A concerning vulnerability in Cursor's Background Agents that allowed them to gain complete control over the underlying Amazon EC2 infrastructure.
The incident, discovered two weeks after the agents' public release, highlights significant risks in modern SaaS applications that extend beyond traditional desktop boundaries.
The attack...
Cybersecurity researchers have uncovered a sophisticated phishing campaign targeting government agencies and organizations worldwide, exploiting trusted cloud services and security tools to enhance credibility and evade detection.
The campaign, identified by Cyble Research and Intelligence Labs, demonstrates how threat actors are increasingly leveraging legitimate...