Cursor’s Mermaid-based diagram renderer in certain Cursor releases can be induced to fetch attacker-controlled images, creating a low‑noise exfiltration channel when combined with prompt injection — a vulnerability tracked as CVE-2025-54132 that has been fixed in Cursor 1.3 (with later...
This week’s Cisco Talos briefing reads like a travelogue-turned-threat-advisory: after a short, evocative opening about cherry pie and Douglas firs, the post pivots sharply to an urgent security alert — a Russian state‑backed cluster Talos calls Static Tundra is actively exploiting a...
Security researchers have uncovered a targeted supply‑chain campaign — dubbed “Solana‑Scan” — in which malicious npm packages masquerading as Solana SDK utilities are being used to harvest developer credentials, wallet keyfiles and other high‑value artifacts from developer machines. Background /...
A cluster of malicious npm packages — cataloged by researchers as a targeted infostealer campaign dubbed “Solana‑Scan” — has been used to lure Solana ecosystem developers into installing backdoored SDKs that harvest wallet credentials, local keyfiles and a broad sweep of developer artifacts...
Interlock ransomware has quickly ascended from a little-known name in late 2024 to a top-tier threat that’s been hammering organizations across North America and Europe through 2025. While other ransomware groups have faltered or faded, Interlock actors show a relentless willingness to innovate...
In a groundbreaking revelation, security researchers have identified the first-ever zero-click vulnerability in an AI assistant, specifically targeting Microsoft 365 Copilot. This exploit, dubbed "Echoleak," enables attackers to access sensitive user data without any interaction from the victim...
ai architecture
ai security
ai threat landscape
ai vulnerabilities
attack vector
cybersecurity
data leakage
echoleak
exfiltration
malicious emails
microsoft copilot
prompt injection
security assessment
security awareness
vulnerabilities
zero-click attack
Original release date: July 20, 2021
Summary
This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.
Note: CISA released technical information...
Original release date: July 19, 2021
Summary
This Joint Cybersecurity Advisory was written by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) to provide information on a Chinese Advanced Persistent Threat (APT) group known in open-source...
Original release date: February 17, 2021
Summary
This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.
This joint advisory is the result of analytic efforts...
Original release date: September 22, 2020
Summary
This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise frameworks for all referenced threat actor techniques.
This product was written by the Cybersecurity and...
Original release date: August 26, 2020
Summary
This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise framework for all referenced threat actor techniques.
This joint advisory is the result of analytic efforts among...
apt38
atm cash-outs
bank heists
beagleboyz
cryptocurrency
cyber threats
cybersecurity
data security
exfiltration
financial services
hidden cobra
incident response
international fraud
iso 8583
malware
mitre att&ck
north korea
operational security
swift fraud
threat detection
Original release date: July 27, 2020
Summary
This is a joint alert from the United States Cybersecurity and Infrastructure Security Agency (CISA) and the United Kingdom’s National Cyber Security Centre (NCSC).
CISA and NCSC are investigating a strain of malware known as QSnatch, which...
Original release date: July 1, 2020 | Last revised: July 2, 2020
Summary
This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) and Pre-ATT&CK framework. See the ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques.
This...
Original release date: October 11, 2018
Summary
This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.Link Removed[2][3][4]Link Removed
In it we highlight the use of five...
Original release date: October 11, 2018
Summary
This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.Link Removed[2][3][4]Link Removed
In it we highlight the use of five...
Original release date: May 21, 2018
Systems Affected
CPU hardware implementations
Overview
On May 21, 2018, new variants—known as 3A and 4—of the side-channel central processing unit (CPU) hardware vulnerability were Link Removed. These variants can allow an attacker to obtain access to...
Original release date: July 31, 2014
Systems Affected
Point-of-Sale Systems
Overview
This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...
antivirus
backoff
brute force
command and control
consumer protection
cybersecurity
data breach
exfiltration
exploit
forensics
indicator
keylogging
malware
mitigation
network security
payment data
point of sale
remote desktop
risk management
security
Original release date: July 31, 2014
Systems Affected
Point-of-Sale Systems
Overview
This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...
antivirus
backoff
brute force
command and control
consumer data
cybersecurity
data breach
exfiltration
financial sector
indicators of compromise
keylogging
malware
mitigation
network security
payment methods
persistence
point of sale
remote desktop
security
threat detection