Russian Offensive Cyber Operations: Analyzing Putin’s Foreign Policy Actions
The broad strokes of what cybersecurity leaders need to know about Putin’s foreign policy actions.
The broad strokes of what cybersecurity leaders need to know about Putin’s foreign policy actions.
A security weakness has been disclosed in the artificial intelligence (AI)-powered code editor Cursor that could trigger code execution when a maliciously crafted repository is opened using the program. The issue stems from the fact that an out-of-the-box security setting is disabled by default, opening the door for attackers toRead More »Cursor AI Code Editor Flaw Enables Silent Code Execution via Malicious Repositories
In May 2025, the European Union levied financial sanctions on the owners of Stark Industries Solutions Ltd., a bulletproof hosting provider that materialized two weeks before Russia invaded Ukraine and quickly became a top source of Kremlin-linked cyberattacks and disinformation campaigns. But new findings show those sanctions have done little toRead More »Bulletproof Host Stark Industries Evades EU Sanctions
Google on Tuesday announced that its new Google Pixel 10 phones support the Coalition for Content Provenance and Authenticity (C2PA) standard out of the box to verify the origin and history of digital content. To that end, support for C2PA’s Content Credentials has been added to Pixel Camera and GoogleRead More »Google Pixel 10 Adds C2PA Support to Verify AI-Generated Media Authenticity
Join the webinar as we reveal a new model for AI pen testing – one grounded in social engineering, behavioral manipulation, and even therapeutic dialogue. The post Webinar Today: Breaking AI – Inside the Art of LLM Pen Testing appeared first on SecurityWeek.
U.S. Senator Ron Wyden has called on the Federal Trade Commission (FTC) to probe Microsoft and hold it responsible for what he called “gross cybersecurity negligence” that enabled ransomware attacks on U.S. critical infrastructure, including against healthcare networks. “Without timely action, Microsoft’s culture of negligent cybersecurity, combined with its deRead More »Senator Wyden Urges FTC to Probe Microsoft for Ransomware-Linked Cybersecurity Negligence
High-severity flaws in IOS XR could lead to ISO image verification bypass and denial-of-service conditions. The post Cisco Patches High-Severity IOS XR Vulnerabilities appeared first on SecurityWeek.
LNER said the security incident involved a third-party supplier and resulted in contact information and other data being compromised. The post UK Train Operator LNER Warns Customers of Data Breach appeared first on SecurityWeek.
Google patched a critical use-after-free vulnerability in Chrome that could potentially lead to code execution. The post Critical Chrome Vulnerability Earns Researcher $43,000 appeared first on SecurityWeek.