INTERPOL Dismantles Thousands of Cybercrime Networks in Africa, Recovering Millions
An extensive international cybercrime operation coordinated by INTERPOL has led to the takedown of more than 11,000 malicious infrastructures across Africa and the arrest...
Russian Cyber Group Exploits Old Cisco Vulnerability for Strategic Espionage
A Russian state-linked cyber espionage group has been found actively exploiting a known vulnerability in Cisco networking equipment, despite a patch being available for...
Millions of PayPal Credential Allegedly Leaked on Hacker Forum
A post on a known data leak forum has raised concerns over a claimed dataset containing 15.8 million PayPal login credentials. According to the...
Pro-Russian Hacktivist Group Targets Ukrainian Government Sites Ahead of Trump-Zelensky Talks
A coordinated wave of cyberattacks hit several Ukrainian government websites earlier this week, hours before President Volodymyr Zelensky’s scheduled meeting with U.S. President Donald...
AI Transcription Tool Under Scrutiny for Using Meeting Recordings to Train...
A widely used AI-powered transcription service is under legal scrutiny in the United States over concerns that it may be collecting and using recorded...
Widespread Use of Chinese-Made Surveillance Cameras Raises Security Concerns
A July report by the Irish Council for Civil Liberties (ICCL) has highlighted the ongoing use of Chinese-manufactured Hikvision surveillance cameras across numerous public...
New Research Reveals How Malicious Chatbots Can Quietly Harvest Personal Data
A recent study has shown that AI-powered chatbots can be intentionally manipulated to extract significantly more personal information from users than previously thought.
Researchers from...
Phishing Campaign Targets Marketing Professionals with Fake Netflix Job Offers
A newly uncovered phishing operation is targeting marketing and social media professionals by impersonating Netflix recruiters, with the ultimate goal of hijacking access to...
This is the Sensitive Info Your AI Browser Assistant Collects
A new academic study has revealed that popular AI browser extensions are collecting and sharing sensitive user data, including medical records, financial details, and...
Passkeys Are Not Immune: New Research Highlights Critical Vulnerability
A recent investigation by Proofpoint security researchers has revealed a serious vulnerability in passkey-based authentication systems, raising concerns over their current level of protection...
U.S. Federal Court Filing System Allegedly Under Cyber Surveillance by Kremlin-Linked...
New details have emerged suggesting Russian-linked hackers may be behind a serious cyber intrusion into the U.S. federal judiciary's electronic case filing system. According...
Google Confirms Limited Cybersecurity Breach, Says Core Infrastructure Unaffected
Google has confirmed a data breach involving one of its Salesforce CRM instances, stating that while some business contact information was exposed, none of...
Security Testing Reveals Major Vulnerabilities in GPT-5’s Default Configuration
Recent evaluations of OpenAI’s latest large language model, GPT-5, have revealed serious security shortcomings in its unmodified state, raising concerns about its readiness for...
Fake Android Banking Apps Are Hijacking Devices and Draining Accounts in...
A wave of sophisticated mobile malware is targeting Android users in India by disguising itself as legitimate banking applications. According to a late-July report...
Malicious Shortcut Files Return as Effective Tool for Delivering Backdoors
A new wave of attacks is targeting Windows users with deceptive shortcut files designed to deliver the REMCOS backdoor and similar malware, according to...
North Korean Hackers Exploit Cloud Platforms in Sophisticated Crypto Theft Operations
A recently published threat report by Google Cloud has revealed a new cloud-based crypto theft technique linked to a North Korean cyber group. The...
Human Error Isn’t Inevitable: Research Finds Users Can Detect Malware Better...
While human error is often seen as a major vulnerability in cybersecurity, new research suggests that non-expert users can effectively identify malware—especially when given...
Russian Hackers Intercept Internet Traffic of Foreign Missions in Moscow
Foreign diplomatic missions and sensitive organizations operating in Moscow are being targeted by state-sponsored cyber actors using advanced surveillance techniques at the internet service...
Phishing On Your Doorstep: FBI Warns of Malicious QR Codes Delivered...
The FBI has issued a public service announcement about a growing scam involving physical packages sent to individuals without explanation. Inside these packages, recipients...
Hackers Bypass Microsoft’s 2FA in New Phishing Campaign
A new wave of phishing attacks has been exploiting Microsoft 365 environments, successfully bypassing even two-factor authentication (2FA) in many cases. According to cybersecurity...
UK Military Launches Esports Tournament to Strengthen Cyber and Drone Skills
The UK Ministry of Defence is introducing a new defence-focused esports competition aimed at building digital, cyber, and operational readiness among its personnel. Developed...
ChatGPT Conversations Found via Google Search Raise Privacy Concerns
A recent discovery has raised substantial privacy concerns for users of ChatGPT: conversations shared using OpenAI’s "shared link" feature have been appearing in public...