AI Web Builders Are Fueling a Rise in Phishing Sites, Say...
The rapid rise of AI-powered web development tools has made it easier than ever to create functional websites with minimal technical expertise. But recent...
Malicious Android App Uses Fake Antivirus Front to Spy on Russian...
A new Android malware strain disguised as a security tool is targeting Russian users, particularly within the business sector. Identified by cybersecurity researchers at...
Hackers Hijack Russian TV to Broadcast War Realities on Ukraine’s Independence...
In a bold cyber-attack timed for Ukraine’s Independence Day, pro-Ukrainian hackers redirected Russian television broadcasts, replacing regular programming with footage highlighting battlefield losses and...
INTERPOL Dismantles Thousands of Cybercrime Networks in Africa, Recovering Millions
An extensive international cybercrime operation coordinated by INTERPOL has led to the takedown of more than 11,000 malicious infrastructures across Africa and the arrest...
Russian Cyber Group Exploits Old Cisco Vulnerability for Strategic Espionage
A Russian state-linked cyber espionage group has been found actively exploiting a known vulnerability in Cisco networking equipment, despite a patch being available for...
Millions of PayPal Credential Allegedly Leaked on Hacker Forum
A post on a known data leak forum has raised concerns over a claimed dataset containing 15.8 million PayPal login credentials. According to the...
Pro-Russian Hacktivist Group Targets Ukrainian Government Sites Ahead of Trump-Zelensky Talks
A coordinated wave of cyberattacks hit several Ukrainian government websites earlier this week, hours before President Volodymyr Zelensky’s scheduled meeting with U.S. President Donald...
Widespread Use of Chinese-Made Surveillance Cameras Raises Security Concerns
A July report by the Irish Council for Civil Liberties (ICCL) has highlighted the ongoing use of Chinese-manufactured Hikvision surveillance cameras across numerous public...
Phishing Campaign Targets Marketing Professionals with Fake Netflix Job Offers
A newly uncovered phishing operation is targeting marketing and social media professionals by impersonating Netflix recruiters, with the ultimate goal of hijacking access to...
This is the Sensitive Info Your AI Browser Assistant Collects
A new academic study has revealed that popular AI browser extensions are collecting and sharing sensitive user data, including medical records, financial details, and...
Passkeys Are Not Immune: New Research Highlights Critical Vulnerability
A recent investigation by Proofpoint security researchers has revealed a serious vulnerability in passkey-based authentication systems, raising concerns over their current level of protection...
U.S. Federal Court Filing System Allegedly Under Cyber Surveillance by Kremlin-Linked...
New details have emerged suggesting Russian-linked hackers may be behind a serious cyber intrusion into the U.S. federal judiciary's electronic case filing system. According...
Google Confirms Limited Cybersecurity Breach, Says Core Infrastructure Unaffected
Google has confirmed a data breach involving one of its Salesforce CRM instances, stating that while some business contact information was exposed, none of...
Security Testing Reveals Major Vulnerabilities in GPT-5’s Default Configuration
Recent evaluations of OpenAI’s latest large language model, GPT-5, have revealed serious security shortcomings in its unmodified state, raising concerns about its readiness for...
Fake Android Banking Apps Are Hijacking Devices and Draining Accounts in...
A wave of sophisticated mobile malware is targeting Android users in India by disguising itself as legitimate banking applications. According to a late-July report...
Malicious Shortcut Files Return as Effective Tool for Delivering Backdoors
A new wave of attacks is targeting Windows users with deceptive shortcut files designed to deliver the REMCOS backdoor and similar malware, according to...
North Korean Hackers Exploit Cloud Platforms in Sophisticated Crypto Theft Operations
A recently published threat report by Google Cloud has revealed a new cloud-based crypto theft technique linked to a North Korean cyber group. The...
Human Error Isn’t Inevitable: Research Finds Users Can Detect Malware Better...
While human error is often seen as a major vulnerability in cybersecurity, new research suggests that non-expert users can effectively identify malware—especially when given...
Russian Hackers Intercept Internet Traffic of Foreign Missions in Moscow
Foreign diplomatic missions and sensitive organizations operating in Moscow are being targeted by state-sponsored cyber actors using advanced surveillance techniques at the internet service...
Phishing On Your Doorstep: FBI Warns of Malicious QR Codes Delivered...
The FBI has issued a public service announcement about a growing scam involving physical packages sent to individuals without explanation. Inside these packages, recipients...
Hackers Bypass Microsoft’s 2FA in New Phishing Campaign
A new wave of phishing attacks has been exploiting Microsoft 365 environments, successfully bypassing even two-factor authentication (2FA) in many cases. According to cybersecurity...
ChatGPT Conversations Found via Google Search Raise Privacy Concerns
A recent discovery has raised substantial privacy concerns for users of ChatGPT: conversations shared using OpenAI’s "shared link" feature have been appearing in public...