Composer 2.5 is Cursor's third-generation proprietary coding agent, available exclusively inside the Cursor IDE and through the @cursor/sdk — not as a general API. Like its predecessor, it is built on ...
Google reported the first confirmed AI-assisted zero-day exploit, raising new concerns about logic flaws, supply chain risk, ...
Microsoft Windows 11 has fallen victim to three zero-day exploits in a single day as the 2026 Pwn2Own hacking event opens in ...
As AI becomes more capable of identifying vulnerabilities and analysing attacks, companies are beginning to use it for defence as well.
GitHub has confirmed that hackers breached internal repositories through a poisoned VS Code extension after stolen source ...
First AI zero-day: Google detected the first confirmed AI-created zero-day exploit, aimed at bypassing 2FA in a popular open-source admin tool. Rapid containment: The flaw was disclosed to the vendor ...
19-year-old Samrath Singh Chadha's story is one of passion for computers and AI, and an amazing capacity for persistence.
The attacks are part of a wider campaign known as Mini Shai-Hulud, which has already compromised several open source projects ...
For protocol founders and security researchers, the incident reinforced a broader shift underway across crypto: DeFi is no longer primarily battling coding bugs. It’s battling complexity.
On the first day of Pwn2Own Berlin 2026, security researchers collected $523,000 in cash awards after exploiting 24 unique ...
Weekly ThreatsDay Bulletin: supply chain attacks, fake support lures, AI tampering, data leaks, ransomware, and exploited ...