Researchers say they’ve discovered a supply-chain attack flooding repositories with malicious packages that contain invisible ...
Google has patched a high-severity zero-day bug in its Chrome Web browser that attackers are actively exploiting. It paves the way for code execution and other cyberattacks on targeted endpoints. The ...
A legitimate Google ad could lead to data exfiltration through a chain of Claude flaws.
Magecart hides payload in favicon EXIF via third-party scripts, bypassing static analysis and stealing checkout data at ...
Anthropic's tendency to wave off prompt-injection risks is rearing its head in the company's new Cowork productivity AI, which suffers from a Files API exfiltration attack chain first disclosed last ...
A new proof-of-concept attack shows that malicious Model Context Protocol servers can inject JavaScript into Cursor’s browser — and potentially leverage the IDE’s privileges to perform system tasks.
Threats actors pounced on the vulnerability within hours of its disclosure, demonstrating that organizations have little time ...