In its latest report, "The State of Cybercrime 2026: Emerging Threats & Predictions," KELA, a prominent threat intelligence firm, highlights the evolving landscape of...
Security Flaw in AI Development Environment Exposes Developers to Credential Theft
In a significant discovery, security researchers from LayerX have identified a critical vulnerability in the widely-used AI-enhanced development platform, Cursor. Termed "CursorJacking," this vulnerability carries a high severity rating with a Common Vulnerability Scoring...
In its latest report, "The State of Cybercrime 2026: Emerging Threats & Predictions," KELA, a prominent threat intelligence firm, highlights the evolving landscape of...
AppSec is Dead, Long Live AI Security: A Provocative Statement in a Shifting Landscape
The provocative declaration "AppSec is Dead, Long Live AI Security" has garnered attention within the cybersecurity community, sparking debates about the future of application security. Such a bold and dramatic claim...
In its latest report, "The State of Cybercrime 2026: Emerging Threats & Predictions," KELA, a prominent threat intelligence firm, highlights the evolving landscape of...
High-Severity Vulnerability in Cursor: A Major Threat to Developer Security
A newly identified high-severity vulnerability within Cursor, an AI-powered development tool, has raised significant concerns regarding the security of sensitive user data. This flaw allows installed extensions to access critical information such as API keys...
A recently released report from Arctic Wolf has unveiled a significant cyber theft campaign orchestrated by hackers linked to the notorious Lazarus Group from...
Microsoft 365 Mailbox Rules Misused for Data Exfiltration and Persistence: A Growing Concern
In a concerning trend, cybersecurity experts have identified that malicious actors are exploiting Microsoft 365 mailbox rules as a means to conduct data exfiltration and maintain persistence within compromised environments. This development...