More than 1000 ComfyUI servers are exposed to the internet. Attackers exploit misconfigurations to add instances to a botnet.
The CVSS‑9.3 vulnerability allows unauthenticated remote code execution on exposed Marimo servers and was exploited in the wild shortly after disclosure, Sysdig says.
WhoWhatWhy on MSNOpinion

Saturday hashtag: #SilentDigitalStorm

Welcome to Saturday Hashtag, a weekly place for broader context. Saturday Hashtag: #SilentDigitalStorm originally appeared on ...
The activity centres on unauthenticated ComfyUI deployments and the platform’s custom node ecosystem, which lets users add ...
GL Communications Inc., a global provider of voice testing solutions, announces significant enhancements to its SIP testing platform, enabling high-load, secure and automated generation of voice, ...
Meta pauses Mercor partnership after a major data breach raises concerns over exposure of sensitive AI training data.
It's a solved problem, but I actually prefer a simple web UI.
FEATURE Two supply chain attacks in March infected open source tools with malware and used this access to steal secrets from ...
Hackers are exploiting a critical vulnerability in Marimo reactive Python notebook to deploy a new variant of NKAbuse malware ...
Over 1,000 exposed ComfyUI instances exploited via unauthenticated code execution, enabling Monero mining and botnet expansion.
Automated tools hitting the same endpoints repeatedly? Throttled or banned. This is where web residential proxies step in.
How mature is your AI agent security? VentureBeat's survey of 108 enterprises maps the gap between monitoring and isolation — ...