoming release of SonarQube Advanced Security, a new offering that will extend the company’s analysis capabilities beyond first-party ...
Q1: How does Claude Code Security function—and how does it differ from traditional static application security testing (SAST)? A1: Conventional rule-based static analysis uses pattern matching, ...
A tool can be used well or poorly, but much of the time it is neither inherently good nor bad. Take vibe coding, the act of using natural language to instruct an LLM to generate code. Applied poorly, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results