Attention: You are using an outdated browser, device or you do not have the latest version of JavaScript downloaded and so this website may not work as expected. Please download the latest software or switch device to avoid further issues.
| 11 Mar 2026 | |
| Written by Gabi Gerber | |
| Attacks & Threats |
| Hacking Topics, Security Operation Center |
After several years of using simple implants, the Russia-affiliated actor is back with two new sophisticated malware tools. Check out here
Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Gemini CLI, and CoPilot CLI with minimal or no user interaction, thanks to skimpy warning dialogs. More...
Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestra… More...
A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and t… More...
The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environment… More...
Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandle… More...
Malicious repositories can trigger code execution in Claude Code, Cursor CLI, Gemini CLI, and CoPilot CLI with minimal or no user interaction, thanks to skimpy warning dialogs. More...
Cyber adversaries have long used AI, but now attackers are using large language models to develop exploits and orchestra… More...
A proof-of-concept exploit (PoC) shows how someone with admin privileges can exploit the issue to steal passwords, and t… More...
The issue isn't artificial intelligence, but rather an industry adding AI agent integrations into production environment… More...
Cisco found and fixed a significant vulnerability in the way Anthropic handles memories, but experts warn that mishandle… More...