Scroll down for the latest penetration testing news and information.
Subscribe to our weekly newsletter for the latest in industry news, expert insights, dedicated information security content and online events.
Cursor flaw lets extensions steal API keys and session tokens without user interaction, according to researchers at LayerX
Ninja Forms File Upload RCE via unauthenticated arbitrary file upload; update to 3.3.27 immediately
DNS-based attack in AWS Bedrock AgentCore lets AI sandboxes exfiltrate cloud data
Malicious NuGet package mimicking Stripe's library targeted developers
VoidLink, a Linux-based C2 framework, facilitates credential theft, data exfiltration across clouds
DockerDash vulnerability allows RCE and data exfiltration via unverified metadata in Ask Gordon