* Critical Vulnerability in AI-Powered Cursor IDE Enables Remote Code Execution Through Prompt Injection
* Application Security Crisis Deepens as 62% of Organisations Ship Vulnerable Code Under Deadline Pressure
* Cybercriminals Exploit Security Link-Wrapping Services to Launch Sophisticated Microsoft 365 Phishing Campaigns
* Cybercriminals Use Raspberry Pi Device to Execute Physical ATM Heist in Indonesian Bank Network
* Australian Spy Chief Warns Defense Workers' LinkedIn Profiles Are Exposing Classified Projects to Foreign Intelligence