International Operation Disrupts Pro-Russian Cyber Network Linked to Thousands of DDoS...
A major international law enforcement effort has dealt a significant blow to NoName057(16), a pro-Russian cyber group responsible for thousands of distributed denial-of-service (DDoS)...
Researchers Show How Hidden Commands Can Trick Google Gemini into Delivering...
Security researchers have uncovered a method that allows attackers to manipulate Google’s Gemini AI assistant by hiding invisible instructions within emails. The flaw enables...
International Collaboration Shuts Down Tech Support Scam Network
An extensive investigation involving law enforcement agencies from India, the UK, and the US has led to the takedown of a global scam operation...
Malware Disguised as VPN Software Found Abusing GitHub’s Open Platform
A new malware campaign is using GitHub to quietly distribute an infostealer tool under the pretense of free utility software, raising renewed concerns over...
Widespread Risk in AI Code Editors: Vibe Coders Exposed to Malicious...
A growing security concern is emerging in the world of AI-assisted code editors, as a lack of proper oversight in third-party extension marketplaces is...
Security Research Reveals Serious Vulnerabilities in EV Charging Infrastructure
New findings highlight significant cybersecurity risks in the rapidly expanding electric vehicle (EV) charging ecosystem. A recent technical analysis by researcher Brandon Perry has...
Browser Extensions with Clean Histories Quietly Turn Into Malware
A widespread browser hijacking campaign has quietly infected millions of users by exploiting trusted Chrome and Edge extensions. Security researchers from Koi Security have...
Pro-Iran Hacktivist Group Targets Independent News Outlet Iran International
On Tuesday, July 8th, Independent news outlet Iran International was allegedly hacked in a large-scale cyberattack by Handala, a pro-Iranian hacktivist group. The group,...
AI Models Are Now Generating Phishing Links
A troubling development in AI-driven technology is drawing attention from cybersecurity researchers: large language models (LLMs) are confidently recommending phishing pages as legitimate login...
Critical Security Gaps Discovered in EU Border Surveillance System
A key European security database used to monitor border crossings and identify persons of interest has been found to contain serious technical and cybersecurity...
North Korean Operatives Used Fake Identities to Infiltrate Blockchain Firms and...
U.S. law enforcement has revealed new details about a sophisticated North Korean scheme in which operatives posed as remote IT professionals to infiltrate blockchain...
Game-Based Learning Shaping the Future of Online Fraud Awareness
As online fraud continues to rise, finding effective ways to educate people about e-commerce scams has never been more crucial. A recent pilot study...
Iranian Hackers from the 2024 Elections Resume Cyber Attacks
A new wave of cyber activity from Iran-linked hackers has emerged, with the group responsible for the 2024 U.S. election email leaks reportedly gearing...
Suspected Cyberattack Disrupts Columbia University
A large-scale digital outage at Columbia University on Tuesday has triggered concerns of a potential cybersecurity breach, as access to core online services used...
Outdated TP-Link Routers Targeted in Active Cyberattacks
A critical security flaw in several widely used TP-Link router models is now being actively exploited by hackers, according to a recent update by...
Pro-Iranian Hackers Leak Sensitive Data from Saudi Arabia’s Largest Sports Event
A significant data breach has exposed the personal information of thousands connected to the Saudi Games, the kingdom’s premier national sporting event. The incident,...
Unprecedented Data Leak Exposes 16 Billion Login Credentials in Massive Cybersecurity...
A staggering data leak has revealed one of the largest breaches of personal information in digital history—an estimated 16 billion login credentials exposed across...
Iran Hacks Security Cameras to Monitor Israeli Movements in Real Time
A recent cybersecurity warning has revealed that Iran is actively exploiting weaknesses in internet-connected home security cameras across Israel, using them to monitor military...
Wave of DDoS Attacks and Disinformation Amid Israel-Iran Conflict
As the Israel-Iran conflict intensifies, cyberspace has become a secondary battlefield, with digital offensives escalating in both scope and complexity. The result has been...
Iran’s Bank Sepah Reportedly Hit by Cyberattack Linked to Pro-Israel Hackers
Amid the recent escalation between Israel and Iran, an Iranian state-owned bank has reportedly fallen victim to a disruptive cyberattack, carried out by the...
Cyber Front Heats Up Following Israel-Iran Conflict
In the wake of Israel’s recent military campaign targeting Iranian nuclear and military assets—codenamed Operation Rising Lion—cyber activity linked to Iran and its allies...
Cybercriminals Use Fake AI Tools to Deploy Malware at Scale
As the global fascination with generative AI continues to grow, threat actors are seizing the opportunity—this time by weaponizing fake AI video generation tools....