A critical vulnerability in the trust model of Cursor, a fast-growing tool for LLM-assisted development, allows for silent and persistent remote code execution. The original […]
Author: cyberbytes
ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections
A combination of propagation methods, narrative sophistication, and evasion techniques enabled the social engineering tactic known as ClickFix to take off the way it did […]
Over 10,000 Malicious TikTok Shop Domains Target Users with Malware and Credential Theft
Cybersecurity firm CTM360 has uncovered an ongoing malicious operation dubbed “ClickTok,” specifically targeting TikTok Shop users worldwide through a dual-pronged strategy of phishing and malware […]
Cisco User Data Stolen in Vishing Attack
The networking giant said this week that an employee suffered a voice phishing attack that resulted in the compromise of select user data, including email […]
CISA bringt Open-Source-Plattform für digitale Forensik
Mit Thorium steht Unternehmen nun auch eine Open-Source-Plattform offen, um Malware zu analysieren. Gorodenkoff – shutterstock.com Thorium wurde in Zusammenarbeit mit den Sandia National Laboratories […]
Microsoft Launches Zero-Day Quest Hacking Contest with Rewards Up to $5 Million
Microsoft has unveiled the return of its groundbreaking Zero Day Quest initiative, escalating the stakes in cybersecurity research with a staggering total bounty pool of […]
Kimsuky APT Uses LNK Files to Deploy Reflective Malware and Evade Windows Defender
The North Korean state-sponsored group Kimsuky, also known as APT43, Thallium, and Velvet Chollima, has been accused of launching a recent cyber-espionage campaign in which […]
Surge in Cyber Attacks Targeting AI Infrastructure as Critical Vulnerabilities Emerge
Security researchers discovered 28 distinct zero-day vulnerabilities, seven of which were expressly directed at artificial intelligence infrastructure, in a startling discovery made during the 2025 […]
Cursor AI Code Editor Vulnerability Enables RCE via Malicious MCP File Swaps Post Approval
Cybersecurity researchers have disclosed a high-severity security flaw in the artificial intelligence (AI)-powered code editor Cursor that could result in remote code execution. The vulnerability, […]
Google’s August Patch Fixes Two Qualcomm Vulnerabilities Exploited in the Wild
Google has released security updates to address multiple security flaws in Android, including fixes for two Qualcomm bugs that were flagged as actively exploited in […]