Scroll down for all the latest news and information on secure coding.
Subscribe to our weekly newsletter for the latest in industry news, expert insights, dedicated information security content and online events.
Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX
macOS LOTL techniques bypass detection using native tools and metadata abuse
ZionSiphon malware targets OT water systems with sabotage and ICS scanning capabilities
GPUBreach uses GPU Rowhammer on GDDR6 to flip bits, corrupt page tables and escalate to system root
OpenAI’s Safety Bug Bounty program seeks to address AI safety vulnerabilities beyond traditional security flaws
DNS-based attack in AWS Bedrock AgentCore lets AI sandboxes exfiltrate cloud data