Ravie LakshmananApr 29, 2026Vulnerability / Cloud Security In yet another instance of threat actors…
hours
-
-
A high-severity security flaw in LMDeploy, an open-source toolkit for compressing, deploying, and serving…
-
eSecurity Planet content and product recommendations are editorially independent. We may make money when…
-
Ravie LakshmananApr 10, 2026Vulnerability / Threat Intelligence A critical security vulnerability in Marimo, an open-source…
-
Application SecuritySecurity
Z.ai unveils GLM-5.1, enabling AI coding agents to run autonomously for hours
Chinese AI company Z.ai has launched GLM-5.1, an open-source coding model it says is…
-
Iranian hacker group Handala Hack Team, the collective behind the famed cyberattack on U.S.…
-
A critical security flaw impacting Langflow has come under active exploitation within 20 hours…
-
After multiple infrastructure scale-up attempts failed to handle the backlog and retry volumes, Microsoft…
-
Ukraine’s cyber defenders warn Russian hackers weaponized a Microsoft zero-day within 24 hours of…
-
eSecurity Planet content and product recommendations are editorially independent. We may make money when…
