Aggregator
CVE-2024-44246 | Apple iOS/iPadOS Private Relay information disclosure (WID-SEC-2024-3692)
CVE-2024-44224 | Apple macOS up to 13.6/14.6/15.1 permission (WID-SEC-2024-3692)
CVE-2024-44245 | Apple visionOS Kernel Memory memory corruption (WID-SEC-2024-3692)
CVE-2024-44245 | Apple macOS Kernel Memory memory corruption (WID-SEC-2024-3692)
CVE-2024-44245 | Apple iOS/iPadOS Kernel Memory memory corruption (WID-SEC-2024-3692)
CVE-2024-44225 | Apple tvOS Local Privilege Escalation (WID-SEC-2024-3692)
CVE-2024-44225 | Apple macOS Local Privilege Escalation (WID-SEC-2024-3692)
CVE-2024-44225 | Apple watchOS Local Privilege Escalation (WID-SEC-2024-3692)
CVE-2024-44225 | Apple iOS/iPadOS Local Privilege Escalation (WID-SEC-2024-3692)
CVE-2024-44243 | Apple macOS up to 15.1 access control (Nessus ID 214661 / WID-SEC-2024-3692)
CVE-2026-22680 | Volcengine OpenViking up to 0.3.2 Task Polling Endpoint /api/v1/tasks task_id authorization (EUVD-2026-19744)
CVE-2026-24147 | NVIDIA Triton Inference Server path traversal (EUVD-2026-19751)
CVE-2026-22682 | HKUDS OpenHarness Configuration read_file/write_file/edit_file/notebook_edit authorization (EUVD-2026-19746)
CVE-2026-24146 | NVIDIA Triton Inference Server memory allocation (EUVD-2026-19749)
CVE-2026-24156 | NVIDIA DALI deserialization (EUVD-2026-19753)
Erlang security advisory (AV26-320)
Grafana Patches AI Bug That Could Have Leaked User Data
MCP or CLI? How to Choose Right Interface for Your AI Tools
4 min readWhat starts as a tooling decision ends up shaping cost, reliability, and how far your workflows actually scale before they break down.
The post MCP or CLI? How to Choose Right Interface for Your AI Tools appeared first on Aembit.
The post MCP or CLI? How to Choose Right Interface for Your AI Tools appeared first on Security Boulevard.
Hackers Use Fake Gemini npm Package to Steal Tokens From Claude, Cursor, and Other AI Tools
A new supply chain attack has surfaced targeting software developers who work with AI coding tools. On March 20, 2026, a threat actor published a malicious npm package named gemini-ai-checker under the account gemini-check, presenting it as a simple utility to verify Google Gemini AI tokens. The package looked credible enough to fool developers — but beneath its […]
The post Hackers Use Fake Gemini npm Package to Steal Tokens From Claude, Cursor, and Other AI Tools appeared first on Cyber Security News.