Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at...
Day: 29 April 2026
Researchers uncover a malicious npm dependency linked to an AI‑assisted code commit that steals sensitive data and...
KELA claims infostealers remained the primary access vector for attacks in 2025
The Vect 2.0 ransomware wipes large files instead of merely encrypting them, making recovery impossible – even...
RunSafe report reveals most attacks on medical devices disrupt patient care
