Subscribe to our weekly newsletter for the latest in industry news, expert insights, dedicated information security content and online events.
CursorJack shows how malicious MCP deeplinks in Cursor IDE can trigger user-approved code execution
Armis reveals that “mutually assured disruption” is no longer preventing state-backed attacks
DNS-based attack in AWS Bedrock AgentCore lets AI sandboxes exfiltrate cloud data
In a world where attackers innovate without central permission, defenders must learn to do the same
The critical vulnerability affecting both cloud and self-hosted n8n instances requires no authentication or even n8n account to be exploited
CISA issued urgent directive as attackers exploit Cisco SD-WAN flaw granting admin access to networks