AI-Powered Development Tools | Security Vulnerabilities | Supply Chain Risks Cursor AI Code Editor getting hammered through compromised repositories
Cyber Espionage | Malware Delivery | Trade Negotiations Chinese agents reportedly posed as US congressman to transmit malware
AI Supply Chain Vulnerabilities | Code Execution Risks | Malicious Model Deployment AI-driven supply chain attack using model namespace reuse
Cybersecurity Threats | Phishing Techniques | State-Sponsored Hacking Amazon disrupts APT29 watering hole attack using Microsoft Device Code Authentication
AI Vulnerabilities | Image Processing Attacks | Security Threats AI agents vulnerable to prompt injection via image scaling attacks
Brute-Force Attacks | Cybersecurity Threats | Vulnerability Exploitation Global brute-force attack targeting Fortinet SSL VPNs
AI Security Solutions | Behavioral Fingerprinting | Intrusion Detection PLoB: A Framework for Behavioral Fingerprinting to Detect Malicious Login Attempts.
AI Technology | Cybersecurity | Malware Detection Microsoft’s Project Ire independently reverse engineers software to detect malware.