Attackers implant JavaScript skimmers that run silently in your browser, capturing full card numbers, CVVs, names, email ...
ClickFix has become hugely successful as it relies on a simple yet effective method, which is to entice a user into infecting ...
New ClickFix attack variants have been observed where threat actors trick users with a realistic-looking Windows Update ...
Now, we're back with Opus 4.5. Anthropic, the company behind Claude claims, and I quote, "Our newest model, Claude Opus 4.5, is available today. It's intelligent, efficient, and the best model in the ...
Researchers discovered a security weakness in the AI-powered coding tool that allows malicious MCP server to hijack Cursor's ...
Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial ...
The long-running Contagious Interview campaign is now hiding BeaverTail and InvisibleFerret payloads inside JSON storage ...
A new proof-of-concept attack shows that malicious Model Context Protocol servers can inject JavaScript into Cursor’s browser — and potentially leverage the IDE’s privileges to perform system tasks.
A new ClickFix variant ratchets up the psychological pressure to 100 and addresses some technical mitigations to classic ClickFix attacks.
Socket’s Threat Research Team has outlined all the details.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results