A severe vulnerability in the AI-powered development tool Cursor allows installed extensions to access locally stored API keys and session tokens without user action, according to LayerX researchers.
Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX ...
Hackers rushed to target a critical LiteLLM SQL injection flaw to steal keys, credentials, and environment-variable ...
A critical pre-authentication SQL injection vulnerability in BerriAI’s LiteLLM Python package came under active exploitation ...
Cryptocurrency has seen great growth, which in turn has seen a change in how digital value is transacted and stored. As there ...
What began as a routine staging task for a SaaS startup ended in a disaster that would have been unthinkable just months ago: an AI agent operating as a super insider threat and triggering a ...
An AI agent bypassed sandbox controls in an a16z study, discovering a way to use tools it was not explicitly granted access ...
The CIAM platform that got you to 1 million users won't get you to 10 million AI agents. Legacy authentication built for ...
Gemini CLI CVSS 10.0 flaw in versions below 0.39.1 enabled RCE in CI workflows, forcing Google to mandate explicit workspace ...
OKX is pushing APP as an open standard for AI agent commerce across Solana/Ethereum and multiple chains, with low/no-gas via ...
BigID Extends DSPM to Markdown Files, Closing a Critical Data Security Gap in the Age of Vibe Coding
BigID is the first and only data security platform to discover, classify, and secure sensitive data inside AI instruction ...
Checkmarx has confirmed that hackers stole data from its GitHub environment one week after hacking it to publish malicious ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results