Fake Android Banking Apps Are Hijacking Devices and Draining Accounts in...
A wave of sophisticated mobile malware is targeting Android users in India by disguising itself as legitimate banking applications. According to a late-July report...
Study Warns of Hidden Risks in AI Training as Models Inherit...
A new study highlights a growing concern in artificial intelligence development: models trained on AI-generated data may quietly absorb undesirable or dangerous behaviors—without developers...
New Digital Self-Protection Suite Enhances Aircraft Survivability in High-Threat Environments
A fully digital self-protection suite developed in Spain is set to enhance the survivability of military aircraft and helicopters against modern missile threats. Designed...
The System that Allows Robot-to-Robot Communication and Collaboration
US-based startup OpenMind is developing a new platform aimed at improving coordination and interoperability between intelligent machines. At the heart of its system is...
OpenAI Releases GPT-5 with Major Advances in All Fronts
OpenAI has released GPT-5, its most capable language model to date, highlighting significant improvements in reasoning, accuracy, and usability across a wide range of...
Malicious Shortcut Files Return as Effective Tool for Delivering Backdoors
A new wave of attacks is targeting Windows users with deceptive shortcut files designed to deliver the REMCOS backdoor and similar malware, according to...
New Hybrid Pathfinding Technique Enhances Robot Navigation in Complex Spaces
A new navigation framework developed by researchers in China could offer a more reliable way for robots to move through complex, fast-changing environments. The...
New Real-Time Battery Monitoring Method Enhances Safety and Performance in EVs...
A new approach to battery diagnostics may significantly improve how energy storage systems are managed across different sectors. Developed by researchers at Germany’s Fraunhofer...
North Korean Hackers Exploit Cloud Platforms in Sophisticated Crypto Theft Operations
A recently published threat report by Google Cloud has revealed a new cloud-based crypto theft technique linked to a North Korean cyber group. The...
Human Error Isn’t Inevitable: Research Finds Users Can Detect Malware Better...
While human error is often seen as a major vulnerability in cybersecurity, new research suggests that non-expert users can effectively identify malware—especially when given...
New Evasion System Aims to Improve Drone Survivability in Combat
Chinese aerospace engineers have proposed a new system that could significantly improve the ability of drones to evade missile attacks during the final stages...
New EW Technology Creates Jamming Safe Zone for Allies
Chinese researchers have reportedly developed a novel electronic warfare (EW) capability that enables interference with adversary systems while preserving a secure communication zone for...
Russian Hackers Intercept Internet Traffic of Foreign Missions in Moscow
Foreign diplomatic missions and sensitive organizations operating in Moscow are being targeted by state-sponsored cyber actors using advanced surveillance techniques at the internet service...
Phishing On Your Doorstep: FBI Warns of Malicious QR Codes Delivered...
The FBI has issued a public service announcement about a growing scam involving physical packages sent to individuals without explanation. Inside these packages, recipients...
One AI, Many Bodies: A New Approach to Generalized Robotics Control
US-based Skild AI has introduced the Skild Brain, an artificial intelligence system designed to operate across a broad spectrum of robotic platforms. Unlike traditional...
New E-Textile Sensor Gives Robots Human-Like Touch Sensitivity
Researchers have developed a new type of electronic textile that could significantly enhance how robots interact with the world, giving them a level of...
Ukraine Tests AI Tool to Streamline Open-Source Intelligence Gathering
Ukrainian military analysts are trialing a new artificial intelligence tool designed to speed up the process of collecting and sorting online open-source intelligence related...
Hackers Bypass Microsoft’s 2FA in New Phishing Campaign
A new wave of phishing attacks has been exploiting Microsoft 365 environments, successfully bypassing even two-factor authentication (2FA) in many cases. According to cybersecurity...
UK Military Launches Esports Tournament to Strengthen Cyber and Drone Skills
The UK Ministry of Defence is introducing a new defence-focused esports competition aimed at building digital, cyber, and operational readiness among its personnel. Developed...
Wearable Sensor Monitors Wound Healing
Researchers in Australia have introduced a flexible, wearable device designed to continuously monitor wound healing, potentially improving care for millions of patients. The technology,...
Researchers Develop Improved Method for Predicting Strength of Lightweight 3D-Printed Parts
A new research effort is offering a clearer picture of how lightweight 3D-printed components perform under stress, with the potential to improve reliability and...
Researchers Simulate High-Power Anti-Satellite Microwave Weapon Based on Quantum Phenomenon
A new weapon design under development by researchers linked to China’s People’s Liberation Army (PLA) is drawing international attention for its potential capabilities in...