AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction
04
Aug
2025

AI-Powered Code Editor Cursor IDE Vulnerability Enables Remote Code Without User Interaction

A severe vulnerability in the popular AI-powered code editor Cursor IDE, dubbed “CurXecute,” allows attackers to execute arbitrary code on…

Lovense flaws expose emails and allow account takeover
04
Aug
2025

Lovense flaws expose emails and allow account takeover

Lovense flaws expose emails and allow account takeover Pierluigi Paganini August 04, 2025 Lovense fixed bugs exposing emails and allowing…

Vulnerabilities in Government-Linked Partner Software Allow Remote Code Attacks
04
Aug
2025

Vulnerabilities in Government-Linked Partner Software Allow Remote Code Attacks

Multiple serious security vulnerabilities have been discovered in Partner Software and Partner Web applications widely used by government agencies and…

Gartner: What to look for in a customer data platform
04
Aug
2025

Gartner: What to look for in a customer data platform

Customer data platforms (CDPs) first gained popularity among marketing users as the technology tackled the marketing function’s complex customer data…

APT37 Hackers Weaponizes JPEG Files to Attack Windows System Leveraging "mspaint.exe" File
04
Aug
2025

APT37 Hackers Weaponizes JPEG Files to Attack Windows System Leveraging “mspaint.exe” File

A sophisticated new wave of cyberattacks attributed to North Korea’s notorious APT37 (Reaper) group is leveraging advanced malware hidden within…

NestJS Vulnerability Allows Code Execution on Developer Machines
04
Aug
2025

NestJS Vulnerability Allows Code Execution on Developer Machines

A critical remote code execution vulnerability has been discovered in the popular NestJS framework that could allow attackers to execute…

week in security
04
Aug
2025

A week in security (July 28 – August 3)

August 1, 2025 – OpenAI removed a short-lived experiment that allowed ChatGPT users to make their conversations discoverable by search…

PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads
04
Aug
2025

PlayPraetor Android Trojan Infects 11,000+ Devices via Fake Google Play Pages and Meta Ads

Cybersecurity researchers have discovered a nascent Android remote access trojan (RAT) called PlayPraetor that has infected more than 11,000 devices,…

The North Korea worker problem is bigger than you think
04
Aug
2025

CrowdStrike investigated 320 North Korean IT worker cases in the past year

North Korean operatives seeking and gaining technical jobs with foreign companies kept CrowdStrike busy, accounting for almost one incident response…

Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online
04
Aug
2025

Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online

A significant security breach has compromised Microsoft’s PlayReady Digital Rights Management (DRM) system, exposing critical certificates that protect premium streaming…

Critical HashiCorp Vulnerability Allows Attackers to Run Code on Host Machine
04
Aug
2025

Critical HashiCorp Vulnerability Allows Attackers to Run Code on Host Machine

HashiCorp has disclosed a critical security vulnerability affecting its Vault products that could allow privileged operators to execute arbitrary code…

The surprising truth about identity security confidence
04
Aug
2025

The surprising truth about identity security confidence

Organizations most confident in their identity security are often the least prepared, according to a new report from BeyondID. The…