Aggregator
Nation-state group CL-STA-0969 targeted Southeast Asian telecoms in 2024
AI 编程神器Cursor现高危漏洞,一条提示即可RCE
过去三个月有 500 万用户首次试用了 GitHub Copilot
CVE-2025-8530 | elunez eladmin up to 2.7 Druid application-prod.yml login-username/login-password default credentials (Issue 883)
CERT-AGID 26 luglio – 1 agosto: SharePoint, MintLoader e 4L4MD4R protagonisti
iPhone теряет трон: Цукерберг ведёт армию ИИ-очков против эпохи смартфонов
Submit #622177: elunez https://github.com/elunez/eladmin <=2.7 Druid credentials hardcoded vulnerability [Accepted]
Agent2Agent (A2A) — подробный обзор открытого протокола Google для общения ИИ-агентов
A week in security (July 28 – August 3)
实战指“北” | 2025 CSOP北京站议程揭晓
Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online
A significant security breach has compromised Microsoft’s PlayReady Digital Rights Management (DRM) system, exposing critical certificates that protect premium streaming content across major platforms including Netflix, Amazon Prime Video, and Disney+. The leak, which surfaced on GitHub through an account named “Widevineleak,” has triggered immediate responses from both Microsoft and affected streaming services, highlighting the […]
The post Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online appeared first on Cyber Security News.
Cursor IDE: Arbitrary Data Exfiltration Via Mermaid (CVE-2025-54132)
Cursor IDE: Arbitrary Data Exfiltration Via Mermaid (CVE-2025-54132)
Cursor is a popular AI code editor. In this post I want to share how I found an interesting data exfiltration issue, the demo exploits built and how it got fixed.
When using Cursor I noticed that it can render Mermaid diagrams.
Cursor Renders Mermaid DiagramsIf you are not familiar with Mermaid, it has a simple syntax:
graph TD User --> ComputerThis will create a diagram as follows:
NIS 2 e multicompliance: strategie integrate per la cyber security aziendale
CrowdStrike investigated 320 North Korean IT worker cases in the past year
Threat hunters saw North Korean operatives almost daily, reflecting a 220% year-over-year increase in activity, CrowdStrike said in a new report.
The post CrowdStrike investigated 320 North Korean IT worker cases in the past year appeared first on CyberScoop.