New Machine Learning Model Detects Harmful Social Media Comments
A new machine-learning model developed by a team of researchers from Australia and Bangladesh is making waves in the fight against toxic social media...
Your Lost Luggage May Have Put You at Risk of Identity...
A recent cybersecurity discovery has revealed a major data leak that could have serious consequences for travelers worldwide. Fourteen publicly exposed databases containing over...
Google Expands Scam Detection Technology for Calls and Messages
Google is ramping up its efforts to protect users from fraudulent activity by rolling out expanded scam detection features for both calls and messages.
Previously,...
Ransomware Group Targets Cancer Clinic, Exposes Sensitive Health Data
In a concerning development, the Qilin ransomware group has claimed responsibility for the February 10th cyberattack on the Utsunomiya Central Clinic (UCC), a prominent...
U.S. Pauses Cyber Operations Against Russia
In a move that has left many scratching their heads, the United States has ordered a temporary halt on offensive cyber and information operations...
OpenAI Bans Malicious Accounts from China and North Korea
OpenAI has recently banned several accounts from users in China and North Korea, citing concerns that its technology was being used for harmful purposes,...
The New Battlefield: Cyber Warfare and Its Impact on National Security
As cyberattacks continue to grow in frequency and sophistication, experts are highlighting the increasing vulnerability of governments and military sectors. Despite the escalating financial...
Apple Vulnerability Turns Bluetooth Devices into AirTag-Like Trackers
Researchers from George Mason University have uncovered a serious security flaw in Apple’s Find My network, potentially allowing attackers to turn any Bluetooth-enabled device...
Unsecured Database Leak Exposes Sensitive Medical Data of Over 1.6 Million...
A massive data breach has come to light, revealing the unsecured exposure of 2 terabytes of sensitive information. The leak affected more than 1.6...
New Research Exposes Security Gaps in AI-Powered Software Development
The rise of AI-driven coding tools is revolutionizing software development, but new research highlights serious security risks linked to AI-generated code. As AI assistants...
Largest-Ever Crypto Heist steals $1.4 Billion
Cryptocurrency exchange Bybit became the latest victim of a major cyberattack, marking what appears to be the largest crypto hack in history. The breach,...
Ransomware Cartel Threatens FBI with Stolen Data
In a chilling message posted on February 25, 2025, the alleged leader of the notorious LockBit ransomware group, LockBitSupp, issued a disturbing "birthday gift"...
Hackers Use Google Docs to Control Malware and Exfiltrate Sensitive Data
In a disturbing new trend, hackers are using legitimate platforms like Google Docs to secretly control malware designed to steal sensitive data from users,...
How Russian Cybercriminals Hacked into Ukrainian Signal Accounts
In a recent report, Google Threat Intelligence Group (GTIG) detailed how Russian cybercriminal groups are exploiting vulnerabilities in the Signal messaging app to carry...
New Scam Alert: Malicious QR Codes in Unsolicited Gifts
The Federal Trade Commission (FTC) has issued an urgent warning about a new, sophisticated version of the brushing scam that is targeting Americans. In...
Espionage Meets Ransomware: China-linked Actor Shifts to Financially Motivated Attacks
In an unexpected twist, a China-linked espionage group appears to have shifted gears, utilizing cyberattack techniques for ransomware. A recent incident uncovered in late...
Researchers Unveil a Stealthy Backdoor Attack on Advanced Language Models
As large language models (LLMs) like ChatGPT become more integrated into everyday applications, security researchers are beginning to scrutinize their vulnerabilities. A recent study...
Security Flaw Exposed: YouTube Users’ Emails Accessible Through Google Exploit
A recent discovery by security researchers has revealed a significant flaw in YouTube's privacy measures, allowing the email addresses of users to be accessed...
Russian Hackers Use Meeting Invite Phishing to Infiltrate Sensitive Accounts
A new and sophisticated phishing campaign, believed to be orchestrated by Russian threat actors, is wreaking havoc on various industries, including governments and NGOs....
Industry Trends and Innovation in Defense Tech: Insights from the “Definitely...
As part of the "Definitely Defense" conference organized by iHLS in collaboration with Amit Pollak Matalon & Co. and Deloitte, a panel of leading...
Infostealers Infiltrate U.S. Defense Sector Systems: Military Information at risk
A new report by Israeli cybersecurity firm Hudson Rock has revealed that infostealer malware is infiltrating the U.S. military and defense contractors, posing a...
Shipping Platform Exposes Millions of Customer Records
A recent security incident has exposed millions of personal customer records linked to an international shipping platform used by major e-commerce companies like eBay,...