Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vector and Embedding Weaknesses in AI Systems

AI security threats are evolving at roughly the same speed that AI itself is: extremely fast. One of the most recent—and least understood—vulnerabilities involves vector and embedding weaknesses. These issues have gained attention with their addition to the OWASP Top 10 for LLMs, and the risks are becoming more urgent as Retrieval-Augmented Generation (RAG) continues to dominate enterprise AI adoption.

MITRE CVE Program Uncertainty: Mend.io's commitment to uninterrupted vulnerability protection

As many of you may know, MITRE’s DHS contract to manage the CVE and CWE programs expired on April 16, 2025. While emergency funding has since been restored for a short time, the long-term future of these programs still remains uncertain. Understandably, this situation has raised concerns throughout the cybersecurity community about the stability and continuity of vulnerability tracking and management systems that many organizations have come to rely upon.

Homograph attacks: How hackers exploit look-alike domains

Several years ago, a security researcher discovered a vulnerability in Google Chrome that allowed fake domains to bypass the browser’s security measures. The researcher registered a domain that appeared as “xn--80ak6aa92e.com” but displayed as “apple.com” in the browser, demonstrating how easy it was to deceive users. This is just one example of what’s known as a homograph attack, or sometimes a ‘look-a-like domain’.

Snyk Partners with Nova8 to Empower Secure Development Across Latin America

The Latin American technology landscape is growing rapidly, with organizations embracing digital transformation and cloud-native development. This growth brings incredible opportunities to this market – but can also introduce significant security challenges that can slow innovation if not addressed proactively.

Closing the Gap: How to Build a Consistent Exposure and Vulnerability Management Workflow

Security teams are faced with an ongoing challenge when it comes to exposure and vulnerability management. It’s not the actual discovery of the vulnerability that poses the challenge, but what to do once you discover one. Without a structured process, IT and security teams struggle to address vulnerabilities efficiently, and are in a constantly reactive mode, and struggle to address vulnerabilities efficiently, increasing potential risks.

Claude AI BLEW MY MIND! (Board Game Challenge)

In this video, I challenge Claude AI to a head-to-head match in the board game King of Tokyo Duel. I walk the AI through the rules, give it everything it needs to understand how to play, and then we battle it out! Claude picks up the game shockingly fast — its strategy, decision-making, and logic were next-level. I was seriously mind-blown at how intelligent it was… Should we put this to the test with other AI's like ChatGPT?

Proton66 Part 1: Mass Scanning and Exploit Campaigns

Trustwave SpiderLabs continuously tracks a range of malicious activities originating from Proton66 ASN, including vulnerability scanning, exploit attempts, and phishing campaigns leading to malware infections. In this two-part series, SpiderLabs explores the malicious traffic associated with Proton66, revealing the extent and nature of these attacks.