A severe vulnerability in the AI-powered development tool Cursor allows installed extensions to access locally stored API keys and session tokens without user action, according to LayerX researchers.
Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX ...
A hardcoded ClickUp API key exposed hundreds of corporate and government emails for over a year, raising new SaaS security ...
Hackers rushed to target a critical LiteLLM SQL injection flaw to steal keys, credentials, and environment-variable ...
Cryptocurrency has seen great growth, which in turn has seen a change in how digital value is transacted and stored. As there ...
What began as a routine staging task for a SaaS startup ended in a disaster that  would have been unthinkable just months ago: an AI agent operating as a super insider threat and triggering a ...
Learn how to set up Model Context Protocol (MCP) to transform Claude Code into an AI agent capable of web automation and ...
Gemini CLI CVSS 10.0 flaw in versions below 0.39.1 enabled RCE in CI workflows, forcing Google to mandate explicit workspace ...
An AI agent bypassed sandbox controls in an a16z study, discovering a way to use tools it was not explicitly granted access ...
OKX is pushing APP as an open standard for AI agent commerce across Solana/Ethereum and multiple chains, with low/no-gas via ...
Software security testing outfit Checkmarx has become the latest organization caught up in an ongoing attack on security-tool providers. The biz said data posted online appears to have come from one ...
The way forward - treating non-human actors as important citizens of trust, making observability a security tool, and ...