
Cursor
Shaping the digital landscape.



Shaping the digital landscape.

Founded in 1926 by Marcel Bleustein-Blanchet, today Publicis Groupe is the largest communications group in the world and a leader in marketing, communication, and digital business transformation, led by Arthur Sadoun, the third CEO in its history. Publicis Groupe is positioned at every step of the value chain, from consulting to execution, combining marketing transformation and digital business transformation. Publicis Groupe is a privileged partner in its clients’ transformation to enhance personalisation at scale. The Groupe relies on ten expertise concentrated within four main activities: Communication, Media, Data and Technology. Through a unified and fluid organisation, its clients have a facilitated access to all its expertise in every market. Present in over 100 countries, Publicis Groupe employs around 108,000 professionals. Website: www.publicisgroupe.com X: @PublicisGroupe Instagram: @publicisgroupe YouTube: http://www.youtube.com/publicisgroupe Facebook: http://www.facebook.com/publicisgroupe
Security & Compliance Standards Overview












No incidents recorded for Cursor in 2026.
No incidents recorded for Publicis Groupe in 2026.
Cursor cyber incidents detection timeline including parent company and subsidiaries
Publicis Groupe cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.