Cursor extension flaw can expose developer API keys and session tokens
A newly disclosed Cursor security issue can let any installed extension access developer API keys and session tokens stored on the local machine. Researchers at…
A newly disclosed Cursor security issue can let any installed extension access developer API keys and session tokens stored on the local machine. Researchers at…
A critical cPanel and WHM vulnerability is now under active exploitation, and administrators need to patch exposed servers immediately. The flaw is tracked as CVE-2026-41940…
Austrian and Albanian authorities have dismantled a large online investment fraud network that caused more than €50 million in losses. The operation targeted several scam…
SonicWall has released firmware updates for three SonicOS vulnerabilities affecting Gen 6, Gen 7, and Gen 8 firewalls. The flaws can let attackers reach management…
A new EtherRAT variant is targeting Windows users through a fake Tftpd64 installer that was hosted on a malicious GitHub repository. The campaign shows how…
A malicious npm package named tanstack was used to steal developer secrets by impersonating the real TanStack project. Security researchers found that the unscoped package…
A newly disclosed ProFTPD vulnerability can allow attackers to turn a SQL injection bug into authentication bypass, privilege escalation, or remote code execution in some…
CISA has added CVE-2024-1708, a ConnectWise ScreenConnect path traversal vulnerability, to its Known Exploited Vulnerabilities catalog after confirming active exploitation. The warning matters because ScreenConnect…
KarstoRAT is a newly observed Windows remote access trojan that gives attackers deep control over infected systems. It can capture webcam images, record audio, log…
Hackers exploited two authentication bypass vulnerabilities in the Qinglong task scheduler to run cryptominers on publicly exposed servers. The attacks targeted self-hosted Qinglong panels and…