The Hidden Trail Behind 3D-Printed Weapons
3D printing is often celebrated for its ability to produce toys, tools, and prototypes quickly, but the technology can also be exploited for illegal...
Your Body as the Key: The Rise of Biometric Authentication
As digital threats grow more sophisticated, traditional passwords are increasingly viewed as insufficient for protecting personal and professional information. In response, biometric authentication, using...
Echo-Based Exploits Allow Tracking in Zoom and Teams Calls
A recent study highlights a surprising vulnerability in video conferencing platforms such as Zoom and Microsoft Teams: even with cameras off, microphones muted, or...
Researchers Find New Vulnerabilities in LTE Networks
Researchers at the Korea Advanced Institute of Science and Technology (KAIST) have identified previously unknown security flaws in LTE mobile networks that could put...
Corporate Messaging Platform Became Gateway for Hackers
Nikkei Inc., Japan’s largest financial news organization and owner of the Financial Times, revealed that hackers gained access to its networks through an employee’s...
New Memory System Cuts Bottlenecks in Data Centers
Data centers today face a growing challenge: modern servers must juggle multiple programs from countless users simultaneously, all while keeping data secure. This creates...
Gmail Data Leak: 183 Million Reasons to Rethink Your Password Security
A new trove of stolen login credentials has surfaced online, with 183 million email addresses and passwords added to the “Have I Been Pwned”...
AI That Keeps Data Private — Without Losing Its Informational Flexibility
A new advancement in federated learning promises improved AI performance for sensitive sectors like healthcare and finance, while preserving data privacy. Federated learning enables...
Lawsuit Against Roku that Allegedly Collected and Sold Children’s Data Without...
Florida’s Attorney General has filed a lawsuit alleging that a major smart TV and streaming platform (Roku) collected and sold children’s personal data without...
Researchers Uncover First Hardware-Based AI Privacy Leak
Researchers have discovered a previously unknown vulnerability in AI hardware that can be exploited to reveal private information about AI training data—without accessing the...
Attackers Exploit Discord’s Verification Pipeline
A recent cyberattack targeting Discord’s customer support system has exposed personal data from approximately 70,000 users, drawing renewed attention to the security risks of...
Android Exploit Can Extract Anything on Your Screen Without Permissions
A newly published academic study has revealed a high-severity Android vulnerability that allows attackers to extract sensitive on-screen content—including two-factor authentication (2FA) codes and...
Satellite Communications Found Wide Open to Interception with Basic Equipment
A recent academic study has uncovered a major vulnerability in satellite communications: vast amounts of sensitive data—including military and industrial information—are being broadcast unencrypted...
Researchers Develop Tool to Improve AI Text Classifiers
A research team from MIT’s Laboratory for Information and Decision Systems (LIDS) has developed a new method to assess and improve the accuracy of...
Study Shows LLMs Can Be Backdoored with Minimal Data Poisoning
A new study has revealed a critical vulnerability in the training process of large language models (LLMs), showing that even the largest models can...
Wi-Fi Networks Can Now Identify You—Even Without a Device
New research has revealed that standard Wi-Fi networks can be used to identify individuals—even if they are not carrying a phone or any connected...
The Rise of AI-Driven Ransomware Groups
New analysis by blockchain intelligence firm TRM Labs has revealed the emergence of at least nine previously unknown ransomware groups over the past year,...
How Even Your Computer Mouse Can Spy on You
A team of Researchers from the University of California, Irvine have uncovered a surprising new security risk hiding in plain sight: high-end computer mice...
Red Hat Confirms GitLab Cybersecurity Incident Involving Consulting Data
Red Hat has disclosed a breach affecting a specific GitLab environment used by its consulting team. The incident, which the company says does not...
Ransomware Group Claims Major Breach of Israeli Hospital’s Data Systems
Shamir Medical Center (Assaf HaRofeh), one of Israel’s largest hospitals, was hit by a cyberattack on Thursday, during Yom Kippur. A ransomware group known...
Teenagers in the Netherlands Caught Using WiFi Sniffer Near European Law...
Dutch authorities have arrested two 17-year-olds suspected of conducting surveillance near key European law enforcement facilities on behalf of Russian intelligence. The incident is...
Investigation Finds TikTok Collects Underage Users’ Data
A joint investigation by federal and provincial privacy authorities in Canada has concluded that TikTok’s current measures to prevent children under 13 from using...

















































