Researchers Identify 2.9 Billion Compromised Credentials

In its latest report, "The State of Cybercrime 2026: Emerging Threats & Predictions," KELA, a prominent threat intelligence firm, highlights the evolving landscape of...

Cursor AI Extension Vulnerability Exposes Developer Tokens to Credential Theft

Security Flaw in AI Development Environment Exposes Developers to Credential Theft In a significant discovery, security researchers from LayerX have identified a critical vulnerability in the widely-used AI-enhanced development platform, Cursor. Termed "CursorJacking," this vulnerability carries a high severity rating with a Common Vulnerability Scoring...

Europe Moves Towards Mandatory Online Age Verification

Meta Ruling Points to Obligatory Verification in the EU In a landmark decision indicative of...

Malicious npm Dependency Associated with AI-Driven Commit Targets in Cryptocurrency

A recently identified malicious npm (Node Package Manager) dependency has come to light, linked...

Researchers Identify 2.9 Billion Compromised Credentials

In its latest report, "The State of Cybercrime 2026: Emerging Threats & Predictions," KELA,...

Cursor AI Extension Vulnerability Exposes Developer Tokens to Credential Theft

Security Flaw in AI Development Environment Exposes Developers to Credential Theft In a significant discovery,...

Cyber Briefing – April 29, 2026 – CyberMaterial

Cybersecurity Alert: Critical Vulnerabilities and Regulatory Changes Shape the Landscape In the ever-evolving realm of...

AppSec Is Dead: Long Live AI Security

AppSec is Dead, Long Live AI Security: A Provocative Statement in a Shifting Landscape The...

Researchers Identify 2.9 Billion Compromised Credentials

In its latest report, "The State of Cybercrime 2026: Emerging Threats & Predictions," KELA, a prominent threat intelligence firm, highlights the evolving landscape of...

Europe Moves Towards Mandatory Online Age Verification

Meta Ruling Points to Obligatory Verification in the EU In a landmark decision indicative of...

Malicious npm Dependency Associated with AI-Driven Commit Targets in Cryptocurrency

A recently identified malicious npm (Node Package Manager) dependency has come to light, linked...

Europe Moves Towards Mandatory Online Age Verification

Meta Ruling Points to Obligatory Verification in the EU In a landmark decision indicative of...
spot_img

Cyber Balkans

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Methods for detecting PaperCut vulnerabilities are circumventable, and Iranian cyber attackers are now involved. A fresh breed of ransomware uses VPNs to penetrate its...

PaperCut vulnerability detection methods have recently been discovered to be easily bypassed, allowing hackers...

Advancements in AI Cybersecurity: Utilizing ChatGPT to Remain Ahead of Cyber Criminals

The field of cybersecurity has rapidly evolved in recent times as the world becomes...

Cursor AI Extension Vulnerability Exposes Developer Tokens to Credential Theft

Security Flaw in AI Development Environment Exposes Developers to Credential Theft In a significant discovery,...

Cyber Briefing – April 29, 2026 – CyberMaterial

Cybersecurity Alert: Critical Vulnerabilities and Regulatory Changes Shape the Landscape In the ever-evolving realm of...

Lazarus Targets macOS Users with New Mach-O Man Malware Kit

New Threat from Lazarus Group: “Mach-O Man” Targets macOS Users The cyber threat landscape continues...

Delilah Schwartz from Cybersixgill Talks About the Evolving Dark Web and New Threats from ChatGPT and Other AI Technologies.

Delilah Schwartz, a cyber threat analyst from Cybersixgill, has recently given an insightful interview...

What is a Passkey?

Passkeys continue their rise in popularity as an alternative form of user authentication that...

ProofPoint Report: Cybersecurity Stress Resurfaces Following a Brief Calm

A recent survey conducted by cybersecurity firm ProofPoint has revealed that 68% of Chief...

Salt Security collaborates with leading API testing experts in IT security

Salt Security has launched its Salt Technical Ecosystem Partner (STEP) program, aimed at helping...

Risk and Repeat: Are data extortion attacks equivalent to ransomware?

The threat landscape of ransomware has undergone significant changes, leading to a transformation in...

Keeper Security Secures Minority Growth Equity Investment from Summit Partners

Cybersecurity firm Keeper Security has secured a significant minority investment from global growth equity...

Malware

AppSec Is Dead: Long Live AI Security

AppSec is Dead, Long Live AI Security: A Provocative Statement in a Shifting Landscape The provocative declaration "AppSec is Dead, Long Live AI Security" has garnered attention within the cybersecurity community, sparking debates about the future of application security. Such a bold and dramatic claim...

Nokoyawa Ransomware Exploits Windows Zero Day Vulnerabilities

A report released by Kaspersky Labs recently shed light on a threat actor that...

