Hackers Bypass Microsoft’s 2FA in New Phishing Campaign
A new wave of phishing attacks has been exploiting Microsoft 365 environments, successfully bypassing even two-factor authentication (2FA) in many cases. According to cybersecurity...
UK Military Launches Esports Tournament to Strengthen Cyber and Drone Skills
The UK Ministry of Defence is introducing a new defence-focused esports competition aimed at building digital, cyber, and operational readiness among its personnel. Developed...
ChatGPT Conversations Found via Google Search Raise Privacy Concerns
A recent discovery has raised substantial privacy concerns for users of ChatGPT: conversations shared using OpenAI’s "shared link" feature have been appearing in public...
Android Vulnerability Allows Hackers to Steal Permissions via “Tapjacking”
A new vulnerability in Android devices, dubbed "TapTrap," is putting users at risk by enabling hackers to bypass security prompts and gain unauthorized access...
Privacy Concerns Raised Over ByteDance’s New AI Coding Tool
China's ByteDance, TikTok's parent company, has recently become involved in another privacy controversy. Now, ByteDance's newly launched AI-powered coding tool, Trae IDE, has faced...
New Police Unit to Monitor Social Media to Prevent Violent Protests
In an effort to better manage public safety threats, the UK government has introduced a new police unit tasked with monitoring social media for...
Ukrainian and Belarussian Cyberattack Grounds Dozens of Russian Aeroflot Flights
A major cyberattack on Russia's flagship carrier, Aeroflot, has led to the grounding of dozens of flights, causing significant disruptions at Moscow’s Sheremetyevo Airport....
Student-Built Phishing Kits Linked to Global Fraud Scheme Worth £100 Million
A recent court ruling in the UK has drawn attention to a large-scale cyber fraud operation centered around phishing kits. A 21-year-old university student...
Realistic Zoom Meeting Scam Steals Passwords
A newly identified phishing campaign is leveraging fake Zoom meeting invites to steal corporate login credentials, using convincing visuals and urgency to manipulate targets....
Widespread Exploitation of Microsoft SharePoint Flaws Linked to State-Backed Hacking by...
A wave of cyber intrusions tied to Chinese state-affiliated actors has exploited unpatched vulnerabilities in Microsoft SharePoint, with consequences affecting governments, businesses, and critical...
Iran-Linked Android Spyware Masquerades as VPNs
A recent cybersecurity investigation has revealed a fresh wave of Android spyware disguised as legitimate VPN and banking tools, raising new concerns over mobile...
China-Linked Cyber Campaigns Target Taiwan’s Semiconductor Sector
New findings from cybersecurity researchers point to a rise in targeted cyber espionage campaigns focused on Taiwan’s semiconductor ecosystem, with attackers linked to China...
Google Removes Over 30,000 Propaganda-Linked YouTube Channels
In the first six months of 2025, YouTube took down more than 30,000 channels linked to influence efforts by foreign actors, according to a...
Ukrainian Cyberattack Disrupts Major Russian Drone Manufacturer
A large-scale cyber operation originating from Ukraine has disabled one of Russia’s key drone suppliers, dealing a significant blow to its unmanned aerial vehicle...
LLM-Created “Package Hallucinations” Pose New Software Supply Chain Risk
As generative AI tools become a fixture in software development workflows, a new study warns of an emerging security threat linked to how large...
Shopify Privacy Plugin Exposes Hundreds of Stores to Critical Security Risks
A plugin intended to help Shopify merchants comply with global privacy laws has inadvertently exposed sensitive data from hundreds of online stores, potentially allowing...
Report Finds Houthi-Linked Arms Dealers Using X and WhatsApp to Sell...
A new investigation reveals that social media platforms are being used to facilitate illegal weapons sales in Yemen, including arms allegedly sourced from U.S....
International Operation Disrupts Pro-Russian Cyber Network Linked to Thousands of DDoS...
A major international law enforcement effort has dealt a significant blow to NoName057(16), a pro-Russian cyber group responsible for thousands of distributed denial-of-service (DDoS)...
Researchers Show How Hidden Commands Can Trick Google Gemini into Delivering...
Security researchers have uncovered a method that allows attackers to manipulate Google’s Gemini AI assistant by hiding invisible instructions within emails. The flaw enables...
International Collaboration Shuts Down Tech Support Scam Network
An extensive investigation involving law enforcement agencies from India, the UK, and the US has led to the takedown of a global scam operation...
Malware Disguised as VPN Software Found Abusing GitHub’s Open Platform
A new malware campaign is using GitHub to quietly distribute an infostealer tool under the pretense of free utility software, raising renewed concerns over...
Widespread Risk in AI Code Editors: Vibe Coders Exposed to Malicious...
A growing security concern is emerging in the world of AI-assisted code editors, as a lack of proper oversight in third-party extension marketplaces is...