Listen

Description

* Critical Vulnerability in AI-Powered Cursor IDE Enables Remote Code Execution Through Prompt Injection

* Application Security Crisis Deepens as 62% of Organisations Ship Vulnerable Code Under Deadline Pressure

* Cybercriminals Exploit Security Link-Wrapping Services to Launch Sophisticated Microsoft 365 Phishing Campaigns

* Cybercriminals Use Raspberry Pi Device to Execute Physical ATM Heist in Indonesian Bank Network

* Australian Spy Chief Warns Defense Workers' LinkedIn Profiles Are Exposing Classified Projects to Foreign Intelligence



This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit edwinkwan.substack.com