PEGA Committee Advocates for Restrictions on Commercial Spyware

The European Parliament committee investigating the abuse of commercial spyware tools such as Pegasus...

VECT 2.0 Ransomware Permanently Destroys Files Larger than 131KB on Windows, Linux, and ESXi

Threat hunters have raised alarms regarding a new cybercriminal operation named VECT 2.0. Unlike...
spot_img

RISK MANAGEMENTS

Researchers Identify 2.9 Billion Compromised Credentials

In its latest report, "The State of Cybercrime 2026: Emerging Threats & Predictions," KELA, a prominent threat intelligence firm, highlights the evolving landscape of...

Explaining the Difference between Symmetric and Asymmetric Encryption

Data is one of the most valuable assets for any organization today. The vast...

Cyber Briefing – April 29, 2026 – CyberMaterial

Cybersecurity Alert: Critical Vulnerabilities and Regulatory Changes Shape the Landscape In the ever-evolving realm of...

Cursor Extension Flaw Exposes Developer API Keys

High-Severity Vulnerability in Cursor: A Major Threat to Developer Security A newly identified high-severity vulnerability within Cursor, an AI-powered development tool, has raised significant concerns regarding the security of sensitive user data. This flaw allows installed extensions to access critical information such as API keys...

North Korean Hackers Target Crypto Firms Using ClickFix and Zoom Tactics

A recently released report from Arctic Wolf has unveiled a significant cyber theft campaign orchestrated by hackers linked to the notorious Lazarus Group from...

Cyber Architecture

Cursor AI Extension Vulnerability Exposes Developer Tokens to Credential Theft

Security Flaw in AI Development Environment Exposes Developers to Credential Theft In a significant discovery,...

Cyber Briefing – April 29, 2026 – CyberMaterial

Cybersecurity Alert: Critical Vulnerabilities and Regulatory Changes Shape the Landscape In the ever-evolving realm of...

Critical GitHub RCE Vulnerability Exposes Millions of Repositories

GitHub Faces Major Vulnerability: Remote Code Execution Threat Uncovered A significant security vulnerability on GitHub...

A Quarter of Healthcare Organizations Report Attacks on Medical Devices

Rising Cyber Threats in Healthcare: A Deepening Crisis According to findings recently published by RunSafe...

Abuse of Microsoft 365 Mailbox Rules for Exfiltration and Persistence

Microsoft 365 Mailbox Rules Misused for Data Exfiltration and Persistence: A Growing Concern In a concerning trend, cybersecurity experts have identified that malicious actors are exploiting Microsoft 365 mailbox rules as a means to conduct data exfiltration and maintain persistence within compromised environments. This development...

All articles

Researchers Identify 2.9 Billion Compromised Credentials

In its latest report, "The State of Cybercrime 2026: Emerging Threats & Predictions," KELA,...

Cursor AI Extension Vulnerability Exposes Developer Tokens to Credential Theft

Security Flaw in AI Development Environment Exposes Developers to Credential Theft In a significant discovery,...

Europe Moves Towards Mandatory Online Age Verification

Meta Ruling Points to Obligatory Verification in the EU In a landmark decision indicative of...

Malicious npm Dependency Associated with AI-Driven Commit Targets in Cryptocurrency

A recently identified malicious npm (Node Package Manager) dependency has come to light, linked...

Cyber Briefing – April 29, 2026 – CyberMaterial

Cybersecurity Alert: Critical Vulnerabilities and Regulatory Changes Shape the Landscape In the ever-evolving realm of...

AppSec Is Dead: Long Live AI Security

AppSec is Dead, Long Live AI Security: A Provocative Statement in a Shifting Landscape The...

Cursor Extension Flaw Exposes Developer API Keys

High-Severity Vulnerability in Cursor: A Major Threat to Developer Security A newly identified high-severity vulnerability...

Lazarus Targets macOS Users with New Mach-O Man Malware Kit

New Threat from Lazarus Group: “Mach-O Man” Targets macOS Users The cyber threat landscape continues...

The New Rules of War Lack Rules

Cohesity's James Blake on Navigating Cyber Resilience Amidst Growing Threats In today's increasingly digital landscape,...

Pentagon Initiates Cyber Apprenticeship Program

The Pentagon has launched a new cyber apprenticeship program aimed at addressing the urgent...

Critical GitHub RCE Vulnerability Exposes Millions of Repositories

GitHub Faces Major Vulnerability: Remote Code Execution Threat Uncovered A significant security vulnerability on GitHub...

U.S. Charges Suspected Scattered Spider Member in Cyber Intrusions

Federal authorities have recently charged 19-year-old Peter Stokes, also known online by the pseudonym...