-
Security
/ 3 weeks agoTrueConf Zero-Day Exploited in Southeast Asian Government Attacks
A critical security vulnerability in the TrueConf video conferencing software has been actively exploited as a zero-day in targeted attacks against...
-
Security
/ 3 weeks agoGoogle Begins Android Developer Verification Rollout
Google has officially begun a global rollout of its Android developer verification program, the company announced on Monday. The initiative is...
-
Security
/ 3 weeks agoAxios npm Package Compromised in Supply Chain Attack
Two versions of the widely used Axios HTTP client library were found to contain malicious code this week, following a compromise...
-
Security
/ 3 weeks agoSOC Process Improvements Boost Tier 1 Analyst Productivity
security operations centers globally are identifying process inefficiencies, not just sophisticated threats, as a primary barrier to analyst productivity. According to...
-
Security
/ 3 weeks agoTelecom Espionage, AI Vulnerabilities, and UK Age Verification Updates
Legal proceedings have begun against alleged long-term espionage operations within telecommunications infrastructure, while new research demonstrates vulnerabilities in large language models....
-
Security
/ 3 weeks agoDeepLoad Malware Uses Social Engineering to Steal Browser Data
A newly identified malware loader, dubbed DeepLoad, is being distributed through a sophisticated social engineering campaign targeting users worldwide. The campaign...
-
Security
/ 3 weeks agoOpenAI Fixes Critical ChatGPT Data Leak and GitHub Token Flaw
A significant security vulnerability in OpenAI‘s ChatGPT allowed unauthorized extraction of user conversation data, according to research from cybersecurity firm Check...
-
Security
/ 3 weeks agoChina-Linked Hackers Target Southeast Asian Government
A government organization in Southeast Asia has been targeted by three distinct threat clusters with links to China. The operation, described...
-
Security
/ 3 weeks agoRussian Malware CTRL Hijacks RDP via Phishing LNK Files
cybersecurity researchers have identified a new remote access toolkit of Russian origin being distributed through malicious Windows shortcut files. The malware,...
-
Security
/ 3 weeks agoSecrets Sprawl Accelerates, Hits Record High in 2025
The exposure of sensitive digital credentials, known as secrets sprawl, reached a new record in 2025, according to an annual industry...

