My Courses
-

How Poor Certificate Management Creates Vulnerabilities for Phishing and Man-in-the-Middle Attacks
SSL Certificates are ubiquitous, utilised across websites, APIs, mobile applications, internal tools, and CI/CD pipelines. While most teams recognise their significance, they often fail to…
-

A newly identified MCPoison attack utilizes the Cursor IDE’s MCP validation process to run arbitrary commands within the system.
A critical vulnerability in Cursor IDE, an increasingly popular AI-powered development environment, allows for persistent remote code execution through the manipulation of the Model Context…
-

Microsoft’s Project Ire independently reverse engineers software to detect malware.
Microsoft has introduced Project Ire, an innovative prototype that leverages autonomous AI technology to analyse software files for potential malicious content. This advanced AI agent…
-

A vulnerability in the Cursor AI Code Editor allows for remote code execution (RCE) by swapping in a malicious MCP file after it has been approved.
Cybersecurity researchers have identified a significant security vulnerability in the AI-powered code editor Cursor, which could lead to remote code execution. This flaw, designated as…
-

Google’s August update addresses two Qualcomm vulnerabilities that have been actively exploited.
Google has released critical security updates to address multiple vulnerabilities in Android, including two Qualcomm bugs identified as actively exploited. The vulnerabilities, CVE-2025-21479 (CVSS score:…
-

Cloudflare has accused Perplexity AI of circumventing firewalls and scraping websites by modifying its user agent.
Perplexity AI, an emerging question-answering engine powered by advanced large language models, has recently faced scrutiny for employing stealth crawling techniques that circumvent standard web…
-

A newly discovered vulnerability in Streamlit enables cybercriminals to execute cloud account takeover attacks.
A critical vulnerability in Streamlit, a widely used open-source framework for building data applications, has been identified, enabling attackers to execute cloud account takeover attacks….
-

APT36 Hackers Targeting Indian Government Organizations to Harvest Login Information
A sophisticated phishing campaign attributed to the Pakistan-linked APT36 group has emerged as a significant threat to Indian government infrastructure. First detected in early August…
-

Cisco announces that user information was compromised during a CRM breach.
Cisco has recently disclosed a significant data breach that has impacted user accounts on Cisco.com. The breach has resulted in the theft of sensitive information,…


