Vulnerability in Cursor AI Editor Allows PC Takeover
Opening a project folder in certain code editors can lead to the covert execution of malicious commands, experts at SlowMist warned.
Vulnerability in Cursor AI Editor Allows PC Takeover
Opening a project folder in certain code editors can lead to the covert execution of malicious commands, experts at SlowMist warned.
a16z Identifies Privacy as Key Focus for Crypto Market in 2026
Privacy is a crucial feature necessary for the development of global blockchain finance, and by 2026, it will become a key protective barrier for the crypto industry. This is according to a blog post by a16z crypto.
Chainalysis Proposes New Measures Against North Korean Hackers
The cryptocurrency industry must reassess its security strategies to halt record-breaking thefts by North Korean hackers, according to Andrew Firman from Chainalysis.
Prompt Injection Emerges as a Major Threat to AI Browsers
OpenAI disclosed vulnerabilities in AI browsers and measures to bolster the security of its solution — Atlas.
Chrome’s Free VPN Collected AI Chat Histories, Report Reveals
Israeli security firm Koi uncovered a large-scale data collection operation through a free extension for the Google Chrome browser.
Anthropic Unveils First AI-Driven Cyber Espionage Operation
In September, Anthropic's threat analysis team identified and disrupted an unprecedented AI-driven cyber espionage campaign.
402bridge protocol loses more than 17,000 USDC
On October 27, an unknown hacker attacked the 402bridge cross-chain bridge and stole 17,693 USDC.
402bridge loses over 17,000 USDC
On October 27, an unknown hacker attacked the 402bridge cross-chain bridge and stole tokens worth 17,693 USDC.
Satellite Communications Found Unencrypted: Researchers Intercept Military Data
Geostationary satellites used for data transmission to remote areas broadcast confidential information. Anyone can intercept it.
Former Google CEO Warns of AI’s Security Risks
Eric Schmidt, the former head of Google, highlighted the significant risks associated with artificial intelligence and noted its vulnerability to hacking.We use cookies to improve the quality of our service.
By using this website, you agree to the Privacy policy.