Image by Unsplash

Outdated TP-Link Routers Targeted in Active Cyberattacks

0
A critical security flaw in several widely used TP-Link router models is now being actively exploited by hackers, according to a recent update by...
Images provided by Pixabay and Unsplash

Pro-Iranian Hackers Leak Sensitive Data from Saudi Arabia’s Largest Sports Event

0
A significant data breach has exposed the personal information of thousands connected to the Saudi Games, the kingdom’s premier national sporting event. The incident,...

Unprecedented Data Leak Exposes 16 Billion Login Credentials in Massive Cybersecurity...

0
A staggering data leak has revealed one of the largest breaches of personal information in digital history—an estimated 16 billion login credentials exposed across...

VPN Usage Surges in Iran Amid Regime-Imposed Internet Restrictions

0
In the wake of the recent conflict with Israel, Iran has blocked internet access to its citizens. Now, digital tools like virtual private networks...

Iran Hacks Security Cameras to Monitor Israeli Movements in Real Time

0
A recent cybersecurity warning has revealed that Iran is actively exploiting weaknesses in internet-connected home security cameras across Israel, using them to monitor military...

New Research Reveals How Websites Secretly Track Users Without Cookies

0
A new study presented at the ACM Web Conference 2025 has confirmed a long-suspected but difficult-to-prove method of online tracking: browser fingerprinting. This technique...
image provided by pixabay

Wave of DDoS Attacks and Disinformation Amid Israel-Iran Conflict

0
As the Israel-Iran conflict intensifies, cyberspace has become a secondary battlefield, with digital offensives escalating in both scope and complexity. The result has been...
Image by Pexels

Iran’s Bank Sepah Reportedly Hit by Cyberattack Linked to Pro-Israel Hackers

0
Amid the recent escalation between Israel and Iran, an Iranian state-owned bank has reportedly fallen victim to a disruptive cyberattack, carried out by the...

Optical Wireless System Offers Secure, High-Speed Connectivity Without Radio Waves for...

0
A new optical wireless system developed in the UK is aiming to reshape secure communications by eliminating a key vulnerability in conventional wireless networks:...

23andMe DNA Database Acquired, Prioritizing Privacy and Transparency

0
The genetic data of millions of individuals who once used 23andMe's DNA testing services has officially changed hands. The TTAM Research Institute, a nonprofit...
Images provided by Pixabay and Unsplash

Cyber Front Heats Up Following Israel-Iran Conflict

0
In the wake of Israel’s recent military campaign targeting Iranian nuclear and military assets—codenamed Operation Rising Lion—cyber activity linked to Iran and its allies...
Image by Unsplash

Dual-Band Satellite Antenna Ushers in a New Era of Resilient Military...

0
A newly unveiled satellite antenna capable of simultaneously operating on both Ku- and Ka-band frequencies is poised to change how military forces maintain secure...
Image by Unsplash

Cybercriminals Use Fake AI Tools to Deploy Malware at Scale

0
As the global fascination with generative AI continues to grow, threat actors are seizing the opportunity—this time by weaponizing fake AI video generation tools....

AI-Driven Phishing Attacks Are Outsmarting Employees

0
A new study has revealed a growing cybersecurity blind spot: employees are struggling to detect phishing emails—especially those generated by artificial intelligence. The research...

Invisible Eavesdropping: How Laptop Mics Could Be Leaking Your Conversations

0
A newly uncovered flaw in everyday microphones may be exposing users to an unexpected and unsettling form of surveillance—one that doesn’t rely on hacking...
Image by Pexels

FBI Warns of Malware Preinstalled on Low-Cost Android Devices

0
Millions of Android devices around the world have been compromised by a preinstalled malware strain known as BadBox 2.0, according to a recent warning...

Thousands of Asus Routers Compromised in Stealth Botnet Campaign

0
A sophisticated cyber campaign is targeting Asus WiFi 6 routers, leaving persistent backdoors that remain even after firmware updates. Security researchers have identified the...

Biometric Eye-Scanning Tech Combats AI Fraud

0
A new biometric verification technology that uses eye-scanning hardware to verify human identity is rolling out across the United Kingdom this week. The system,...

Cryptostealing Malware Found in Printer Software Highlights Growing Supply Chain Threat

0
A concerning cybersecurity incident has shed new light on the potential risks lurking in unexpected hardware—this time, printers. Users of certain devices from Procolored,...
Image by Pexels

AI Tools Exploited in Covert Influence and Cyber Ops, OpenAI Warns

0
A newly released report by OpenAI highlights how state-linked groups are increasingly experimenting with artificial intelligence for covert online operations. OpenAI has disclosed a...
Images provided by Pixabay

Ukrainian Cyber Unit Breaches Russian Aerospace Giant

0
In a major cyber incident highlighting the growing role of digital warfare in modern conflict, Ukraine’s Main Intelligence Directorate (HUR) has reportedly executed a...

Google Issues Critical Chrome Update to Block Active Zero-Day Exploit

0
A major security alert has been issued for Google Chrome users following the discovery of a critical zero-day vulnerability currently being exploited by attackers....

Latest

Israel’s Ministry of Defense is Seeking Dual-Use Startups

0
Following the immense success of the previous cycles and their integration into the defense sector, iHLS invites you to join the sixth cycle of...