AI-powered Cursor IDE vulnerable to prompt-injection attacks

2025-08-0113:00

Ionut Ilascu

A vulnerability that researchers call CurXecute is present in almost all versions of the AI-powered code editor Cursor, and can be exploited to execute remote code with developer privileges. [...]

Pwn2Own hacking contest pays $1 million for WhatsApp exploit

2025-08-0110:40

Sergiu Gatlan

The Zero Day Initiative is offering a $1 million reward to security researchers who will demonstrate a zero-click WhatsApp exploit at its upcoming Pwn2Own Ireland 2025 hacking contest. [...]

Kali Linux can now run in Apple containers on macOS systems

2025-07-3118:46

Lawrence Abrams

Cybersecurity professionals and researchers can now launch Kali Linux in a virtualized container on macOS Sequoia using Apple's new containerization framework. [...]

Microsoft to disable Excel workbook links to blocked file types

2025-07-3118:26

Sergiu Gatlan

Microsoft has announced that it will start disabling external workbook links to blocked file types by default between October 2025 and July 2026. [...]

Microsoft now pays up to $40,000 for some .NET vulnerabilities

2025-07-3117:23

Sergiu Gatlan

Microsoft has expanded its .NET bug bounty program and increased rewards to $40,000 for some .NET and ASP.NET Core vulnerabilities. [...]

CISA open-sources Thorium platform for malware, forensic analysis

2025-07-3116:43

Sergiu Gatlan

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, an open-source platform for malware and forensic analysts across the government, public, and private sectors. [...]

<
1