Report Finds that Global Scams Cost Over $1 Trillion Annually
Scams continue to plague consumers worldwide, with losses totaling over $1.03 trillion in the past year. This financial toll, detailed in the 2024 Global...
Anthropic Calls for Urgent AI Regulation to Prevent Disastrous Risks
As artificial intelligence (AI) continues to evolve at a rapid pace, leading AI developer Anthropic is sounding the alarm about the potential catastrophic risks...
Interpol Takes Down Massive Cybercrime Infrastructure in Global Operation
Interpol has successfully dismantled a vast cybercrime operation in a global crackdown that has targeted phishing, information stealers, and ransomware activities. Dubbed Synergia II,...
Covert Chinese Botnet Exploits Compromised Routers for Stealthy Attacks
A covert Chinese botnet, named by Microsoft “CovertNetwork-1658,” has been identified using compromised TP-Link routers to conduct stealthy password-spraying attacks. This operation, discovered in...
AI-Driven Political Propaganda Network Discovered Ahead of U.S. Elections
As the U.S. elections take place today, November 5th, a troubling discovery has emerged: an extensive network of political propaganda accounts powered by artificial...
Security Alert: Vulnerabilities Found in Philips Smart Lighting
The Indian Computer Emergency Response Team (CERT-In) has issued a warning regarding critical vulnerabilities in the Philips Smart Lighting products and Matrix Door Controller...
Russian Hackers Launch Phishing Campaign Targeting Critical Sectors
'Cozy Bear', a notorious Russian threat actor, has initiated a sophisticated malicious campaign that has impacted over 100 organizations across critical sectors, according to...
Chinese Hackers Allegedly Compromise U.S. Telecommunications Ahead of Election
Recently, U.S. officials revealed that hackers affiliated with China infiltrated the country’s commercial telecommunications infrastructure, reportedly accessing sensitive phone records belonging to prominent political...
Hacker Sentenced for Using AI to Develop Ransomware
In a groundbreaking case, a 25-year-old Japanese man, Ryuki Hayashi, received a three-year prison sentence for creating malware with the assistance of generative artificial...
New Malicious Campaign Exploits CAPTCHAs to Distribute Malware
Researchers at Qualys have recently uncovered a sophisticated malicious campaign that exploits CAPTCHA verification mechanisms to deliver malware. In this attack, cybercriminals prompt users...
Apple Opens Public Security Testing Ahead of AI Launch
In a proactive effort to enhance public confidence in its security protocols, Apple has invited researchers to evaluate its Private Cloud Compute (PCC), just...
Foreign Influence Operations Surge as U.S. Election Day Approaches
As the 2024 U.S. election day draws near, a new report from the Microsoft Threat Analysis Center (MTAC) has raised alarms about intensified influence...
Malware Exploits Accessibility Features on Your Smartphone, This Tool Can Help
As accessibility features continue to assist individuals with disabilities in navigating smartphones, they inadvertently open doors for cybercriminals. Malware is increasingly leveraging these tools...
New Variant of Banking App Virus Targets Android Users
A newly discovered variant of the Cerberus Android banking trojan is actively targeting users, evolving significantly since its initial appearance in 2019. Researchers at...
Surge in Mobile Malware: Over 200 Malicious Apps Found on Google...
In a concerning revelation, the Zscaler ThreatLabz research team has uncovered more than 200 malicious applications on the Google Play Store, collectively downloaded nearly...
New macOS Vulnerability: Immediate Action Required for Users
Microsoft researchers have identified a significant vulnerability in macOS that could allow attackers to gain unauthorized access to sensitive user data. The flaw, discovered...
X (Formerly Twitter) Updates Terms: Users Lose Control Over Content for...
In a significant shift, X (formerly Twitter) has updated its terms of service, eliminating users' ability to opt out of having their content used...
New Anti-Tracking Law Takes a Stand Against Tech-Enabled Abuse
In a move to protect domestic violence victims, California Governor Gavin Newsom has signed a law aimed at curbing tech-enabled abuse. This legislation mandates...
Streaming Surveillance: How Your Favorite Streaming Platforms Collect Your Data
A new report from the Center for Digital Democracy (CDD) has raised alarm bells about the streaming TV industry, accusing it of operating a...
Vulnerabilities Found in Grayscale AI Image Recognition
A recent study from researchers at The University of Texas at San Antonio (UTSA) reveals a critical oversight in modern artificial intelligence (AI) image...
Internet Archive Faces Major Cyberattack from Pro-Palestinian Hackers
The Internet Archive, a renowned online repository for web pages, has been thrust into the spotlight following a significant cyberattack that exposed the data...
Octo2: The malware that masquerades as Google Chrome
Researchers are warning that the latest version of the credential-stealing Android malware, known as Octo2, is set to wreak havoc in the mobile threat...