Malicious Repos Can Trigger Auto Code Execution in Cursor AI
Enjoyed this article? Share it with your friends! Oasis Security has identified…
Threat actors abuse X’s Grok AI to spread malicious links
Threat actors are using Grok, X's built-in AI assistant, to bypass link…
Apple patches iOS zero-day that put crypto wallets at risk via malicious images
Apple released iOS 18.6.2 and iPadOS 18.6.2 on Aug. 20, 2025, along…
JSCEAL Scam Targets Crypto Users with 35,000 Malicious Ads
Enjoyed this article? Share it with your friends! Cybersecurity company Check Point…
Hackers breach Toptal GitHub account, publish malicious npm packages
Hackers compromised Toptal's GitHub organization account and used their access to publish ten…
Hacker Slips Malicious Code Into Ethereum Dev Tool ETHcode
Enjoyed this article? Share it with your friends! Cybersecurity researchers at ReversingLabs…
Malicious PyPi package hides RAT malware, targets Discord devs since 2022
A malicious Python package targeting Discord developers with remote access trojan (RAT) malware…
Malicious npm package secretly targets Atomic, Exodus wallets to intercept and reroutes funds
Researchers have discovered a malicious software package uploaded to npm that secretly…
Malicious GitHub repositories deploying hidden attacks on crypto wallets
Kaspersky researchers have identified an attack vector on GitHub that uses repositories…
Apiiro unveils free scanner to detect malicious code merges
Security researchers at Apiiro have released two free, open-source tools designed to…

