Australia | Data Security | Information Exposure | Software Vulnerabilities Regional Australian councils expose confidential information due to Workhorse vulnerability
Cybersecurity Threats | Malware Exploitation | Software Vulnerabilities CVE-2025-8088 – WinRAR path traversal vulnerability exploited to run malicious software
AI Development Tools | Cybersecurity | Software Vulnerabilities A newly identified MCPoison attack utilizes the Cursor IDE’s MCP validation process to run arbitrary commands within the system.