Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX ...
A malicious version of the PyTorch Lightning package published on the Python Package Index (PyPI) delivers a ...
Vercel breached after attacker compromised Context.ai, hijacked an employee's Google Workspace via OAuth, and accessed ...
A new report from ReversingLabs identified a new tactic by North Korean hackers: feeding malicious code to the AI systems ...
Explore the top 10 new and promising API testing tools in 2025-2026 that are transforming the testing landscape.
Chainguard, the trusted source for open source, today announced a partnership with Cursor, the leading multi-model AI coding platform, to secure the next generation of agentic software development.
A single line of Python code was all it took. Developers who ran import lightning after installing versions 2.6.2 or 2.6.3 of ...
Malicious Lightning 2.6.2/2.6.3 released April 30 enable credential theft via hidden payload, leading to PyPI quarantine and ...
GitHub facades and Ethereum smart contracts power a March 2026 admin-targeted campaign, enabling resilient C2 rotation and ...
Run a quick self-audit against 10 warning signs that your authentication stack has critical vulnerabilities. Each sign includes a diagnostic check, an explanation of why it's dangerous, and a concrete ...
Sometime in early 2026, a routine vulnerability scan turned into something far worse for machine learning teams that depend ...