Skip to content
Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution

Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution

Google has addressed a maximum severity security flaw in Gemini CLI — the “@google/gemini-cli” npm package and the “google-github-actions/run-gemini-cli” GitHub Actions workflow — that could have allowed attackers to execute arbitrary commands on host systems. “The vulnerability allowed an unprivileged external attacker to force their own malicious content to loadRead More »Google Fixes CVSS 10 Gemini CLI CI RCE and Cursor Flaws Enable Code Execution

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

Cybersecurity researchers are sounding the alarm about a new supply chain attack campaign targeting SAP-related npm Packages with credential-stealing malware. According to reports from Aikido Security, SafeDep, Socket, StepSecurity, and Google-owned Wiz, the campaign – calling itself the mini Shai-Hulud – has affected the following packages associated with SAP’s JavaScriptRead More »SAP-Related npm Packages Compromised in Credential-Stealing Supply Chain Attack

New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs

New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs

Cybersecurity researchers have discovered malicious code in an npm package after a malicious package as a dependency to the project by Anthropic’s Claude Opus large language model (LLM). The package in question is “@validate-sdk/v2,” which is listed on npm as a utility software development kit (SDK) for hashing, validation, encoding/decoding,Read More »New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATs

Hundreds of Internet-Facing VNC Servers Expose ICS/OT

Forescout has identified tens of thousands of exposed RDP and VNC servers that can be mapped to specific industries. The post Hundreds of Internet-Facing VNC Servers Expose ICS/OT appeared first on SecurityWeek.

Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks

Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks

In February 2026, researchers uncovered a shift that completely changed the game: threat actors are now using custom AI setups to automate attacks directly into the kill chain. We aren’t just talking about AI writing better phishing emails anymore. We’re talking about autonomous agents mapping Active Directory and seizing DomainRead More »Webinar: How to Automate Exposure Validation to Match the Speed of AI Attacks

What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

Every security team has a version of the same story. The quarter ends with hundreds of vulnerabilities closed. The dashboards are bursting with green. Then someone in a leadership meeting asks: “So, are we actually safer now?” Crickets. The room goes quiet because an honest answer requires context – whichRead More »What to Look for in an Exposure Management Platform (And What Most of Them Get Wrong)

Checkmarx Confirms Data Stolen in Supply Chain Attack

The hackers exfiltrated the data from Checkmarx’s GitHub environment on March 30, a week after publishing malicious code. The post Checkmarx Confirms Data Stolen in Supply Chain Attack appeared first on SecurityWeek.

Copyright © 2026 infosecintel.net