Visualização normal

Antes de ontemStream principal

Misconfigured Server Run by Hackers Leaks 345,000 Stolen Credit Cards

A misconfigured server linked to the carding marketplace Jerry’s Store exposed 345,000 stolen credit cards after an AI coding error caused a major security flaw.
  • ✇Cybersecurity News
  • The Sleeper in Your IDE: Unmasking the 73-Extension “GlassWorm” Espionage Campaign Ddos
    The post The Sleeper in Your IDE: Unmasking the 73-Extension “GlassWorm” Espionage Campaign appeared first on Daily CyberSecurity. Related posts: PDFSIDER Discovered: New APT Malware Uses DLL Side-Loading to Evade Detection PlugX Evolves: New “Meeting Invitation” Phishing Campaign Leverages Trusted Security Software The BurrowShell Threat: Inside ‘Sloppy Lemming’s’ Stealthy Cyber Espionage Campaign in South Asia
     

Cursor AI Agent Wipes PocketOS Database and Backups in 9 Seconds

PocketOS founder says Cursor AI agent deleted its production database in 9 seconds after misusing a root API token, exposing major Railway security flaws.
  • ✇Cybersecurity News
  • The Malware Factory: Unmasking the 108-Package North Korean Siege on npm Ddos
    The post The Malware Factory: Unmasking the 108-Package North Korean Siege on npm appeared first on Daily CyberSecurity. Related posts: Lazarus Group’s Covert Supply Chain Attack: North Korean APT Poisons Open Source to Steal Developer Secrets North Korean APT Launches Massive npm Supply Chain Attack: Typosquatting & Fake Jobs Steal Crypto from Devs “Contagious” Code: North Korean Hackers Infiltrate Developer Workflows via Visual Studio Code
     

Cursor AI IDE vulnerability allows code execution via hidden Git hooks

Novee researchers find high-severity CVE-2026-26268 flaw in Cursor AI, allowing hackers to run malicious code when developers clone repositories.
  • ✇Cybersecurity News
  • North Korean Hackers Pivot to AI: New npm Malware Targets Cursor, Claude, and Gemini Tokens Ddos
    The post North Korean Hackers Pivot to AI: New npm Malware Targets Cursor, Claude, and Gemini Tokens appeared first on Daily CyberSecurity. Related posts: North Korean APT ‘Contagious Interview’ Launches Fake Crypto Companies to Spread Malware Trio “Contagious” Code: North Korean Hackers Infiltrate Developer Workflows via Visual Studio Code The Fake Job Trap: Microsoft Exposes the ‘Contagious Interview’ Campaign Targeting Developers
     
❌
❌