A new report out today from artificial intelligence security startup Cyata Security Ltd. details a critical remote code execution vulnerability in Cursor Inc.’s integrated development environment that ...
The vulnerability of the “connective tissue” of the AI ecosystem — the Model Context Protocol and other tools that let AI agents communicate — “has created a vast and often unmonitored attack surface” ...
'Claude DXT's container falls noticeably short of what is expected from a sandbox' LayerX, a security company based in Tel ...
The Koi deal comes one week after Palo Alto closed its acquisition of CyberArk to bolster its AI security portfolio.
Darktrace researchers say hackers used AI and LLMs to create malware to exploit the React2Shell vulnerability to mine ...
Microsoft is preparing to make remote AI agents a native part of Visual Studio, marking a key evolution in how developers interact with GitHub Copilot and the IDE's AI-assisted features. According to ...
The bug allows attacker-controlled model servers to inject code, steal session tokens, and, in some cases, escalate to remote code execution on enterprise AI backends. Security researchers have ...
A vulnerability was discovered in the mIRC application that could allow attackers to execute commands, such as the downloading and installation of malware, on a vulnerable computer. The latest version ...
Google has disclosed that its Gemini artificial intelligence models are being increasingly exploited by state-sponsored hacking groups, signaling a major shift in how cyberattacks are planned and ...
Hackers’ abuse of AI tools has garnered significant public attention, but few business leaders understand how the vulnerabilities in the model context protocol (MCP) could make that abuse worse. MCP ...